<86>Aug 3 00:01:41 userdel[2155423]: delete user 'rooter' <86>Aug 3 00:01:41 userdel[2155423]: removed group 'rooter' owned by 'rooter' <86>Aug 3 00:01:41 groupadd[2155431]: group added to /etc/group: name=rooter, GID=618 <86>Aug 3 00:01:41 groupadd[2155431]: group added to /etc/gshadow: name=rooter <86>Aug 3 00:01:41 groupadd[2155431]: new group: name=rooter, GID=618 <86>Aug 3 00:01:41 useradd[2155440]: new user: name=rooter, UID=618, GID=618, home=/root, shell=/bin/bash <86>Aug 3 00:01:41 userdel[2155450]: delete user 'builder' <86>Aug 3 00:01:41 userdel[2155450]: removed group 'builder' owned by 'builder' <86>Aug 3 00:01:41 userdel[2155450]: removed shadow group 'builder' owned by 'builder' <86>Aug 3 00:01:41 groupadd[2155456]: group added to /etc/group: name=builder, GID=619 <86>Aug 3 00:01:41 groupadd[2155456]: group added to /etc/gshadow: name=builder <86>Aug 3 00:01:41 groupadd[2155456]: new group: name=builder, GID=619 <86>Aug 3 00:01:41 useradd[2155463]: new user: name=builder, UID=619, GID=619, home=/usr/src, shell=/bin/bash warning: Macro %_altdir not found warning: Macro %_altdir not found warning: Macro %_altdir not found <13>Aug 3 00:01:49 rpmi: libsqlite3-3.35.5-alt1 sisyphus+279365.100.1.1 1626479494 installed <13>Aug 3 00:01:49 rpmi: libnspr-1:4.31-alt1 sisyphus+273509.100.1.1 1622733773 installed <13>Aug 3 00:01:49 rpmi: libgdbm-1.8.3-alt10 sisyphus+278100.1600.1.1 1626058413 installed <13>Aug 3 00:01:49 rpmi: libexpat-2.2.10-alt1 sisyphus+276608.100.1.2 1625153355 installed <13>Aug 3 00:01:49 rpmi: gcc-c++-common-1.4.27-alt1 sisyphus+278099.1300.1.1 1626028636 installed <13>Aug 3 00:01:49 rpmi: libstdc++10-devel-10.3.1-alt3 sisyphus+281519.340.4.1 1627909997 installed <13>Aug 3 00:01:50 rpmi: gcc10-c++-10.3.1-alt3 sisyphus+281519.340.4.1 1627909997 installed <13>Aug 3 00:01:50 rpmi: libp11-kit-0.23.15-alt2 sisyphus+278382.100.1.2 1626190666 installed <13>Aug 3 00:01:50 rpmi: libtasn1-4.17.0-alt1 sisyphus+276722.100.1.1 1625211284 installed <13>Aug 3 00:01:50 rpmi: rpm-macros-alternatives-0.5.1-alt1 sisyphus+278157.100.2.1 1626055790 installed <13>Aug 3 00:01:50 rpmi: alternatives-0.5.1-alt1 sisyphus+278157.100.2.1 1626055790 installed <13>Aug 3 00:01:50 rpmi: ca-certificates-2021.06.03-alt1 sisyphus+273509.400.1.1 1622736045 installed <13>Aug 3 00:01:50 rpmi: ca-trust-0.1.2-alt1 sisyphus+233348.100.1.1 1561653823 installed <13>Aug 3 00:01:50 rpmi: p11-kit-trust-0.23.15-alt2 sisyphus+278382.100.1.2 1626190666 installed <13>Aug 3 00:01:50 rpmi: libcrypto1.1-1.1.1k-alt1 sisyphus+279286.100.1.1 1626469546 installed <13>Aug 3 00:01:50 rpmi: libssl1.1-1.1.1k-alt1 sisyphus+279286.100.1.1 1626469546 installed <13>Aug 3 00:01:50 rpmi: libpython3-3.9.6-alt1 sisyphus+276295.100.1.1 1624964289 installed <13>Aug 3 00:01:50 rpmi: python3-3.9.6-alt1 sisyphus+276295.100.1.1 1624964289 installed <13>Aug 3 00:01:51 rpmi: python3-base-3.9.6-alt1 sisyphus+276295.100.1.1 1624964289 installed <13>Aug 3 00:01:51 rpmi: gyp-0.1.h.e87d37d6-alt1 sisyphus+275780.100.1.1 1624791029 installed <13>Aug 3 00:01:51 rpmi: gcc-c++-10-alt2 sisyphus+281519.400.4.1 1627910688 installed <13>Aug 3 00:01:51 rpmi: libnspr-devel-1:4.31-alt1 sisyphus+273509.100.1.1 1622733773 installed <13>Aug 3 00:01:51 rpmi: libsqlite3-devel-3.35.5-alt1 sisyphus+279365.100.1.1 1626479494 installed <13>Aug 3 00:01:51 rpmi: zlib-devel-1.2.11-alt1 sisyphus+278099.4700.1.1 1626031564 installed <13>Aug 3 00:01:51 rpmi: ninja-build-1.10.2-alt1 sisyphus+278497.100.1.2 1626232127 installed <13>Aug 3 00:01:51 rpmi: chrpath-0.16-alt1 sisyphus+278100.500.1.1 1626056633 installed Building target platforms: x86_64 Building for target x86_64 Wrote: /usr/src/in/nosrpm/nss-3.66.0-alt2.nosrc.rpm (w1.gzdio) Installing nss-3.66.0-alt2.src.rpm Building target platforms: x86_64 Building for target x86_64 Executing(%prep): /bin/sh -e /usr/src/tmp/rpm-tmp.35149 + umask 022 + /bin/mkdir -p /usr/src/RPM/BUILD + cd /usr/src/RPM/BUILD + cd /usr/src/RPM/BUILD + rm -rf nss-3.66.0 + echo 'Source #0 (nss-3.66.0.tar):' Source #0 (nss-3.66.0.tar): + /bin/tar -xf /usr/src/RPM/SOURCES/nss-3.66.0.tar + cd nss-3.66.0 + /bin/chmod -c -Rf u+rwX,go-w . + echo 'Patch #0 (nss-3.66.0-Bug-1566124-Fix-AES_GCM-mode-on-ppc64le-for-messages.patch):' Patch #0 (nss-3.66.0-Bug-1566124-Fix-AES_GCM-mode-on-ppc64le-for-messages.patch): + /usr/bin/patch -p1 -d nss patching file lib/freebl/ppc-gcm.s + echo 'Patch #1 (nss-3.66.0-Bug-1566124-Fix-counter-increase-in-ppc-gcm-wrap.c-r.patch):' Patch #1 (nss-3.66.0-Bug-1566124-Fix-counter-increase-in-ppc-gcm-wrap.c-r.patch): + /usr/bin/patch -p1 -d nss patching file lib/freebl/ppc-gcm-wrap.c + echo 'Patch #2 (nss-3.66.0-Bug-1714874-alt-disable-test-dbtest-rw-in-a-readonly-directory.patch):' Patch #2 (nss-3.66.0-Bug-1714874-alt-disable-test-dbtest-rw-in-a-readonly-directory.patch): + /usr/bin/patch -p1 -d nss patching file tests/dbtests/dbtests.sh + exit 0 Executing(%build): /bin/sh -e /usr/src/tmp/rpm-tmp.35149 + umask 022 + /bin/mkdir -p /usr/src/RPM/BUILD + cd /usr/src/RPM/BUILD + cd nss-3.66.0 + mkdir -p bin + export PATH=/usr/src/RPM/BUILD/nss-3.66.0/bin:/usr/src/bin:/bin:/usr/bin:/usr/X11R6/bin:/usr/games + PATH=/usr/src/RPM/BUILD/nss-3.66.0/bin:/usr/src/bin:/bin:/usr/bin:/usr/X11R6/bin:/usr/games + ln -s /usr/bin/python3 bin/python + export USE_64=1 + USE_64=1 + cd nss + ./build.sh --gcc --opt --system-nspr --system-sqlite --enable-legacy-db --enable-libpkix ninja: Entering directory `/usr/src/RPM/BUILD/nss-3.66.0/nss/out/Release' [1/1469] COPY ../../lib/softoken/lowkeyi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/lowkeyi.h [2/1469] COPY ../../lib/softoken/lowkeyti.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/lowkeyti.h [3/1469] COPY ../../lib/softoken/pkcs11ni.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkcs11ni.h [4/1469] COPY ../../lib/softoken/sdb.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/sdb.h [5/1469] COPY ../../lib/softoken/sftkdbt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/sftkdbt.h [6/1469] COPY ../../lib/softoken/softkver.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/softkver.h [7/1469] COPY ../../lib/softoken/softoken.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/softoken.h [8/1469] COPY ../../lib/util/base64.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/base64.h [9/1469] COPY ../../lib/util/ciferfam.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/ciferfam.h [10/1469] COPY ../../lib/util/eccutil.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/eccutil.h [11/1469] COPY ../../lib/util/hasht.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/hasht.h [12/1469] COPY ../../lib/util/nssb64.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssb64.h [13/1469] COPY ../../lib/util/nssb64t.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssb64t.h [14/1469] COPY ../../lib/util/nssilckt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssilckt.h [15/1469] COPY ../../lib/util/nssilock.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssilock.h [16/1469] COPY ../../lib/util/nsslocks.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nsslocks.h [17/1469] COPY ../../lib/util/nssrwlk.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssrwlk.h [18/1469] COPY ../../lib/util/nssrwlkt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssrwlkt.h [19/1469] COPY ../../lib/util/nssutil.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssutil.h [20/1469] COPY ../../lib/util/pkcs11.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs11.h [21/1469] COPY ../../lib/util/pkcs11f.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs11f.h [22/1469] COPY ../../lib/util/pkcs11n.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs11n.h [23/1469] COPY ../../lib/util/pkcs11p.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs11p.h [24/1469] COPY ../../lib/util/pkcs11t.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs11t.h [25/1469] COPY ../../lib/util/pkcs11u.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs11u.h [26/1469] COPY ../../lib/util/pkcs11uri.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs11uri.h [27/1469] COPY ../../lib/util/pkcs1sig.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs1sig.h [28/1469] COPY ../../lib/util/portreg.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/portreg.h [29/1469] COPY ../../lib/util/secasn1.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secasn1.h [30/1469] COPY ../../lib/util/secasn1t.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secasn1t.h [31/1469] COPY ../../lib/util/seccomon.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/seccomon.h [32/1469] COPY ../../lib/util/secder.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secder.h [33/1469] COPY ../../lib/util/secdert.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secdert.h [34/1469] COPY ../../lib/util/secdig.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secdig.h [35/1469] COPY ../../lib/util/secdigt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secdigt.h [36/1469] COPY ../../lib/util/secerr.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secerr.h [37/1469] COPY ../../lib/util/secitem.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secitem.h [38/1469] COPY ../../lib/util/secoid.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secoid.h [39/1469] COPY ../../lib/util/secoidt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secoidt.h [40/1469] COPY ../../lib/util/secport.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secport.h [41/1469] COPY ../../lib/util/utilmodt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/utilmodt.h [42/1469] COPY ../../lib/util/utilpars.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/utilpars.h [43/1469] COPY ../../lib/util/utilparst.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/utilparst.h [44/1469] COPY ../../lib/util/utilrename.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/utilrename.h [45/1469] COPY ../../lib/util/templates.c /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/templates.c [46/1469] COPY ../../lib/util/verref.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/verref.h [47/1469] COPY ../../lib/ssl/preenc.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/preenc.h [48/1469] COPY ../../lib/ssl/ssl.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/ssl.h [49/1469] COPY ../../lib/ssl/sslerr.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/sslerr.h [50/1469] COPY ../../lib/ssl/sslexp.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/sslexp.h [51/1469] COPY ../../lib/ssl/sslproto.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/sslproto.h [52/1469] COPY ../../lib/ssl/sslt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/sslt.h [53/1469] COPY ../../lib/sqlite/sqlite3.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/sqlite3.h [54/1469] COPY ../../lib/softoken/softoknt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/softoknt.h [55/1469] COPY ../../lib/softoken/lgglue.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/lgglue.h [56/1469] STAMP obj/lib/util/lib_util_exports.actions_rules_copies.stamp [57/1469] COPY ../../lib/smime/cms.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/cms.h [58/1469] COPY ../../lib/smime/cmsreclist.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/cmsreclist.h [59/1469] COPY ../../lib/smime/cmst.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/cmst.h [60/1469] COPY ../../lib/smime/smime.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/smime.h [61/1469] COPY ../../lib/smime/cmslocal.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/cmslocal.h [62/1469] STAMP obj/lib/ssl/lib_ssl_exports.actions_rules_copies.stamp [63/1469] COPY ../../lib/pki/nsspki.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/nsspki.h [64/1469] COPY ../../lib/pki/nsspkit.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/nsspkit.h [65/1469] STAMP obj/lib/softoken/lib_softoken_exports.actions_rules_copies.stamp [66/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_crl.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_crl.h [67/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_crldp.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_crldp.h [68/1469] COPY ../../lib/pki/pki.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pki.h [69/1469] COPY ../../lib/pki/pki3hack.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pki3hack.h [70/1469] COPY ../../lib/pki/pkim.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkim.h [71/1469] STAMP obj/lib/smime/lib_smime_exports.actions_rules_copies.stamp [72/1469] COPY ../../lib/pki/pkistore.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkistore.h [73/1469] COPY ../../lib/pki/pkit.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkit.h [74/1469] COPY ../../lib/pki/pkitm.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkitm.h [75/1469] COPY ../../lib/pkcs7/pkcs7t.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs7t.h [76/1469] COPY ../../lib/pkcs7/secmime.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secmime.h [77/1469] COPY ../../lib/pkcs7/secpkcs7.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secpkcs7.h [78/1469] COPY ../../lib/pkcs7/p7local.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/p7local.h [79/1469] COPY ../../lib/pkcs12/p12.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/p12.h [80/1469] COPY ../../lib/pkcs12/p12plcy.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/p12plcy.h [81/1469] COPY ../../lib/pkcs12/p12t.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/p12t.h [82/1469] COPY ../../lib/pkcs12/pkcs12.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs12.h [83/1469] COPY ../../lib/pkcs12/pkcs12t.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pkcs12t.h [84/1469] STAMP obj/lib/pki/lib_pki_exports.actions_rules_copies.stamp [85/1469] COPY ../../lib/nss/nssoptions.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/nssoptions.h [86/1469] COPY ../../lib/nss/nssrenam.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/nssrenam.h [87/1469] COPY ../../lib/pk11wrap/pk11func.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pk11func.h [88/1469] STAMP obj/lib/pkcs7/lib_pkcs7_exports.actions_rules_copies.stamp [89/1469] COPY ../../lib/pk11wrap/pk11pqg.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pk11pqg.h [90/1469] COPY ../../lib/pk11wrap/pk11priv.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pk11priv.h [91/1469] COPY ../../lib/pk11wrap/pk11hpke.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pk11hpke.h [92/1469] COPY ../../lib/pk11wrap/pk11pub.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pk11pub.h [93/1469] STAMP obj/lib/pkcs12/lib_pkcs12_exports.actions_rules_copies.stamp [94/1469] COPY ../../lib/pk11wrap/pk11sdr.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/pk11sdr.h [95/1469] COPY ../../lib/pk11wrap/secmod.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secmod.h [96/1469] COPY ../../lib/pk11wrap/secmodt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secmodt.h [97/1469] COPY ../../lib/pk11wrap/secpkcs5.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/secpkcs5.h [98/1469] COPY ../../lib/pk11wrap/dev3hack.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/dev3hack.h [99/1469] COPY ../../lib/pk11wrap/secmodi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/secmodi.h [100/1469] COPY ../../lib/pk11wrap/secmodti.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/secmodti.h [101/1469] COPY ../../lib/nss/nss.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nss.h [102/1469] COPY ../../lib/mozpkix/include/pkix-test/pkixtestutil.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/test/pkixtestutil.h [103/1469] COPY ../../lib/mozpkix/include/pkix-test/pkixtestnss.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/test/pkixtestnss.h [104/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_bigint.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_bigint.h [105/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_bytearray.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_bytearray.h [106/1469] COPY ../../cpputil/nss_scoped_ptrs.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/nss_scoped_ptrs.h [107/1469] COPY ../../lib/mozpkix/include/pkix/Input.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/Input.h [108/1469] COPY ../../lib/mozpkix/include/pkix/Time.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/Time.h [109/1469] COPY ../../lib/mozpkix/include/pkix/Result.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/Result.h [110/1469] STAMP obj/lib/pk11wrap/lib_pk11wrap_exports.actions_rules_copies.stamp [111/1469] STAMP obj/lib/nss/lib_nss_exports.actions_rules_copies.stamp [112/1469] COPY ../../lib/mozpkix/include/pkix/pkix.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/pkix.h [113/1469] STAMP obj/lib/mozpkix/lib_mozpkix_test_exports.actions_rules_copies.stamp [114/1469] COPY ../../lib/mozpkix/include/pkix/pkixc.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/pkixc.h [115/1469] COPY ../../lib/mozpkix/include/pkix/pkixnss.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/pkixnss.h [116/1469] COPY ../../lib/mozpkix/include/pkix/pkixtypes.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/pkixtypes.h [117/1469] COPY ../../lib/mozpkix/include/pkix/pkixutil.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/pkixutil.h [118/1469] COPY ../../lib/mozpkix/include/pkix/pkixcheck.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/pkixcheck.h [119/1469] COPY ../../lib/mozpkix/include/pkix/pkixder.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/mozpkix/pkixder.h [120/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_cert.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_cert.h [121/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_certpolicyinfo.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_certpolicyinfo.h [122/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_certpolicymap.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_certpolicymap.h [123/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_certpolicyqualifier.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_certpolicyqualifier.h [124/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_common.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_common.h [125/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_hashtable.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_hashtable.h [126/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_lifecycle.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_lifecycle.h [127/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_mem.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_mem.h [128/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_monitorlock.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_monitorlock.h [129/1469] STAMP obj/lib/mozpkix/lib_mozpkix_exports.actions_rules_copies.stamp [130/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_mutex.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_mutex.h [131/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_object.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_object.h [132/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_oid.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_oid.h [133/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_primhash.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_primhash.h [134/1469] COPY ../../lib/dbm/include/queue.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/dbm/queue.h [135/1469] COPY ../../lib/dbm/include/search.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/dbm/search.h [136/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_rwlock.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_rwlock.h [137/1469] COPY ../../lib/libpkix/pkix_pl_nss/system/pkix_pl_string.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_string.h [138/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_basicconstraints.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_basicconstraints.h [139/1469] STAMP obj/nss_mozpkix_exports.actions_depends.stamp [140/1469] STAMP obj/nss_mozpkix_exports.compile_depends.stamp [141/1469] COPY ../../lib/libpkix/pkix/util/pkix_list.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_list.h [142/1469] COPY ../../lib/libpkix/pkix/util/pkix_logger.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_logger.h [143/1469] COPY ../../lib/libpkix/pkix/util/pkix_tools.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_tools.h [144/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_httpcertstore.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_httpcertstore.h [145/1469] COPY ../../lib/ckfw/nssck.api /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssck.api [146/1469] COPY ../../lib/certhigh/ocsp.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/ocsp.h [147/1469] STAMP obj/lib/libpkix/pkix_pl_nss/system/lib_libpkix_pkix_pl_nss_system_exports.actions_rules_copies.stamp [148/1469] COPY ../../lib/certhigh/ocspt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/ocspt.h [149/1469] COPY ../../lib/certhigh/ocspi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ocspi.h [150/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_crlentry.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_crlentry.h [151/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_date.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_date.h [152/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_generalname.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_generalname.h [153/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_infoaccess.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_infoaccess.h [154/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_nameconstraints.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_nameconstraints.h [155/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_ocspcertid.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_ocspcertid.h [156/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_ocsprequest.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_ocsprequest.h [157/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_ocspresponse.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_ocspresponse.h [158/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_publickey.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_publickey.h [159/1469] COPY ../../lib/libpkix/pkix_pl_nss/pki/pkix_pl_x500name.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_x500name.h [160/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_aiamgr.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_aiamgr.h [161/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_colcertstore.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_colcertstore.h [162/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_httpdefaultclient.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_httpdefaultclient.h [163/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_ldapcertstore.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_ldapcertstore.h [164/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_ldapdefaultclient.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_ldapdefaultclient.h [165/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_ldaprequest.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_ldaprequest.h [166/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_ldapresponse.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_ldapresponse.h [167/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_ldapt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_ldapt.h [168/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_nsscontext.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_nsscontext.h [169/1469] STAMP obj/lib/libpkix/pkix_pl_nss/pki/lib_libpkix_pkix_pl_nss_pki_exports.actions_rules_copies.stamp [170/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_pk11certstore.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_pk11certstore.h [171/1469] COPY ../../lib/libpkix/pkix_pl_nss/module/pkix_pl_socket.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_socket.h [172/1469] COPY ../../lib/libpkix/pkix/util/pkix_error.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_error.h [173/1469] COPY ../../lib/libpkix/pkix/top/pkix_build.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_build.h [174/1469] COPY ../../lib/libpkix/pkix/top/pkix_lifecycle.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_lifecycle.h [175/1469] COPY ../../lib/libpkix/pkix/top/pkix_validate.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_validate.h [176/1469] COPY ../../lib/libpkix/pkix/store/pkix_store.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_store.h [177/1469] COPY ../../lib/libpkix/pkix/results/pkix_buildresult.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_buildresult.h [178/1469] COPY ../../lib/libpkix/pkix/results/pkix_policynode.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_policynode.h [179/1469] COPY ../../lib/libpkix/pkix/results/pkix_valresult.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_valresult.h [180/1469] COPY ../../lib/libpkix/pkix/results/pkix_verifynode.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_verifynode.h [181/1469] STAMP obj/lib/libpkix/pkix_pl_nss/module/lib_libpkix_pkix_pl_nss_module_exports.actions_rules_copies.stamp [182/1469] STAMP obj/lib/libpkix/pkix/util/lib_libpkix_pkix_util_exports.actions_rules_copies.stamp [183/1469] COPY ../../lib/libpkix/pkix/params/pkix_procparams.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_procparams.h [184/1469] COPY ../../lib/libpkix/pkix/params/pkix_resourcelimits.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_resourcelimits.h [185/1469] STAMP obj/lib/libpkix/pkix/top/lib_libpkix_pkix_top_exports.actions_rules_copies.stamp [186/1469] COPY ../../lib/libpkix/pkix/params/pkix_trustanchor.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_trustanchor.h [187/1469] COPY ../../lib/libpkix/pkix/params/pkix_valparams.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_valparams.h [188/1469] COPY ../../lib/libpkix/pkix/crlsel/pkix_comcrlselparams.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_comcrlselparams.h [189/1469] COPY ../../lib/libpkix/pkix/crlsel/pkix_crlselector.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_crlselector.h [190/1469] STAMP obj/lib/libpkix/pkix/results/lib_libpkix_pkix_results_exports.actions_rules_copies.stamp [191/1469] COPY ../../lib/libpkix/pkix/certsel/pkix_comcertselparams.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_comcertselparams.h [192/1469] COPY ../../lib/libpkix/include/pkix.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix.h [193/1469] COPY ../../lib/libpkix/include/pkix_certsel.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_certsel.h [194/1469] COPY ../../lib/libpkix/pkix/checker/pkix_basicconstraintschecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_basicconstraintschecker.h [195/1469] COPY ../../lib/libpkix/pkix/checker/pkix_certchainchecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_certchainchecker.h [196/1469] COPY ../../lib/libpkix/pkix/checker/pkix_crlchecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_crlchecker.h [197/1469] STAMP obj/lib/libpkix/pkix/params/lib_libpkix_pkix_params_exports.actions_rules_copies.stamp [198/1469] COPY ../../lib/libpkix/pkix/checker/pkix_ekuchecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_ekuchecker.h [199/1469] STAMP obj/lib/libpkix/pkix/crlsel/lib_libpkix_pkix_crlsel_exports.actions_rules_copies.stamp [200/1469] COPY ../../lib/libpkix/pkix/checker/pkix_expirationchecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_expirationchecker.h [201/1469] COPY ../../lib/libpkix/pkix/checker/pkix_namechainingchecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_namechainingchecker.h [202/1469] COPY ../../lib/libpkix/pkix/checker/pkix_nameconstraintschecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_nameconstraintschecker.h [203/1469] COPY ../../lib/libpkix/pkix/checker/pkix_ocspchecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_ocspchecker.h [204/1469] COPY ../../lib/libpkix/pkix/checker/pkix_policychecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_policychecker.h [205/1469] COPY ../../lib/libpkix/pkix/checker/pkix_revocationchecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_revocationchecker.h [206/1469] COPY ../../lib/libpkix/pkix/checker/pkix_revocationmethod.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_revocationmethod.h [207/1469] COPY ../../lib/libpkix/pkix/checker/pkix_signaturechecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_signaturechecker.h [208/1469] COPY ../../lib/libpkix/pkix/checker/pkix_targetcertchecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_targetcertchecker.h [209/1469] COPY ../../lib/libpkix/pkix/certsel/pkix_certselector.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_certselector.h [210/1469] COPY ../../lib/jar/jar.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/jar.h [211/1469] COPY ../../lib/jar/jarfile.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/jarfile.h [212/1469] COPY ../../lib/libpkix/include/pkix_certstore.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_certstore.h [213/1469] COPY ../../lib/libpkix/include/pkix_checker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_checker.h [214/1469] COPY ../../lib/libpkix/include/pkix_crlsel.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_crlsel.h [215/1469] COPY ../../lib/libpkix/include/pkix_errorstrings.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_errorstrings.h [216/1469] COPY ../../lib/libpkix/include/pkix_params.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_params.h [217/1469] COPY ../../lib/libpkix/include/pkix_pl_pki.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_pki.h [218/1469] STAMP obj/lib/libpkix/pkix/checker/lib_libpkix_pkix_checker_exports.actions_rules_copies.stamp [219/1469] STAMP obj/lib/libpkix/pkix/certsel/lib_libpkix_pkix_certsel_exports.actions_rules_copies.stamp [220/1469] COPY ../../lib/libpkix/include/pkix_pl_system.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_pl_system.h [221/1469] COPY ../../lib/libpkix/include/pkix_results.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_results.h [222/1469] COPY ../../lib/libpkix/include/pkix_revchecker.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_revchecker.h [223/1469] COPY ../../lib/libpkix/include/pkix_sample_modules.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_sample_modules.h [224/1469] COPY ../../lib/libpkix/include/pkix_util.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkix_util.h [225/1469] COPY ../../lib/libpkix/include/pkixt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pkixt.h [226/1469] COPY ../../lib/jar/jar-ds.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/jar-ds.h [227/1469] COPY ../../lib/freebl/blapit.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/blapit.h [228/1469] COPY ../../lib/freebl/ecl/ecl-exp.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/ecl-exp.h [229/1469] COPY ../../lib/dbm/include/mcom_db.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/dbm/mcom_db.h [230/1469] COPY ../../lib/dbm/include/ncompat.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/dbm/ncompat.h [231/1469] COPY ../../lib/dev/devm.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/devm.h [232/1469] COPY ../../lib/dev/devt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/devt.h [233/1469] COPY ../../lib/freebl/shsign.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/shsign.h [234/1469] COPY ../../lib/freebl/nsslowhash.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nsslowhash.h [235/1469] STAMP obj/lib/libpkix/include/lib_libpkix_include_exports.actions_rules_copies.stamp [236/1469] STAMP obj/lib/jar/lib_jar_exports.actions_rules_copies.stamp [237/1469] COPY ../../lib/freebl/cmac.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/cmac.h [238/1469] COPY ../../lib/freebl/alghmac.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/alghmac.h [239/1469] COPY ../../lib/freebl/blapi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/blapi.h [240/1469] COPY ../../lib/freebl/blake2b.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/blake2b.h [241/1469] COPY ../../lib/freebl/chacha20poly1305.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/chacha20poly1305.h [242/1469] COPY ../../lib/freebl/ec.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ec.h [243/1469] COPY ../../lib/freebl/ecl/ecl-curve.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ecl-curve.h [244/1469] COPY ../../lib/freebl/ecl/ecl.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ecl.h [245/1469] COPY ../../lib/freebl/ecl/eclt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/eclt.h [246/1469] COPY ../../lib/freebl/hmacct.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/hmacct.h [247/1469] COPY ../../lib/freebl/secmpi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/secmpi.h [248/1469] COPY ../../lib/freebl/secrng.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/secrng.h [249/1469] COPY ../../lib/dev/ckhelper.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ckhelper.h [250/1469] COPY ../../lib/dev/dev.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/dev.h [251/1469] COPY ../../lib/dev/devtm.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/devtm.h [252/1469] COPY ../../lib/dev/nssdev.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/nssdev.h [253/1469] COPY ../../lib/dev/nssdevt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/nssdevt.h [254/1469] COPY ../../lib/dbm/include/winfile.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/dbm/winfile.h [255/1469] COPY ../../lib/dbm/include/extern.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/dbm/extern.h [256/1469] COPY ../../lib/dbm/include/hash.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/dbm/hash.h [257/1469] COPY ../../lib/dbm/include/hsearch.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/dbm/hsearch.h [258/1469] STAMP obj/lib/freebl/lib_freebl_exports.actions_rules_copies.stamp [259/1469] COPY ../../lib/crmf/cmmf.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/cmmf.h [260/1469] COPY ../../lib/dbm/include/page.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/dbm/page.h [261/1469] COPY ../../lib/crmf/cmmft.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/cmmft.h [262/1469] COPY ../../lib/cryptohi/cryptoht.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/cryptoht.h [263/1469] STAMP obj/lib/dev/lib_dev_exports.actions_rules_copies.stamp [264/1469] COPY ../../lib/cryptohi/cryptohi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/cryptohi.h [265/1469] COPY ../../lib/cryptohi/key.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/key.h [266/1469] COPY ../../lib/cryptohi/keyhi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/keyhi.h [267/1469] COPY ../../lib/cryptohi/keyt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/keyt.h [268/1469] COPY ../../lib/cryptohi/keythi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/keythi.h [269/1469] COPY ../../lib/cryptohi/sechash.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/sechash.h [270/1469] STAMP obj/lib/dbm/include/lib_dbm_include_exports.actions_rules_copies.stamp [271/1469] COPY ../../lib/cryptohi/keyi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/keyi.h [272/1469] COPY ../../lib/ckfw/nssckepv.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssckepv.h [273/1469] COPY ../../lib/ckfw/nssckft.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssckft.h [274/1469] COPY ../../lib/crmf/crmf.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/crmf.h [275/1469] COPY ../../lib/crmf/crmft.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/crmft.h [276/1469] COPY ../../lib/crmf/cmmfi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/cmmfi.h [277/1469] COPY ../../lib/crmf/cmmfit.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/cmmfit.h [278/1469] COPY ../../lib/crmf/crmfi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/crmfi.h [279/1469] COPY ../../lib/crmf/crmfit.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/crmfit.h [280/1469] STAMP obj/lib/crmf/lib_crmf_exports.actions_rules_copies.stamp [281/1469] STAMP obj/lib/cryptohi/lib_cryptohi_exports.actions_rules_copies.stamp [282/1469] CC obj/lib/dbm/src/dbm.dirent.o [283/1469] CC obj/lib/dbm/src/dbm.h_log2.o [284/1469] COPY ../../lib/ckfw/nssckfw.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssckfw.h [285/1469] COPY ../../lib/ckfw/nssckfwc.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssckfwc.h [286/1469] CC obj/lib/dbm/src/dbm.db.o [287/1469] CC obj/lib/dbm/src/dbm.h_func.o [288/1469] COPY ../../lib/ckfw/nssckfwt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssckfwt.h [289/1469] COPY ../../lib/ckfw/nssckg.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssckg.h [290/1469] COPY ../../lib/ckfw/nssckmdt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssckmdt.h [291/1469] COPY ../../lib/ckfw/nssckt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssckt.h [292/1469] COPY ../../lib/ckfw/ck.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ck.h [293/1469] COPY ../../lib/ckfw/ckfw.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ckfw.h [294/1469] COPY ../../lib/ckfw/ckfwm.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ckfwm.h [295/1469] COPY ../../lib/ckfw/ckfwtm.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ckfwtm.h [296/1469] COPY ../../lib/ckfw/ckmd.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ckmd.h [297/1469] COPY ../../lib/ckfw/ckt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ckt.h [298/1469] COPY ../../lib/ckfw/builtins/nssckbi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssckbi.h [299/1469] COPY ../../lib/certhigh/ocspti.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/ocspti.h [300/1469] COPY ../../lib/base/nssbase.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssbase.h [301/1469] COPY ../../lib/certdb/cert.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/cert.h [302/1469] STAMP obj/lib/ckfw/lib_ckfw_exports.actions_rules_copies.stamp [303/1469] COPY ../../lib/certdb/certdb.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/certdb.h [304/1469] STAMP obj/lib/certhigh/lib_certhigh_exports.actions_rules_copies.stamp [305/1469] COPY ../../lib/certdb/certt.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/certt.h [306/1469] COPY ../../lib/certdb/certi.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/certi.h [307/1469] COPY ../../lib/certdb/certxutl.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/certxutl.h [308/1469] COPY ../../lib/certdb/genname.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/genname.h [309/1469] COPY ../../lib/certdb/xconst.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/xconst.h [310/1469] COPY ../../lib/base/nssbaset.h /usr/src/RPM/BUILD/nss-3.66.0/dist/public/nss/nssbaset.h [311/1469] COPY ../../lib/base/base.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/base.h [312/1469] STAMP obj/lib/certdb/lib_certdb_exports.actions_rules_copies.stamp [313/1469] COPY ../../lib/base/baset.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/baset.h [314/1469] COPY ../../cmd/lib/basicutil.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/basicutil.h [315/1469] CC obj/lib/dbm/src/dbm.mktemp.o [316/1469] COPY ../../cmd/lib/pk11table.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/pk11table.h [317/1469] COPY ../../cmd/lib/secutil.h /usr/src/RPM/BUILD/nss-3.66.0/dist/private/nss/secutil.h [318/1469] STAMP obj/lib/base/lib_base_exports.actions_rules_copies.stamp [319/1469] STAMP obj/cmd/lib/cmd_lib_exports.actions_rules_copies.stamp [320/1469] STAMP obj/nss_exports.compile_depends.stamp [321/1469] STAMP obj/nss_exports.actions_depends.stamp [322/1469] CC obj/lib/dbm/src/dbm.hash_buf.o [323/1469] CC obj/lib/dbm/src/dbm.h_bigkey.o [324/1469] CC obj/lib/util/nssutil.derdec.o [325/1469] CC obj/lib/libpkix/pkix/params/pkixparams.pkix_valparams.o [326/1469] CC obj/lib/libpkix/pkix/params/pkixparams.pkix_resourcelimits.o [327/1469] CC obj/lib/dbm/src/dbm.hash.o [328/1469] CC obj/lib/dbm/src/dbm.h_page.o [329/1469] CC obj/lib/util/nssutil.derenc.o [330/1469] AR libdbm.a [331/1469] CC obj/lib/util/nssutil.dersubr.o [332/1469] CC obj/lib/util/nssutil.errstrs.o [333/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_basicconstraintschecker.o [334/1469] CC obj/lib/libpkix/pkix/crlsel/pkixcrlsel.pkix_comcrlselparams.o [335/1469] CC obj/lib/libpkix/pkix/params/pkixparams.pkix_trustanchor.o [336/1469] CC obj/lib/util/nssutil.oidstring.o [337/1469] CC obj/lib/util/nssutil.nssilock.o [338/1469] CC obj/lib/util/nssutil.pkcs1sig.o [339/1469] CC obj/lib/libpkix/pkix/crlsel/pkixcrlsel.pkix_crlselector.o [340/1469] CC obj/lib/util/nssutil.nssb64d.o [341/1469] CC obj/lib/util/nssutil.nssb64e.o [342/1469] CC obj/lib/util/nssutil.nssrwlk.o [343/1469] AR libpkixcrlsel.a [344/1469] CC obj/lib/util/nssutil.dertime.o [345/1469] CC obj/lib/util/nssutil.secasn1u.o [346/1469] CC obj/lib/util/nssutil.secalgid.o [347/1469] CC obj/lib/util/nssutil.portreg.o [348/1469] CC obj/lib/util/nssutil.secload.o [349/1469] CC obj/lib/util/nssutil.pkcs11uri.o [350/1469] CC obj/lib/util/nssutil.secdig.o [351/1469] CC obj/lib/util/nssutil.secitem.o [352/1469] CC obj/lib/util/nssutil.sectime.o [353/1469] CC obj/lib/util/nssutil.quickder.o [354/1469] CC obj/lib/util/nssutil.templates.o [355/1469] STAMP obj/gtests/util_gtest/util_gtest.compile_depends.stamp [356/1469] CC obj/lib/util/nssutil.secoid.o [357/1469] CC obj/lib/util/nssutil.secasn1e.o [358/1469] CC obj/lib/util/nssutil.secport.o [359/1469] CC obj/lib/util/nssutil.utf8.o [360/1469] CC obj/lib/ssl/ssl.authcert.o [361/1469] CC obj/lib/util/nssutil.secasn1d.o [362/1469] CC obj/lib/util/nssutil.utilmod.o [363/1469] CC obj/lib/ssl/ssl.dtlscon.o [364/1469] CC obj/lib/ssl/ssl.dtls13con.o [365/1469] CC obj/lib/ssl/ssl.cmpcert.o [366/1469] CC obj/lib/util/nssutil.utilpars.o [367/1469] AR libnssutil.a [368/1469] STAMP obj/lib/util/nssutil3.actions_depends.stamp [369/1469] ACTION nssutil3: generate_mapfile_c3520f8b159fb926edc746c920429812 [370/1469] CC obj/coreconf/nssutil3.empty.o [371/1469] STAMP obj/lib/sysinit/nsssysinit_static.compile_depends.stamp [372/1469] CC obj/lib/pki/nsspki.certdecode.o [373/1469] CC obj/lib/sysinit/nsssysinit_static.nsssysinit.o [374/1469] STAMP obj/gtests/sysinit_gtest/sysinit_gtest.compile_depends.stamp [375/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssutil3.so [376/1469] STAMP obj/lib/sysinit/nsssysinit_static.actions_depends.stamp [377/1469] AR libnsssysinit_static.a [378/1469] STAMP obj/lib/sysinit/nsssysinit.actions_depends.stamp [379/1469] CXX obj/gtests/util_gtest/util_gtest.util_gtests.o [380/1469] CC obj/lib/pki/nsspki.certificate.o [381/1469] ACTION nsssysinit: generate_mapfile_1dea05e984d6034669cb5453b66b1aad [382/1469] CC obj/coreconf/nsssysinit.empty.o [383/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnsssysinit.so [384/1469] CC obj/lib/pki/nsspki.cryptocontext.o [385/1469] CXX obj/gtests/util_gtest/util_gtest.util_b64_unittest.o [386/1469] CC obj/lib/smime/smime.cmscinfo.o [387/1469] CC obj/lib/smime/smime.cmscipher.o [388/1469] CXX obj/gtests/util_gtest/util_gtest.util_pkcs11uri_unittest.o [389/1469] CXX obj/gtests/sysinit_gtest/sysinit_gtest.sysinit_gtest.o [390/1469] CXX obj/gtests/util_gtest/util_gtest.util_memcmpzero_unittest.o [391/1469] CC obj/lib/pki/nsspki.pki3hack.o [392/1469] CC obj/lib/smime/smime.cmsdigdata.o [393/1469] CC obj/lib/ssl/ssl.prelib.o [394/1469] CC obj/lib/pki/nsspki.pkibase.o [395/1469] CC obj/lib/ssl/ssl.selfencrypt.o [396/1469] CC obj/lib/smime/smime.cmsdecode.o [397/1469] CC obj/lib/ssl/ssl.ssl3ecc.o [398/1469] CC obj/lib/ssl/ssl.ssl3ext.o [399/1469] CC obj/lib/ssl/ssl.sslbloom.o [400/1469] CC obj/lib/ssl/ssl.sslauth.o [401/1469] CC obj/lib/ssl/ssl.sslcon.o [402/1469] CC obj/lib/ssl/ssl.ssl3gthr.o [403/1469] CC obj/lib/ssl/ssl.sslcert.o [404/1469] CC obj/lib/ssl/ssl.sslerr.o [405/1469] CC obj/lib/ssl/ssl.sslenum.o [406/1469] CC obj/lib/ssl/ssl.ssldef.o [407/1469] CC obj/lib/ssl/ssl.sslerrstrs.o [408/1469] CC obj/lib/ssl/ssl.sslinit.o [409/1469] CC obj/lib/ssl/ssl.sslencode.o [410/1469] CC obj/lib/ssl/ssl.sslmutex.o [411/1469] CC obj/lib/ssl/ssl.sslgrp.o [412/1469] CC obj/lib/ssl/ssl.ssl3exthandle.o [413/1469] CC obj/lib/ssl/ssl.sslprimitive.o [414/1469] CC obj/lib/ssl/ssl.sslnonce.o [415/1469] CC obj/lib/ssl/ssl.sslinfo.o [416/1469] CC obj/lib/ssl/ssl.sslreveal.o [417/1469] CXX obj/gtests/sysinit_gtest/sysinit_gtest.getUserDB_unittest.o [418/1469] CC obj/lib/ssl/ssl.sslver.o [419/1469] CC obj/lib/ssl/ssl.ssltrace.o [420/1469] CC obj/lib/ssl/ssl.sslspec.o [421/1469] CC obj/lib/ssl/ssl.sslsnce.o [422/1469] CC obj/lib/ssl/ssl.tls13hashstate.o [423/1469] CC obj/lib/ssl/ssl.sslsecur.o [424/1469] CXX obj/gtests/util_gtest/util_gtest.util_aligned_malloc_unittest.o [425/1469] CC obj/lib/ssl/ssl.tls13hkdf.o [426/1469] CC obj/lib/ssl/ssl.tls13psk.o [427/1469] CC obj/lib/ssl/ssl.tls13replay.o [428/1469] CC obj/lib/smime/smime.cmsasn1.o [429/1469] CC obj/lib/ssl/ssl.unix_err.o [430/1469] CC obj/lib/ssl/ssl.tls13subcerts.o [431/1469] CC obj/lib/smime/smime.cmsarray.o [432/1469] CC obj/lib/smime/smime.cmsattr.o [433/1469] CC obj/lib/smime/smime.cmsencdata.o [434/1469] CC obj/lib/smime/smime.cmsdigest.o [435/1469] CC obj/lib/smime/smime.cmsencode.o [436/1469] CC obj/lib/ssl/ssl.sslsock.o [437/1469] CC obj/lib/smime/smime.cmsmessage.o [438/1469] CC obj/lib/smime/smime.cmsenvdata.o [439/1469] CC obj/lib/smime/smime.cmspubkey.o [440/1469] CC obj/lib/smime/smime.cmsreclist.o [441/1469] CC obj/lib/ssl/ssl.tls13exthandle.o [442/1469] CC obj/lib/smime/smime.cmsudf.o [443/1469] CC obj/lib/ssl/ssl.tls13ech.o [444/1469] CC obj/lib/smime/smime.cmssiginfo.o [445/1469] CC obj/lib/smime/smime.cmsrecinfo.o [446/1469] CC obj/lib/smime/smime.smimever.o [447/1469] CC obj/lib/smime/smime.smimemessage.o [448/1469] CC obj/lib/ssl/ssl.ssl3con.o [449/1469] CC obj/lib/pki/nsspki.asymmkey.o [450/1469] CC obj/lib/smime/smime.cmssigdata.o [451/1469] CC obj/lib/smime/smime.cmsutil.o [452/1469] CC obj/lib/smime/smime.smimeutil.o [453/1469] CC obj/lib/pki/nsspki.symmkey.o [454/1469] AR libsmime.a [455/1469] CC obj/lib/pkcs7/pkcs7.certread.o [456/1469] CC obj/lib/pki/nsspki.pkistore.o [457/1469] CC obj/lib/pki/nsspki.tdcache.o [458/1469] CC obj/lib/pki/nsspki.trustdomain.o [459/1469] AR libnsspki.a [460/1469] CC obj/lib/pkcs7/pkcs7.p7common.o [461/1469] CC obj/lib/pkcs12/pkcs12.p12creat.o [462/1469] CC obj/lib/pkcs7/pkcs7.p7create.o [463/1469] CC obj/lib/pkcs7/pkcs7.secmime.o [464/1469] CC obj/lib/pk11wrap/pk11wrap.dev3hack.o [465/1469] CC obj/lib/ssl/ssl.tls13con.o [466/1469] AR libssl.a [467/1469] CC obj/lib/pkcs7/pkcs7.p7local.o [468/1469] CC obj/lib/pkcs12/pkcs12.p12plcy.o [469/1469] CC obj/lib/pkcs12/pkcs12.p12dec.o [470/1469] CC obj/lib/pkcs7/pkcs7.p7encode.o [471/1469] CC obj/lib/pkcs7/pkcs7.p7decode.o [472/1469] CC obj/lib/nss/nss_static.nssver.o [473/1469] CC obj/lib/nss/nss_static.nssoptions.o [474/1469] STAMP obj/lib/mozpkix/mozpkix-testlib.actions_depends.stamp [475/1469] AR libpkcs7.a [476/1469] CC obj/lib/pkcs12/pkcs12.p12tmpl.o [477/1469] CC obj/lib/pkcs12/pkcs12.p12local.o [478/1469] CC obj/lib/pkcs12/pkcs12.p12e.o [479/1469] CC obj/lib/nss/nss_static.utilwrap.o [480/1469] CC obj/lib/pk11wrap/pk11wrap.pk11auth.o [481/1469] CC obj/lib/pk11wrap/pk11wrap.pk11err.o [482/1469] CC obj/lib/pk11wrap/pk11wrap.pk11kea.o [483/1469] CC obj/lib/pkcs12/pkcs12.p12d.o [484/1469] AR libpkcs12.a [485/1469] STAMP obj/lib/smime/smime3_deps.actions_depends.stamp [486/1469] CC obj/lib/pk11wrap/pk11wrap.pk11list.o [487/1469] CC obj/lib/pk11wrap/pk11wrap.pk11hpke.o [488/1469] CC obj/lib/pk11wrap/pk11wrap.pk11cxt.o [489/1469] CC obj/lib/pk11wrap/pk11wrap.pk11akey.o [490/1469] CC obj/lib/pk11wrap/pk11wrap.pk11merge.o [491/1469] CC obj/lib/pk11wrap/pk11wrap.pk11nobj.o [492/1469] CC obj/lib/pk11wrap/pk11wrap.pk11cert.o [493/1469] CC obj/lib/pk11wrap/pk11wrap.pk11pk12.o [494/1469] CC obj/lib/pk11wrap/pk11wrap.pk11pbe.o [495/1469] CC obj/lib/pk11wrap/pk11wrap.pk11pqg.o [496/1469] CC obj/lib/pk11wrap/pk11wrap.pk11pars.o [497/1469] STAMP obj/lib/mozpkix/mozpkix-testlib.compile_depends.stamp [498/1469] CC obj/lib/pk11wrap/pk11wrap.pk11sdr.o [499/1469] CC obj/lib/pk11wrap/pk11wrap.pk11util.o [500/1469] CXX obj/gtests/util_gtest/util_gtest.util_utf8_unittest.o [501/1469] CC obj/lib/pk11wrap/pk11wrap.pk11mech.o [502/1469] CC obj/lib/pk11wrap/pk11wrap.pk11obj.o [503/1469] STAMP obj/lib/mozpkix/mozpkix.actions_depends.stamp [504/1469] STAMP obj/lib/mozpkix/mozpkix.compile_depends.stamp [505/1469] CC obj/lib/pk11wrap/pk11wrap.pk11slot.o [506/1469] CC obj/lib/nss/nss_static.nssinit.o [507/1469] AR libnss_static.a [508/1469] CC obj/lib/softoken/softokn.softkver.o [509/1469] CC obj/lib/pk11wrap/pk11wrap.pk11load.o [510/1469] CC obj/lib/softoken/softokn.tlsprf.o [511/1469] STAMP obj/lib/softoken/legacydb/nssdbm.actions_depends.stamp [512/1469] STAMP obj/lib/softoken/legacydb/nssdbm.compile_depends.stamp [513/1469] CC obj/lib/pk11wrap/pk11wrap.pk11skey.o [514/1469] AR libpk11wrap.a [515/1469] CC obj/lib/softoken/softokn.lgglue.o [516/1469] CXX obj/lib/mozpkix/test-lib/mozpkix-testlib.pkixtestalg.o [517/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixbuild.o [518/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_bytearray.o [519/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixc.o [520/1469] CC obj/lib/softoken/softokn.sftkpwd.o [521/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_common.o [522/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixder.o [523/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixnss.o [524/1469] CXX obj/lib/mozpkix/test-lib/mozpkix-testlib.pkixtestutil.o [525/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixtime.o [526/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixcert.o [527/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixnames.o [528/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_bigint.o [529/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixverify.o [530/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_error.o [531/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixocsp.o [532/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixresult.o [533/1469] CXX obj/lib/mozpkix/lib/mozpkix.pkixcheck.o [534/1469] AR /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libmozpkix.a [535/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_certpolicymap.o [536/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_certpolicyqualifier.o [537/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_lifecycle.o [538/1469] CXX obj/lib/mozpkix/test-lib/mozpkix-testlib.pkixtestnss.o [539/1469] AR /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libmozpkix-testlib.a [540/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_monitorlock.o [541/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_mem.o [542/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_certpolicyinfo.o [543/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_mutex.o [544/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_hashtable.o [545/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_primhash.o [546/1469] CC obj/lib/libpkix/pkix/util/pkixutil.pkix_errpaths.o [547/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_object.o [548/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_oid.o [549/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_rwlock.o [550/1469] CC obj/lib/libpkix/pkix_pl_nss/system/pkixsystem.pkix_pl_string.o [551/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_basicconstraints.o [552/1469] AR libpkixsystem.a [553/1469] CC obj/lib/libpkix/pkix/store/pkixstore.pkix_store.o [554/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_crldp.o [555/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_aiamgr.o [556/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_crlentry.o [557/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_ocspcertid.o [558/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_generalname.o [559/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_date.o [560/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_nameconstraints.o [561/1469] CXX obj/gtests/google_test/gtest/src/gtest.gtest-all.o [562/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_cert.o [563/1469] AR libgtest.a [564/1469] STAMP obj/gtests/sysinit_gtest/sysinit_gtest.actions_depends.stamp [565/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_crl.o [566/1469] STAMP obj/gtests/util_gtest/util_gtest.actions_depends.stamp [567/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_ocsprequest.o [568/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_publickey.o [569/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_infoaccess.o [570/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_ocspresponse.o [571/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/sysinit_gtest [572/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_httpcertstore.o [573/1469] CC obj/lib/libpkix/pkix_pl_nss/pki/pkixpki.pkix_pl_x500name.o [574/1469] AR libpkixpki.a [575/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_ldaprequest.o [576/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_colcertstore.o [577/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_ldaptemplates.o [578/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_httpdefaultclient.o [579/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/util_gtest [580/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_nsscontext.o [581/1469] CC obj/lib/libpkix/pkix/top/pkixtop.pkix_build.o [582/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_ldapcertstore.o [583/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_ldapresponse.o [584/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_ldapdefaultclient.o [585/1469] AR libpkixstore.a [586/1469] CC obj/lib/libpkix/pkix/util/pkixutil.pkix_error.o [587/1469] CC obj/lib/libpkix/pkix/top/pkixtop.pkix_lifecycle.o [588/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_pk11certstore.o [589/1469] CC obj/lib/libpkix/pkix/util/pkixutil.pkix_tools.o [590/1469] CC obj/lib/libpkix/pkix_pl_nss/module/pkixmodule.pkix_pl_socket.o [591/1469] CC obj/lib/libpkix/pkix/results/pkixresults.pkix_valresult.o [592/1469] AR libpkixmodule.a [593/1469] CC obj/lib/libpkix/pkix/results/pkixresults.pkix_buildresult.o [594/1469] CC obj/lib/libpkix/pkix/util/pkixutil.pkix_list.o [595/1469] CC obj/lib/libpkix/pkix/top/pkixtop.pkix_validate.o [596/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_expirationchecker.o [597/1469] AR libpkixtop.a [598/1469] CC obj/lib/libpkix/pkix/results/pkixresults.pkix_verifynode.o [599/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_ekuchecker.o [600/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_crlchecker.o [601/1469] CC obj/lib/libpkix/pkix/util/pkixutil.pkix_logger.o [602/1469] AR libpkixutil.a [603/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_certchainchecker.o [604/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_nameconstraintschecker.o [605/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_namechainingchecker.o [606/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_ocspchecker.o [607/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_revocationmethod.o [608/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_revocationchecker.o [609/1469] STAMP obj/lib/libpkix/libpkix.compile_depends.stamp [610/1469] CC obj/lib/libpkix/pkix/results/pkixresults.pkix_policynode.o [611/1469] CC obj/lib/libpkix/pkix/params/pkixparams.pkix_procparams.o [612/1469] AR libpkixresults.a [613/1469] CC obj/lib/libpkix/pkix/certsel/pkixcertsel.pkix_comcertselparams.o [614/1469] AR libpkixparams.a [615/1469] CC obj/lib/jar/jar.jar-ds.o [616/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_signaturechecker.o [617/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_targetcertchecker.o [618/1469] CC obj/lib/freebl/intel-gcm-s_lib.intel-aes.o [619/1469] CC obj/lib/freebl/intel-gcm-s_lib.intel-gcm.o [620/1469] CC obj/lib/jar/jar.jarint.o [621/1469] AR libintel-gcm-s_lib.a [622/1469] CC obj/lib/jar/jar.jar.o [623/1469] CC obj/lib/jar/jar.jarsign.o [624/1469] CC obj/lib/jar/jar.jarfile.o [625/1469] CC obj/lib/jar/jar.jarver.o [626/1469] CC obj/lib/freebl/intel-gcm-wrap_c_lib.intel-gcm-wrap.o [627/1469] AR libjar.a [628/1469] AR libintel-gcm-wrap_c_lib.a [629/1469] CC obj/lib/libpkix/pkix/certsel/pkixcertsel.pkix_certselector.o [630/1469] AR libpkixcertsel.a [631/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11err.o [632/1469] CC obj/lib/libpkix/pkix/checker/pkixchecker.pkix_policychecker.o [633/1469] AR libpkixchecker.a [634/1469] STAMP obj/lib/libpkix/libpkix.actions_depends.stamp [635/1469] CC obj/lib/freebl/verified/hw-acc-crypto-avx.Hacl_Chacha20_Vec128.o [636/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11list.o [637/1469] CC obj/lib/freebl/verified/hw-acc-crypto-avx.Hacl_Poly1305_128.o [638/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11kea.o [639/1469] CC obj/lib/freebl/verified/hw-acc-crypto-avx.Hacl_Chacha20Poly1305_128.o [640/1469] AR libhw-acc-crypto-avx.a [641/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11cxt.o [642/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11hpke.o [643/1469] CC obj/lib/freebl/verified/hw-acc-crypto-avx2.Hacl_Poly1305_256.o [644/1469] CC obj/lib/freebl/verified/hw-acc-crypto-avx2.Hacl_Chacha20_Vec256.o [645/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11mech.o [646/1469] CC obj/lib/freebl/verified/hw-acc-crypto-avx2.Hacl_Chacha20Poly1305_256.o [647/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11merge.o [648/1469] AR libhw-acc-crypto-avx2.a [649/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11nobj.o [650/1469] CC obj/lib/softoken/softokn_static.sftkdhverify.o [651/1469] CC obj/lib/softoken/softokn_static.sftkpars.o [652/1469] CC obj/lib/softoken/softokn_static.pkcs11u.o [653/1469] CC obj/lib/softoken/softokn_static.sftkmessage.o [654/1469] CC obj/lib/softoken/softokn_static.sftkhmac.o [655/1469] CC obj/lib/freebl/freebl_static.freeblver.o [656/1469] CC obj/lib/freebl/freebl_static.blinit.o [657/1469] CC obj/lib/softoken/softokn_static.sdb.o [658/1469] CC obj/lib/freebl/freebl_static.ldvector.o [659/1469] CC obj/lib/softoken/softokn_static.sftkpwd.o [660/1469] CC obj/lib/freebl/freebl_static.hmacct.o [661/1469] CC obj/lib/softoken/softokn_static.sftkike.o [662/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11load.o [663/1469] CC obj/lib/softoken/softokn_static.pkcs11.o [664/1469] CC obj/lib/freebl/freebl_static.md2.o [665/1469] CC obj/lib/freebl/freebl_static.md5.o [666/1469] CC obj/lib/freebl/mpi/freebl_static.mpcpucache.o [667/1469] CC obj/lib/freebl/freebl_static.gcm.o [668/1469] CC obj/lib/freebl/freebl_static.jpake.o [669/1469] CC obj/lib/softoken/softokn_static.sftkdb.o [670/1469] CC obj/lib/freebl/freebl_static.rawhash.o [671/1469] CC obj/lib/freebl/mpi/freebl_static.mpprime.o [672/1469] CC obj/lib/freebl/mpi/freebl_static.mplogic.o [673/1469] CC obj/lib/freebl/freebl_static.shvfy.o [674/1469] CC obj/lib/freebl/mpi/freebl_static.mp_gf2m.o [675/1469] CC obj/lib/freebl/mpi/freebl_static.mpmontg.o [676/1469] CC obj/lib/freebl/freebl_static.sha_fast.o [677/1469] CC obj/lib/freebl/freebl_static.sysrand.o [678/1469] CC obj/lib/freebl/gcm-aes-x86_c_lib.gcm-x86.o [679/1469] CC obj/lib/freebl/freebl_static.tlsprfalg.o [680/1469] CC obj/lib/freebl/freebl_static.pqg.o [681/1469] CC obj/lib/freebl/freebl_static.rsapkcs.o [682/1469] CC obj/lib/freebl/gcm-aes-x86_c_lib.aes-x86.o [683/1469] CC obj/lib/freebl/freebl_static.rsa.o [684/1469] AR libgcm-aes-x86_c_lib.a [685/1469] STAMP obj/lib/freebl/freeblpriv3.actions_depends.stamp [686/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_aff.o [687/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_mont.o [688/1469] CC obj/lib/freebl/freebl_static.fipsfreebl.o [689/1469] ACTION freeblpriv3: generate_mapfile_bc3f0d84eb4f0417c1278ac729b2c56d [690/1469] CC obj/lib/freebl/freebl_static.rijndael.o [691/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_jm.o [692/1469] CC obj/lib/freebl/freebl_static.ecdecode.o [693/1469] CC obj/lib/freebl/freeblpriv3.alghmac.o [694/1469] CC obj/lib/freebl/freeblpriv3.cmac.o [695/1469] CC obj/lib/freebl/freeblpriv3.arcfive.o [696/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_jac.o [697/1469] CC obj/lib/freebl/freebl_static.ec.o [698/1469] CC obj/lib/freebl/freeblpriv3.arcfour.o [699/1469] CC obj/lib/freebl/freeblpriv3.crypto_primitives.o [700/1469] CC obj/lib/freebl/freeblpriv3.aeskeywrap.o [701/1469] CC obj/lib/freebl/mpi/freebl_static.mpi.o [702/1469] CC obj/lib/softoken/softokn_static.pkcs11c.o [703/1469] CC obj/lib/freebl/freeblpriv3.chacha20poly1305.o [704/1469] CC obj/lib/freebl/freeblpriv3.cts.o [705/1469] CC obj/lib/freebl/freeblpriv3.ctr.o [706/1469] CC obj/lib/freebl/freeblpriv3.desblapi.o [707/1469] CC obj/lib/freebl/freeblpriv3.blake2b.o [708/1469] CC obj/lib/freebl/freeblpriv3.dh.o [709/1469] CC obj/lib/freebl/freeblpriv3.des.o [710/1469] CC obj/lib/freebl/ecl/freeblpriv3.ec_naf.o [711/1469] CC obj/lib/freebl/freeblpriv3.ecdecode.o [712/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecl.o [713/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_25519.o [714/1469] CC obj/lib/freebl/freeblpriv3.ec.o [715/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecl_mult.o [716/1469] CC obj/lib/freebl/freeblpriv3.drbg.o [717/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_256.o [718/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_384.o [719/1469] CC obj/lib/freebl/freeblpriv3.dsa.o [720/1469] CC obj/lib/freebl/freeblpriv3.camellia.o [721/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_521.o [722/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_secp521r1.o [723/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_aff.o [724/1469] CC obj/lib/freebl/freeblpriv3.fipsfreebl.o [725/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_jac.o [726/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_mont.o [727/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecl_gf.o [728/1469] CC obj/lib/freebl/freeblpriv3.freeblver.o [729/1469] CC obj/lib/freebl/freeblpriv3.blinit.o [730/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_jm.o [731/1469] CC obj/lib/freebl/freeblpriv3.ldvector.o [732/1469] CC obj/lib/freebl/freeblpriv3.hmacct.o [733/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_256_32.o [734/1469] CC obj/lib/freebl/freeblpriv3.gcm.o [735/1469] CC obj/lib/freebl/freeblpriv3.jpake.o [736/1469] CC obj/lib/freebl/freeblpriv3.md2.o [737/1469] CC obj/lib/freebl/mpi/freeblpriv3.mpcpucache.o [738/1469] CC obj/lib/freebl/freeblpriv3.md5.o [739/1469] CC obj/lib/freebl/mpi/freeblpriv3.mp_gf2m.o [740/1469] CC obj/lib/freebl/mpi/freeblpriv3.mplogic.o [741/1469] CC obj/lib/freebl/mpi/freeblpriv3.mpprime.o [742/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_secp384r1.o [743/1469] CC obj/lib/freebl/freeblpriv3.rawhash.o [744/1469] CC obj/lib/freebl/freeblpriv3.shvfy.o [745/1469] CC obj/lib/freebl/mpi/freeblpriv3.mpmontg.o [746/1469] CC obj/lib/freebl/freeblpriv3.tlsprfalg.o [747/1469] CC obj/lib/freebl/freeblpriv3.sysrand.o [748/1469] CC obj/lib/freebl/freeblpriv3.sha_fast.o [749/1469] CC obj/lib/freebl/freeblpriv3.nsslowhash.o [750/1469] CC obj/lib/freebl/freeblpriv3.arcfour-amd64-gas.o [751/1469] CC obj/lib/freebl/freeblpriv3.rsa.o [752/1469] CC obj/lib/freebl/mpi/freeblpriv3.mpi_amd64_common.o [753/1469] CC obj/lib/freebl/mpi/freeblpriv3.mpi_amd64.o [754/1469] CC obj/lib/freebl/freeblpriv3.rijndael.o [755/1469] CC obj/lib/freebl/ecl/freeblpriv3.curve25519_64.o [756/1469] CC obj/lib/freebl/freeblpriv3.pqg.o [757/1469] CC obj/lib/freebl/freeblpriv3.stubs.o [758/1469] CC obj/lib/freebl/verified/freeblpriv3.Hacl_Chacha20Poly1305_32.o [759/1469] CC obj/lib/freebl/verified/freeblpriv3.Hacl_Chacha20.o [760/1469] CC obj/lib/freebl/verified/freeblpriv3.Hacl_Poly1305_32.o [761/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_secp521r1.o [762/1469] CC obj/lib/freebl/verified/freeblpriv3.Hacl_Curve25519_51.o [763/1469] CC obj/coreconf/freeblpriv3.empty.o [764/1469] CC obj/lib/freebl/freeblpriv3.rsapkcs.o [765/1469] CC obj/lib/freebl/ecl/freebl_static.ec_naf.o [766/1469] CC obj/lib/freebl/ecl/freeblpriv3.ecp_secp384r1.o [767/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_25519.o [768/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_256.o [769/1469] CC obj/lib/freebl/freebl_static.dsa.o [770/1469] CC obj/lib/freebl/deprecated/freeblpriv3.alg2268.o [771/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_521.o [772/1469] CC obj/lib/freebl/freebl_static.arcfive.o [773/1469] CC obj/lib/freebl/ecl/freebl_static.ecl_mult.o [774/1469] CC obj/lib/freebl/deprecated/freeblpriv3.seed.o [775/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_384.o [776/1469] CC obj/lib/freebl/freebl_static.alghmac.o [777/1469] CC obj/lib/freebl/freebl_static.cmac.o [778/1469] CC obj/lib/freebl/freebl_static.arcfour.o [779/1469] CC obj/lib/freebl/freebl_static.crypto_primitives.o [780/1469] CC obj/lib/freebl/freebl_static.chacha20poly1305.o [781/1469] CC obj/lib/freebl/freebl_static.ctr.o [782/1469] CC obj/lib/freebl/freebl_static.cts.o [783/1469] CC obj/lib/freebl/ecl/freebl_static.ecp_256_32.o [784/1469] CC obj/lib/freebl/ecl/freebl_static.ecl.o [785/1469] CC obj/lib/freebl/freebl_static.desblapi.o [786/1469] CC obj/lib/freebl/freebl_static.des.o [787/1469] CC obj/lib/freebl/mpi/freeblpriv3.mpi.o [788/1469] CC obj/lib/freebl/freebl_static.arcfour-amd64-gas.o [789/1469] CC obj/lib/freebl/mpi/freebl_static.mpi_amd64.o [790/1469] CC obj/lib/freebl/mpi/freebl_static.mpi_amd64_common.o [791/1469] CC obj/lib/freebl/freebl_static.blake2b.o [792/1469] CC obj/lib/freebl/freebl_static.dh.o [793/1469] CC obj/lib/freebl/ecl/freebl_static.curve25519_64.o [794/1469] CC obj/lib/freebl/freebl_static.drbg.o [795/1469] CC obj/lib/freebl/freebl_static.aeskeywrap.o [796/1469] CC obj/lib/freebl/ecl/freebl_static.ecl_gf.o [797/1469] CC obj/lib/freebl/mpi/freeblpriv3.mp_comba.o [798/1469] CC obj/lib/freebl/verified/freebl_static.Hacl_Poly1305_32.o [799/1469] CC obj/lib/freebl/verified/freebl_static.Hacl_Chacha20.o [800/1469] CC obj/lib/softoken/softokn_static.fipstest.o [801/1469] CC obj/lib/freebl/verified/freebl_static.Hacl_Chacha20Poly1305_32.o [802/1469] CC obj/lib/freebl/freeblpriv3.sha512.o [803/1469] CC obj/lib/freebl/freebl_static.camellia.o [804/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libfreeblpriv3.so [805/1469] CC obj/lib/softoken/softokn_static.lowkey.o [806/1469] CC obj/lib/softoken/softokn_static.padbuf.o [807/1469] CC obj/lib/freebl/deprecated/freebl_static.alg2268.o [808/1469] CC obj/lib/softoken/softokn_static.softkver.o [809/1469] CC obj/lib/freebl/verified/freebl_static.Hacl_Curve25519_51.o [810/1469] CC obj/lib/softoken/softokn_static.fipsaudt.o [811/1469] CC obj/lib/softoken/softokn_static.jpakesftk.o [812/1469] CC obj/lib/softoken/softokn_static.tlsprf.o [813/1469] CC obj/lib/freebl/deprecated/freebl_static.seed.o [814/1469] CC obj/lib/softoken/softokn_static.kbkdf.o [815/1469] CC obj/lib/pk11wrap/pk11wrap_static.dev3hack.o [816/1469] CC obj/lib/softoken/softokn_static.lgglue.o [817/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11auth.o [818/1469] CC obj/lib/softoken/softokn_static.lowpbe.o [819/1469] CC obj/lib/softoken/softokn_static.fipstokn.o [820/1469] AR libsoftokn_static.a [821/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11pk12.o [822/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11sdr.o [823/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11pqg.o [824/1469] CC obj/lib/freebl/freebl_static.sha512.o [825/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11pbe.o [826/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11cert.o [827/1469] CC obj/lib/softoken/legacydb/nssdbm.lgdestroy.o [828/1469] CC obj/lib/softoken/softokn.lowkey.o [829/1469] CC obj/lib/softoken/softokn.padbuf.o [830/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11akey.o [831/1469] CC obj/lib/freebl/mpi/freebl_static.mp_comba.o [832/1469] AR libfreebl_static.a [833/1469] CC obj/lib/softoken/softokn.lowpbe.o [834/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11skey.o [835/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11pars.o [836/1469] CC obj/lib/softoken/softokn.sftkdhverify.o [837/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11util.o [838/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11obj.o [839/1469] CC obj/lib/softoken/softokn.pkcs11u.o [840/1469] STAMP obj/lib/freebl/freebl3.actions_depends.stamp [841/1469] CC obj/lib/softoken/softokn.sftkmessage.o [842/1469] CC obj/lib/softoken/softokn.sftkhmac.o [843/1469] CC obj/lib/softoken/softokn.fipsaudt.o [844/1469] ACTION freebl3: generate_mapfile_9c9068a5fd4646d953a29a92bbd3e903 [845/1469] CC obj/lib/pk11wrap/pk11wrap_static.pk11slot.o [846/1469] CC obj/lib/softoken/softokn.fipstest.o [847/1469] AR libpk11wrap_static.a [848/1469] CC obj/lib/softoken/softokn.sdb.o [849/1469] CC obj/coreconf/freebl3.empty.o [850/1469] CC obj/lib/softoken/softokn.sftkpars.o [851/1469] CC obj/lib/freebl/freebl3.lowhash_vector.o [852/1469] CC obj/lib/softoken/softokn.pkcs11.o [853/1469] CC obj/lib/softoken/softokn.sftkike.o [854/1469] CC obj/lib/softoken/legacydb/nssdbm.lgfips.o [855/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libfreebl3.so [856/1469] CC obj/lib/softoken/softokn.jpakesftk.o [857/1469] CC obj/lib/softoken/softokn.sftkdb.o [858/1469] CC obj/lib/softoken/legacydb/nssdbm.lgfind.o [859/1469] CC obj/lib/softoken/legacydb/nssdbm.lowkey.o [860/1469] CC obj/lib/softoken/legacydb/nssdbm.lowcert.o [861/1469] CC obj/lib/softoken/legacydb/nssdbm.lgutil.o [862/1469] CC obj/lib/softoken/legacydb/nssdbm.dbmshim.o [863/1469] CC obj/lib/softoken/legacydb/nssdbm.lginit.o [864/1469] CC obj/lib/softoken/softokn.kbkdf.o [865/1469] CC obj/lib/softoken/legacydb/nssdbm.pk11db.o [866/1469] CC obj/lib/dev/nssdev.devslot.o [867/1469] CC obj/lib/softoken/softokn.fipstokn.o [868/1469] CC obj/lib/softoken/legacydb/nssdbm.keydb.o [869/1469] CC obj/lib/dev/nssdev.devutil.o [870/1469] CC obj/lib/softoken/legacydb/nssdbm.lgcreate.o [871/1469] CC obj/lib/freebl/freebl.loader.o [872/1469] AR libfreebl.a [873/1469] CC obj/lib/cryptohi/cryptohi.sechash.o [874/1469] CC obj/lib/cryptohi/cryptohi.secsign.o [875/1469] CC obj/lib/cryptohi/cryptohi.secvfy.o [876/1469] CC obj/lib/crmf/crmf.asn1cmn.o [877/1469] CC obj/lib/dev/nssdev.devtoken.o [878/1469] CC obj/lib/softoken/softokn.pkcs11c.o [879/1469] AR libsoftokn.a [880/1469] STAMP obj/lib/softoken/softokn3.actions_depends.stamp [881/1469] ACTION softokn3: generate_mapfile_5391cd7af2dd01bae999b67d9fa7283e [882/1469] CC obj/coreconf/softokn3.empty.o [883/1469] CC obj/lib/ckfw/nssckfw.crypto.o [884/1469] CC obj/lib/crmf/crmf.cmmfasn1.o [885/1469] CC obj/lib/dev/nssdev.ckhelper.o [886/1469] CC obj/lib/cryptohi/cryptohi.dsautil.o [887/1469] AR libnssdev.a [888/1469] CC obj/lib/softoken/legacydb/nssdbm.pcertdb.o [889/1469] CC obj/lib/crmf/crmf.challcli.o [890/1469] CC obj/lib/softoken/legacydb/nssdbm.lgattr.o [891/1469] AR libnssdbm.a [892/1469] STAMP obj/lib/softoken/legacydb/nssdbm3.actions_depends.stamp [893/1469] CC obj/lib/crmf/crmf.cmmfchal.o [894/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libsoftokn3.so [895/1469] ACTION nssdbm3: generate_mapfile_7395db4faed994bc76a266255cbec6f2 [896/1469] CC obj/lib/crmf/crmf.crmfenc.o [897/1469] CC obj/lib/crmf/crmf.crmfdec.o [898/1469] CC obj/coreconf/nssdbm3.empty.o [899/1469] CC obj/lib/crmf/crmf.cmmfrec.o [900/1469] CC obj/lib/crmf/crmf.crmftmpl.o [901/1469] CC obj/lib/crmf/crmf.cmmfresp.o [902/1469] CC obj/lib/crmf/crmf.crmfget.o [903/1469] CC obj/lib/crmf/crmf.encutil.o [904/1469] CC obj/lib/cryptohi/cryptohi.seckey.o [905/1469] AR libcryptohi.a [906/1469] CC obj/lib/crmf/crmf.crmfcont.o [907/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssdbm3.so [908/1469] CC obj/lib/crmf/crmf.respcli.o [909/1469] CC obj/lib/crmf/crmf.crmfreq.o [910/1469] CC obj/lib/crmf/crmf.crmfpop.o [911/1469] CC obj/lib/ckfw/nssckfw.find.o [912/1469] CC obj/lib/ckfw/nssckfw.hash.o [913/1469] CC obj/lib/ckfw/nssckfw.instance.o [914/1469] CC obj/lib/ckfw/nssckfw.mutex.o [915/1469] CC obj/lib/ckfw/nssckfw.object.o [916/1469] CC obj/lib/crmf/crmf.respcmn.o [917/1469] CC obj/lib/crmf/crmf.servget.o [918/1469] CC obj/lib/ckfw/nssckfw.sessobj.o [919/1469] AR libcrmf.a [920/1469] CC obj/lib/certdb/certdb.certdb.o [921/1469] CC obj/lib/ckfw/nssckfw.mechanism.o [922/1469] CC obj/lib/certhigh/certhi.certreq.o [923/1469] CC obj/lib/ckfw/nssckfw.slot.o [924/1469] CC obj/lib/ckfw/nssckfw.session.o [925/1469] CC obj/lib/certhigh/certhi.crlv2.o [926/1469] CC obj/lib/certhigh/certhi.certhtml.o [927/1469] CC obj/lib/certhigh/certhi.xcrldist.o [928/1469] CC obj/lib/certhigh/certhi.certhigh.o [929/1469] CC obj/lib/ckfw/nssckfw.token.o [930/1469] CC obj/lib/certhigh/certhi.ocspsig.o [931/1469] CC obj/lib/certdb/certdb.certxutl.o [932/1469] CC obj/lib/certdb/certdb.certv3.o [933/1469] CC obj/lib/base/nssb.arena.o [934/1469] CC obj/lib/certhigh/certhi.certvfypkix.o [935/1469] CC obj/lib/certhigh/certhi.certvfy.o [936/1469] CC obj/lib/certdb/certdb.xauthkid.o [937/1469] CC obj/lib/certdb/certdb.secname.o [938/1469] CC obj/lib/certdb/certdb.alg1485.o [939/1469] CC obj/lib/base/nssb.errorval.o [940/1469] CC obj/lib/certdb/certdb.xbsconst.o [941/1469] CC obj/lib/certdb/certdb.xconst.o [942/1469] CC obj/lib/ckfw/nssckfw.wrap.o [943/1469] AR libnssckfw.a [944/1469] CC obj/lib/certdb/certdb.polcyxtn.o [945/1469] CC obj/lib/certdb/certdb.genname.o [946/1469] CC obj/lib/base/nssb.hash.o [947/1469] CC obj/lib/base/nssb.error.o [948/1469] CC obj/lib/base/nssb.hashops.o [949/1469] STAMP obj/gtests/mozpkix_gtest/mozpkix_gtest.compile_depends.stamp [950/1469] CC obj/lib/base/nssb.item.o [951/1469] CC obj/lib/base/nssb.libc.o [952/1469] CC obj/lib/certdb/certdb.stanpcertdb.o [953/1469] CC obj/lib/base/nssb.tracker.o [954/1469] CC obj/lib/certhigh/certhi.ocsp.o [955/1469] AR libcerthi.a [956/1469] CC obj/lib/base/nssb.list.o [957/1469] CC obj/lib/base/nssb.utf8.o [958/1469] AR libnssb.a [959/1469] STAMP obj/lib/ckfw/builtins/testlib/nssckbi-testlib.actions_depends.stamp [960/1469] ACTION nssckbi-testlib: generate_mapfile_f00082b443c06e32976e601d7a8190a8 [961/1469] CC obj/lib/certdb/certdb.crl.o [962/1469] ACTION nssckbi-testlib: generate_certdata-testlib_c_f00082b443c06e32976e601d7a8190a8 [963/1469] STAMP obj/lib/ckfw/builtins/testlib/nssckbi-testlib.actions_rules_copies.stamp [964/1469] AR libcertdb.a [965/1469] STAMP obj/lib/nss/nss3_deps.actions_depends.stamp [966/1469] STAMP obj/lib/nss/nss3.actions_depends.stamp [967/1469] ACTION nss3: generate_mapfile_94d3f45175da5e50f51b258b0315ff40 [968/1469] CC obj/coreconf/nss3.empty.o [969/1469] CC obj/lib/ckfw/builtins/nssckbi-testlib.anchor.o [970/1469] CC obj/lib/ckfw/builtins/nssckbi-testlib.bfind.o [971/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnss3.so [972/1469] STAMP obj/lib/ssl/ssl3.actions_depends.stamp [973/1469] CC obj/lib/ckfw/builtins/nssckbi-testlib.binst.o [974/1469] STAMP obj/lib/smime/smime3.actions_depends.stamp [975/1469] ACTION ssl3: generate_mapfile_60b033c67bd90b04a67935aaf4f25d34 [976/1469] CXX obj/cpputil/cpputil.databuffer.o [977/1469] CXX obj/gtests/common/mozpkix_gtest.gtests.o [978/1469] STAMP obj/gtests/smime_gtest/smime_gtest.compile_depends.stamp [979/1469] ACTION smime3: generate_mapfile_96adfdd67bc7ad205377c2badca9b1c4 [980/1469] CC obj/coreconf/ssl3.empty.o [981/1469] STAMP obj/gtests/der_gtest/der_gtest.compile_depends.stamp [982/1469] STAMP obj/cmd/signtool/signtool.compile_depends.stamp [983/1469] STAMP obj/cmd/tests/baddbdir.compile_depends.stamp [984/1469] STAMP obj/cmd/symkeyutil/symkeyutil.compile_depends.stamp [985/1469] CC obj/cmd/signtool/signtool.list.o [986/1469] CC obj/cmd/signtool/signtool.certgen.o [987/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixcheck_CheckIssuer_tests.o [988/1469] CC obj/cmd/signtool/signtool.sign.o [989/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixc_tests.o [990/1469] CC obj/cmd/signtool/signtool.javascript.o [991/1469] CC obj/cmd/signtool/signtool.signtool.o [992/1469] CC obj/cmd/tests/baddbdir.baddbdir.o [993/1469] CC obj/cmd/signtool/signtool.zip.o [994/1469] CC obj/cmd/signtool/signtool.verify.o [995/1469] STAMP obj/cmd/btoa/btoa.compile_depends.stamp [996/1469] CC obj/cmd/signtool/signtool.util.o [997/1469] CC obj/cmd/btoa/btoa.btoa.o [998/1469] STAMP obj/gtests/certdb_gtest/certdb_gtest.compile_depends.stamp [999/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libssl3.so [1000/1469] STAMP obj/gtests/smime_gtest/smime_gtest.actions_depends.stamp [1001/1469] STAMP obj/gtests/der_gtest/der_gtest.actions_depends.stamp [1002/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixcert_extension_tests.o [1003/1469] CXX obj/gtests/smime_gtest/smime_gtest.smime_unittest.o [1004/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixcert_signature_algorithm_tests.o [1005/1469] STAMP obj/gtests/cryptohi_gtest/cryptohi_gtest.compile_depends.stamp [1006/1469] CXX obj/gtests/common/smime_gtest.gtests.o [1007/1469] CXX obj/gtests/certdb_gtest/certdb_gtest.decode_certs_unittest.o [1008/1469] CXX obj/gtests/common/certdb_gtest.gtests.o [1009/1469] STAMP obj/gtests/cryptohi_gtest/cryptohi_gtest.actions_depends.stamp [1010/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixbuild_tests.o [1011/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/smime_gtest [1012/1469] CXX obj/gtests/der_gtest/der_gtest.der_quickder_unittest.o [1013/1469] STAMP obj/gtests/certhigh_gtest/certhigh_gtest.compile_depends.stamp [1014/1469] STAMP obj/gtests/certhigh_gtest/certhigh_gtest.actions_depends.stamp [1015/1469] CXX obj/gtests/der_gtest/der_gtest.p12_import_unittest.o [1016/1469] CC obj/coreconf/smime3.empty.o [1017/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libsmime3.so [1018/1469] STAMP obj/gtests/certdb_gtest/certdb_gtest.actions_depends.stamp [1019/1469] CC obj/lib/ckfw/builtins/nssckbi-testlib.bobject.o [1020/1469] CC obj/lib/ckfw/builtins/nssckbi-testlib.bsession.o [1021/1469] CC obj/lib/ckfw/builtins/nssckbi-testlib.bslot.o [1022/1469] CXX obj/gtests/common/der_gtest.gtests.o [1023/1469] CC obj/lib/ckfw/builtins/nssckbi-testlib.ckbiver.o [1024/1469] CC obj/lib/ckfw/builtins/nssckbi-testlib.constants.o [1025/1469] CC obj/lib/ckfw/builtins/nssckbi-testlib.btoken.o [1026/1469] CC obj/lib/ckfw/builtins/testlib/obj/lib/ckfw/builtins/testlib/nssckbi-testlib.gen/nssckbi-testlib.certdata-testlib.o [1027/1469] CC obj/coreconf/nssckbi-testlib.empty.o [1028/1469] CXX obj/gtests/common/cryptohi_gtest.gtests.o [1029/1469] CXX obj/gtests/certdb_gtest/certdb_gtest.cert_unittest.o [1030/1469] CXX obj/gtests/der_gtest/der_gtest.der_getint_unittest.o [1031/1469] CXX obj/gtests/certhigh_gtest/certhigh_gtest.certhigh_unittest.o [1032/1469] CXX obj/gtests/common/certhigh_gtest.gtests.o [1033/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixcheck_CheckValidity_tests.o [1034/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixcheck_CheckExtendedKeyUsage_tests.o [1035/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixcheck_CheckKeyUsage_tests.o [1036/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixcheck_ParseValidity_tests.o [1037/1469] STAMP obj/lib/ckfw/builtins/nssckbi.actions_depends.stamp [1038/1469] ACTION nssckbi: generate_mapfile_61ec98349dbf3862303940d47ec710bc [1039/1469] ACTION nssckbi: generate_certdata_c_61ec98349dbf3862303940d47ec710bc [1040/1469] STAMP obj/lib/ckfw/builtins/nssckbi.actions_rules_copies.stamp [1041/1469] CXX obj/gtests/cryptohi_gtest/cryptohi_gtest.cryptohi_unittest.o [1042/1469] CC obj/lib/ckfw/builtins/nssckbi.bfind.o [1043/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixcheck_TLSFeaturesSatisfiedInternal_tests.o [1044/1469] CC obj/lib/ckfw/builtins/nssckbi.binst.o [1045/1469] CC obj/lib/ckfw/builtins/nssckbi.anchor.o [1046/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixcheck_CheckSignatureAlgorithm_tests.o [1047/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi-testlib.so [1048/1469] CC obj/lib/ckfw/builtins/nssckbi.bsession.o [1049/1469] CC obj/lib/ckfw/builtins/nssckbi.bobject.o [1050/1469] CC obj/lib/ckfw/builtins/nssckbi.bslot.o [1051/1469] CC obj/lib/ckfw/builtins/nssckbi.ckbiver.o [1052/1469] CC obj/lib/ckfw/builtins/nssckbi.btoken.o [1053/1469] CC obj/lib/ckfw/builtins/nssckbi.constants.o [1054/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixgtest.o [1055/1469] CC obj/coreconf/nssckbi.empty.o [1056/1469] STAMP obj/gtests/mozpkix_gtest/mozpkix_gtest.actions_depends.stamp [1057/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/der_gtest [1058/1469] CC obj/lib/ckfw/builtins/obj/lib/ckfw/builtins/nssckbi.gen/nssckbi.certdata.o [1059/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/cryptohi_gtest [1060/1469] CXX obj/gtests/certdb_gtest/certdb_gtest.alg1485_unittest.o [1061/1469] CXX obj/cpputil/cpputil.dummy_io_fwd.o [1062/1469] CXX obj/cpputil/cpputil.dummy_io.o [1063/1469] STAMP obj/gtests/freebl_gtest/freebl_gtest_deps.actions_depends.stamp [1064/1469] STAMP obj/gtests/freebl_gtest/freebl_gtest_deps.compile_depends.stamp [1065/1469] STAMP obj/gtests/freebl_gtest/blake2b_gtest.actions_depends.stamp [1066/1469] STAMP obj/gtests/freebl_gtest/blake2b_gtest.compile_depends.stamp [1067/1469] STAMP obj/gtests/freebl_gtest/freebl_gtest.actions_depends.stamp [1068/1469] STAMP obj/gtests/freebl_gtest/prng_gtest.compile_depends.stamp [1069/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certhigh_gtest [1070/1469] CXX obj/cpputil/cpputil.tls_parser.o [1071/1469] STAMP obj/gtests/freebl_gtest/prng_gtest.actions_depends.stamp [1072/1469] STAMP obj/gtests/freebl_gtest/freebl_gtest.compile_depends.stamp [1073/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certdb_gtest [1074/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so [1075/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixder_input_tests.o [1076/1469] STAMP obj/nss_libs.actions_depends.stamp [1077/1469] CXX obj/gtests/freebl_gtest/freebl_gtest.dh_unittest.o [1078/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixder_universal_types_tests.o [1079/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixder_pki_types_tests.o [1080/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixocsp_CreateEncodedOCSPRequest_tests.o [1081/1469] CXX obj/gtests/freebl_gtest/freebl_gtest.ecl_unittest.o [1082/1469] STAMP obj/cmd/addbuiltin/addbuiltin.compile_depends.stamp [1083/1469] CC obj/cmd/addbuiltin/addbuiltin.addbuiltin.o [1084/1469] AR libcpputil.a [1085/1469] STAMP obj/cmd/vfychain/vfychain.compile_depends.stamp [1086/1469] CXX obj/gtests/freebl_gtest/freebl_gtest.cmac_unittests.o [1087/1469] STAMP obj/gtests/pk11_gtest/pk11_gtest.compile_depends.stamp [1088/1469] CC obj/cmd/vfychain/vfychain.vfychain.o [1089/1469] CXX obj/gtests/freebl_gtest/freebl_gtest.rsa_unittest.o [1090/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixocsp_VerifyEncodedOCSPResponse.o [1091/1469] CXX obj/gtests/common/freebl_gtest.gtests.o [1092/1469] CXX obj/gtests/freebl_gtest/freebl_gtest.mpi_unittest.o [1093/1469] CXX obj/gtests/freebl_gtest/freebl_gtest.ghash_unittest.o [1094/1469] CXX obj/gtests/freebl_gtest/prng_gtest.prng_kat_unittest.o [1095/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/freebl_gtest [1096/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/prng_gtest [1097/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_aeskeywrappad_unittest.o [1098/1469] STAMP obj/gtests/ssl_gtest/ssl_gtest.actions_depends.stamp [1099/1469] STAMP obj/gtests/ssl_gtest/ssl_gtest.compile_depends.stamp [1100/1469] CC obj/gtests/ssl_gtest/ssl_gtest.libssl_internals.o [1101/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_cipherop_unittest.o [1102/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.bloomfilter_unittest.o [1103/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_cbc_unittest.o [1104/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_aes_cmac_unittest.o [1105/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_aeskeywrap_unittest.o [1106/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_aead_unittest.o [1107/1469] CXX obj/gtests/mozpkix_gtest/mozpkix_gtest.pkixnames_tests.o [1108/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/mozpkix_gtest [1109/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_agent_unittest.o [1110/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.selfencrypt_unittest.o [1111/1469] CXX obj/gtests/freebl_gtest/blake2b_gtest.blake2b_unittest.o [1112/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/blake2b_gtest [1113/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_cipherorder_unittest.o [1114/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_0rtt_unittest.o [1115/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_cert_ext_unittest.o [1116/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_debug_env_unittest.o [1117/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_damage_unittest.o [1118/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_ciphersuite_unittest.o [1119/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_ems_unittest.o [1120/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_custext_unittest.o [1121/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_dhe_unittest.o [1122/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_exporter_unittest.o [1123/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_auth_unittest.o [1124/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_drop_unittest.o [1125/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_gtest.o [1126/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_ecdh_unittest.o [1127/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_gather_unittest.o [1128/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_fragment_unittest.o [1129/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_misc_unittest.o [1130/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_keyupdate_unittest.o [1131/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_fuzz_unittest.o [1132/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_masking_unittest.o [1133/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_recordsep_unittest.o [1134/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_record_unittest.o [1135/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_extension_unittest.o [1136/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_hrr_unittest.o [1137/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_renegotiation_unittest.o [1138/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_loopback_unittest.o [1139/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_skip_unittest.o [1140/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_staticrsa_unittest.o [1141/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_tls13compat_unittest.o [1142/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.test_io.o [1143/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_v2_client_hello_unittest.o [1144/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_recordsize_unittest.o [1145/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_resumption_unittest.o [1146/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_version_unittest.o [1147/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.tls_filter.o [1148/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.tls_agent.o [1149/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.tls_protect.o [1150/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.tls_connect.o [1151/1469] STAMP obj/gtests/pkcs11testmodule/pkcs11testmodule.actions_depends.stamp [1152/1469] STAMP obj/gtests/pkcs11testmodule/pkcs11testmodule.compile_depends.stamp [1153/1469] CXX obj/gtests/pkcs11testmodule/pkcs11testmodule.pkcs11testmodule.o [1154/1469] STAMP obj/gtests/softoken_gtest/softoken_gtest.actions_depends.stamp [1155/1469] SOLINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libpkcs11testmodule.so [1156/1469] STAMP obj/gtests/pk11_gtest/pk11_gtest.actions_depends.stamp [1157/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_versionpolicy_unittest.o [1158/1469] STAMP obj/gtests/softoken_gtest/softoken_gtest.compile_depends.stamp [1159/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.tls_subcerts_unittest.o [1160/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.ssl_keylog_unittest.o [1161/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.tls_hkdf_unittest.o [1162/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.tls_psk_unittest.o [1163/1469] CXX obj/gtests/ssl_gtest/ssl_gtest.tls_ech_unittest.o [1164/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_des_unittest.o [1165/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_der_private_key_import_unittest.o [1166/1469] CXX obj/gtests/softoken_gtest/softoken_gtest.softoken_nssckbi_testlib_gtest.o [1167/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ssl_gtest [1168/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_aes_gcm_unittest.o [1169/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_chacha20poly1305_unittest.o [1170/1469] CXX obj/gtests/softoken_gtest/softoken_gtest.softoken_gtest.o [1171/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/softoken_gtest [1172/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_hkdf_unittest.o [1173/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_encrypt_derive_unittest.o [1174/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_find_certs_unittest.o [1175/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_hmac_unittest.o [1176/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_keygen.o [1177/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_ike_unittest.o [1178/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_kbkdf.o [1179/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_key_unittest.o [1180/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_module_unittest.o [1181/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_import_unittest.o [1182/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_prf_unittest.o [1183/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_prng_unittest.o [1184/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_pbkdf2_unittest.o [1185/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_curve25519_unittest.o [1186/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_seed_cbc_unittest.o [1187/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_signature_test.o [1188/1469] CXX obj/gtests/common/pk11_gtest.gtests.o [1189/1469] STAMP obj/nss-tool/nss.compile_depends.stamp [1190/1469] CXX obj/nss-tool/common/nss.argparse.o [1191/1469] CXX obj/nss-tool/common/nss.util.o [1192/1469] CXX obj/nss-tool/db/nss.dbtool.o [1193/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_dsa_unittest.o [1194/1469] CXX obj/nss-tool/enc/nss.enctool.o [1195/1469] CXX obj/nss-tool/digest/nss.digesttool.o [1196/1469] CC obj/cmd/lib/sectool.basicutil.o [1197/1469] CC obj/cmd/lib/sectool.derprint.o [1198/1469] CXX obj/nss-tool/nss.nss_tool.o [1199/1469] CC obj/cmd/lib/sectool.ffs.o [1200/1469] CC obj/cmd/lib/sectool.moreoids.o [1201/1469] CC obj/cmd/lib/sectool.pk11table.o [1202/1469] CC obj/cmd/lib/sectool.pppolicy.o [1203/1469] CC obj/cmd/lib/sectool.secpwd.o [1204/1469] STAMP obj/nss-tool/hw-support.compile_depends.stamp [1205/1469] CC obj/nss-tool/hw-support.hw-support.o [1206/1469] STAMP obj/cmd/vfyserv/vfyserv.compile_depends.stamp [1207/1469] CC obj/cmd/vfyserv/vfyserv.vfyutil.o [1208/1469] CC obj/cmd/vfyserv/vfyserv.vfyserv.o [1209/1469] STAMP obj/gtests/nss_bogo_shim/nss_bogo_shim.compile_depends.stamp [1210/1469] CC obj/cmd/lib/sectool.secutil.o [1211/1469] CXX obj/gtests/nss_bogo_shim/nss_bogo_shim.nsskeys.o [1212/1469] AR /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libsectool.a [1213/1469] STAMP obj/cmd/signtool/signtool.actions_depends.stamp [1214/1469] STAMP obj/cmd/tests/baddbdir.actions_depends.stamp [1215/1469] STAMP obj/cmd/symkeyutil/symkeyutil.actions_depends.stamp [1216/1469] STAMP obj/cmd/btoa/btoa.actions_depends.stamp [1217/1469] STAMP obj/cmd/bltest/bltest.actions_depends.stamp [1218/1469] STAMP obj/cmd/addbuiltin/addbuiltin.actions_depends.stamp [1219/1469] STAMP obj/cmd/vfychain/vfychain.actions_depends.stamp [1220/1469] STAMP obj/cmd/vfyserv/vfyserv.actions_depends.stamp [1221/1469] STAMP obj/nss-tool/nss.actions_depends.stamp [1222/1469] STAMP obj/nss_static_libs.actions_depends.stamp [1223/1469] STAMP obj/nss-tool/hw-support.actions_depends.stamp [1224/1469] STAMP obj/gtests/nss_bogo_shim/nss_bogo_shim.actions_depends.stamp [1225/1469] CXX obj/gtests/nss_bogo_shim/nss_bogo_shim.config.o [1226/1469] STAMP obj/cmd/tstclnt/tstclnt.actions_depends.stamp [1227/1469] STAMP obj/cmd/tests/remtest.compile_depends.stamp [1228/1469] STAMP obj/cmd/tstclnt/tstclnt.compile_depends.stamp [1229/1469] CXX obj/gtests/nss_bogo_shim/nss_bogo_shim.nss_bogo_shim.o [1230/1469] STAMP obj/cmd/tests/secmodtest.compile_depends.stamp [1231/1469] STAMP obj/cmd/tests/secmodtest.actions_depends.stamp [1232/1469] CC obj/cmd/tests/secmodtest.secmodtest.o [1233/1469] STAMP obj/cmd/tests/encodeinttest.actions_depends.stamp [1234/1469] STAMP obj/cmd/tests/encodeinttest.compile_depends.stamp [1235/1469] CC obj/cmd/tests/encodeinttest.encodeinttest.o [1236/1469] STAMP obj/cmd/tests/dertimetest.actions_depends.stamp [1237/1469] STAMP obj/cmd/tests/dertimetest.compile_depends.stamp [1238/1469] CC obj/cmd/tests/dertimetest.dertimetest.o [1239/1469] STAMP obj/cmd/pwdecrypt/pwdecrypt.actions_depends.stamp [1240/1469] STAMP obj/cmd/tests/remtest.actions_depends.stamp [1241/1469] CC obj/cmd/tests/remtest.remtest.o [1242/1469] STAMP obj/cmd/tests/nonspr10.actions_depends.stamp [1243/1469] STAMP obj/cmd/tests/nonspr10.compile_depends.stamp [1244/1469] CC obj/cmd/tests/nonspr10.nonspr10.o [1245/1469] CC obj/cmd/tstclnt/tstclnt.tstclnt.o [1246/1469] STAMP obj/cmd/ssltap/ssltap.compile_depends.stamp [1247/1469] STAMP obj/cmd/ssltap/ssltap.actions_depends.stamp [1248/1469] CC obj/cmd/symkeyutil/symkeyutil.symkeyutil.o [1249/1469] STAMP obj/cmd/strsclnt/strsclnt.actions_depends.stamp [1250/1469] STAMP obj/cmd/strsclnt/strsclnt.compile_depends.stamp [1251/1469] CC obj/cmd/ssltap/ssltap.ssltap.o [1252/1469] STAMP obj/cmd/tests/conflict.actions_depends.stamp [1253/1469] STAMP obj/cmd/tests/conflict.compile_depends.stamp [1254/1469] CC obj/cmd/strsclnt/strsclnt.strsclnt.o [1255/1469] STAMP obj/cmd/smimetools/cmsutil.actions_depends.stamp [1256/1469] CC obj/cmd/tests/conflict.conflict.o [1257/1469] STAMP obj/cmd/smimetools/cmsutil.compile_depends.stamp [1258/1469] STAMP obj/cmd/signver/signver.actions_depends.stamp [1259/1469] STAMP obj/cmd/signver/signver.compile_depends.stamp [1260/1469] CC obj/cmd/smimetools/cmsutil.cmsutil.o [1261/1469] CC obj/cmd/signver/signver.pk7print.o [1262/1469] STAMP obj/cmd/selfserv/selfserv.actions_depends.stamp [1263/1469] STAMP obj/cmd/shlibsign/mangle/mangle.actions_depends.stamp [1264/1469] STAMP obj/cmd/selfserv/selfserv.compile_depends.stamp [1265/1469] STAMP obj/cmd/shlibsign/shlibsign.compile_depends.stamp [1266/1469] CC obj/cmd/signver/signver.signver.o [1267/1469] STAMP obj/cmd/shlibsign/shlibsign.actions_depends.stamp [1268/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/signtool [1269/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/conflict [1270/1469] CC obj/cmd/shlibsign/shlibsign.shlibsign.o [1271/1469] STAMP obj/cmd/pkix-errcodes/pkix-errcodes.compile_depends.stamp [1272/1469] STAMP obj/cmd/pwdecrypt/pwdecrypt.compile_depends.stamp [1273/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/signver [1274/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/baddbdir [1275/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/btoa [1276/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/vfyserv [1277/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/nss [1278/1469] CC obj/cmd/selfserv/selfserv.selfserv.o [1279/1469] STAMP obj/cmd/shlibsign/mangle/mangle.compile_depends.stamp [1280/1469] CC obj/cmd/shlibsign/mangle/mangle.mangle.o [1281/1469] STAMP obj/cmd/sdrtest/sdrtest.actions_depends.stamp [1282/1469] STAMP obj/cmd/sdrtest/sdrtest.compile_depends.stamp [1283/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/nss_bogo_shim [1284/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/hw-support [1285/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/tstclnt [1286/1469] CC obj/cmd/sdrtest/sdrtest.sdrtest.o [1287/1469] STAMP obj/cmd/rsaperf/rsaperf.actions_depends.stamp [1288/1469] STAMP obj/cmd/rsapoptst/rsapoptst.actions_depends.stamp [1289/1469] STAMP obj/cmd/rsapoptst/rsapoptst.compile_depends.stamp [1290/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/vfychain [1291/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/nonspr10 [1292/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/encodeinttest [1293/1469] CC obj/cmd/rsapoptst/rsapoptst.rsapoptst.o [1294/1469] STAMP obj/cmd/pp/pp.actions_depends.stamp [1295/1469] STAMP obj/cmd/pp/pp.compile_depends.stamp [1296/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/secmodtest [1297/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/remtest [1298/1469] CC obj/cmd/pp/pp.pp.o [1299/1469] STAMP obj/cmd/pkix-errcodes/pkix-errcodes.actions_depends.stamp [1300/1469] CC obj/cmd/pkix-errcodes/pkix-errcodes.pkix-errcodes.o [1301/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/symkeyutil [1302/1469] STAMP obj/cmd/pk1sign/pk1sign.actions_depends.stamp [1303/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/strsclnt [1304/1469] CC obj/cmd/pwdecrypt/pwdecrypt.pwdecrypt.o [1305/1469] STAMP obj/cmd/rsaperf/rsaperf.compile_depends.stamp [1306/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/dertimetest [1307/1469] CC obj/cmd/rsaperf/rsaperf.defkey.o [1308/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ssltap [1309/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/cmsutil [1310/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/mangle [1311/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/shlibsign [1312/1469] CC obj/cmd/rsaperf/rsaperf.rsaperf.o [1313/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/rsapoptst [1314/1469] ACTION nss_sign_shared_libs: shlibsign_29fc8a445570a0d3fc8010cc12fca598 [1315/1469] STAMP obj/nss_sign_shared_libs.actions_rules_copies.stamp [1316/1469] STAMP obj/cmd/pk12util/pk12util.actions_depends.stamp [1317/1469] STAMP obj/cmd/pk12util/pk12util.compile_depends.stamp [1318/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/rsaperf [1319/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/selfserv [1320/1469] CC obj/cmd/pk12util/pk12util.pk12util.o [1321/1469] STAMP obj/cmd/pk11mode/pk11mode.actions_depends.stamp [1322/1469] STAMP obj/cmd/pk11mode/pk11mode.compile_depends.stamp [1323/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/sdrtest [1324/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pkix-errcodes [1325/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pp [1326/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pwdecrypt [1327/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util [1328/1469] STAMP obj/cmd/pk1sign/pk1sign.compile_depends.stamp [1329/1469] CC obj/cmd/pk1sign/pk1sign.pk1sign.o [1330/1469] STAMP obj/cmd/pk11importtest/pk11importtest.actions_depends.stamp [1331/1469] STAMP obj/cmd/pk11importtest/pk11importtest.compile_depends.stamp [1332/1469] CC obj/cmd/pk11importtest/pk11importtest.pk11importtest.o [1333/1469] STAMP obj/cmd/pk11gcmtest/pk11gcmtest.actions_depends.stamp [1334/1469] STAMP obj/cmd/pk11gcmtest/pk11gcmtest.compile_depends.stamp [1335/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_rsaencrypt_unittest.o [1336/1469] STAMP obj/cmd/pk11ectest/pk11ectest.actions_depends.stamp [1337/1469] STAMP obj/cmd/pk11ectest/pk11ectest.compile_depends.stamp [1338/1469] CC obj/cmd/pk11gcmtest/pk11gcmtest.pk11gcmtest.o [1339/1469] STAMP obj/cmd/p7sign/p7sign.actions_depends.stamp [1340/1469] STAMP obj/cmd/p7sign/p7sign.compile_depends.stamp [1341/1469] CC obj/cmd/pk11ectest/pk11ectest.pk11ectest.o [1342/1469] STAMP obj/cmd/p7verify/p7verify.actions_depends.stamp [1343/1469] STAMP obj/cmd/p7verify/p7verify.compile_depends.stamp [1344/1469] CC obj/cmd/p7sign/p7sign.p7sign.o [1345/1469] STAMP obj/cmd/oidcalc/oidcalc.actions_depends.stamp [1346/1469] STAMP obj/cmd/oidcalc/oidcalc.compile_depends.stamp [1347/1469] CC obj/cmd/p7verify/p7verify.p7verify.o [1348/1469] STAMP obj/cmd/ocspresp/ocspresp.actions_depends.stamp [1349/1469] STAMP obj/cmd/ocspresp/ocspresp.compile_depends.stamp [1350/1469] STAMP obj/cmd/p7env/p7env.compile_depends.stamp [1351/1469] CC obj/cmd/oidcalc/oidcalc.oidcalc.o [1352/1469] STAMP obj/cmd/p7env/p7env.actions_depends.stamp [1353/1469] CC obj/cmd/p7env/p7env.p7env.o [1354/1469] STAMP obj/cmd/p7content/p7content.actions_depends.stamp [1355/1469] STAMP obj/cmd/p7content/p7content.compile_depends.stamp [1356/1469] CC obj/cmd/ocspresp/ocspresp.ocspresp.o [1357/1469] STAMP obj/cmd/modutil/modutil.actions_depends.stamp [1358/1469] STAMP obj/cmd/modutil/modutil.compile_depends.stamp [1359/1469] CC obj/cmd/p7content/p7content.p7content.o [1360/1469] CC obj/cmd/modutil/modutil.install.o [1361/1469] CC obj/cmd/modutil/modutil.installparse.o [1362/1469] CC obj/cmd/modutil/modutil.instsec.o [1363/1469] CC obj/cmd/modutil/modutil.lex.Pk11Install_yy.o [1364/1469] CC obj/cmd/modutil/modutil.modutil.o [1365/1469] CC obj/cmd/modutil/modutil.pk11.o [1366/1469] STAMP obj/cmd/ocspclnt/ocspclnt.compile_depends.stamp [1367/1469] CC obj/cmd/modutil/modutil.install-ds.o [1368/1469] STAMP obj/cmd/ocspclnt/ocspclnt.actions_depends.stamp [1369/1469] STAMP obj/cmd/nss-policy-check/nss-policy-check.compile_depends.stamp [1370/1469] CC obj/cmd/ocspclnt/ocspclnt.ocspclnt.o [1371/1469] STAMP obj/cmd/nss-policy-check/nss-policy-check.actions_depends.stamp [1372/1469] STAMP obj/cmd/multinit/multinit.compile_depends.stamp [1373/1469] CC obj/cmd/nss-policy-check/nss-policy-check.nss-policy-check.o [1374/1469] STAMP obj/cmd/multinit/multinit.actions_depends.stamp [1375/1469] STAMP obj/cmd/mpitests/mpi_tests.actions_depends.stamp [1376/1469] STAMP obj/cmd/mpitests/mpi_tests.compile_depends.stamp [1377/1469] CC obj/cmd/pk11mode/pk11mode.pk11mode.o [1378/1469] STAMP obj/cmd/lowhashtest/lowhashtest.actions_depends.stamp [1379/1469] STAMP obj/cmd/lowhashtest/lowhashtest.compile_depends.stamp [1380/1469] CC obj/cmd/multinit/multinit.multinit.o [1381/1469] STAMP obj/cmd/listsuites/listsuites.actions_depends.stamp [1382/1469] STAMP obj/cmd/listsuites/listsuites.compile_depends.stamp [1383/1469] CC obj/cmd/lowhashtest/lowhashtest.lowhashtest.o [1384/1469] STAMP obj/cmd/makepqg/makepqg.compile_depends.stamp [1385/1469] CC obj/cmd/listsuites/listsuites.listsuites.o [1386/1469] STAMP obj/cmd/makepqg/makepqg.actions_depends.stamp [1387/1469] STAMP obj/cmd/httpserv/httpserv.actions_depends.stamp [1388/1469] STAMP obj/cmd/httpserv/httpserv.compile_depends.stamp [1389/1469] CC obj/cmd/makepqg/makepqg.makepqg.o [1390/1469] STAMP obj/cmd/fbectest/fbectest.actions_depends.stamp [1391/1469] STAMP obj/cmd/ecperf/ecperf.compile_depends.stamp [1392/1469] CC obj/cmd/httpserv/httpserv.httpserv.o [1393/1469] STAMP obj/cmd/digest/digest.compile_depends.stamp [1394/1469] CC obj/cmd/digest/digest.digest.o [1395/1469] STAMP obj/cmd/derdump/derdump.actions_depends.stamp [1396/1469] STAMP obj/cmd/derdump/derdump.compile_depends.stamp [1397/1469] STAMP obj/cmd/digest/digest.actions_depends.stamp [1398/1469] STAMP obj/cmd/fbectest/fbectest.compile_depends.stamp [1399/1469] CC obj/cmd/mpitests/mpi_tests.mpi-test.o [1400/1469] STAMP obj/cmd/ecperf/ecperf.actions_depends.stamp [1401/1469] STAMP obj/cmd/crlutil/crlutil.compile_depends.stamp [1402/1469] CC obj/cmd/fbectest/fbectest.fbectest.o [1403/1469] CC obj/cmd/ecperf/ecperf.ecperf.o [1404/1469] CC obj/cmd/crlutil/crlutil.crlgen_lex.o [1405/1469] STAMP obj/cmd/certutil/certutil.actions_depends.stamp [1406/1469] STAMP obj/cmd/certutil/certutil.compile_depends.stamp [1407/1469] CC obj/cmd/crlutil/crlutil.crlutil.o [1408/1469] CC obj/cmd/certutil/certutil.keystuff.o [1409/1469] STAMP obj/cmd/chktest/chktest.actions_depends.stamp [1410/1469] CC obj/cmd/derdump/derdump.derdump.o [1411/1469] STAMP obj/cmd/dbtest/dbtest.actions_depends.stamp [1412/1469] STAMP obj/cmd/dbtest/dbtest.compile_depends.stamp [1413/1469] CC obj/cmd/crlutil/crlutil.crlgen.o [1414/1469] STAMP obj/cmd/crmftest/crmftest.actions_depends.stamp [1415/1469] STAMP obj/cmd/crmftest/crmftest.compile_depends.stamp [1416/1469] CC obj/cmd/dbtest/dbtest.dbtest.o [1417/1469] STAMP obj/cmd/crlutil/crlutil.actions_depends.stamp [1418/1469] CC obj/cmd/certutil/certutil.certext.o [1419/1469] STAMP obj/cmd/chktest/chktest.compile_depends.stamp [1420/1469] CC obj/cmd/chktest/chktest.chktest.o [1421/1469] STAMP obj/cmd/atob/atob.compile_depends.stamp [1422/1469] CC obj/cmd/atob/atob.atob.o [1423/1469] STAMP obj/cmd/atob/atob.actions_depends.stamp [1424/1469] STAMP obj/cmd/bltest/bltest.compile_depends.stamp [1425/1469] CC obj/cmd/crmftest/crmftest.testcrmf.o [1426/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/addbuiltin [1427/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/atob [1428/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk1sign [1429/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11importtest [1430/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11mode [1431/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/p7verify [1432/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11gcmtest [1433/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/p7content [1434/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/oidcalc [1435/1469] CC obj/cmd/bltest/bltest.blapitest.o [1436/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11ectest [1437/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/bltest [1438/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/p7sign [1439/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_rsaoaep_unittest.o [1440/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/p7env [1441/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/mpi_tests [1442/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ocspresp [1443/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ocspclnt [1444/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/nss-policy-check [1445/1469] CC obj/cmd/certutil/certutil.certutil.o [1446/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/multinit [1447/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil [1448/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/lowhashtest [1449/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/makepqg [1450/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/modutil [1451/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/httpserv [1452/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/listsuites [1453/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/digest [1454/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ecperf [1455/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/fbectest [1456/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/crlutil [1457/1469] STAMP obj/nss_cmds.actions_depends.stamp [1458/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/derdump [1459/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/dbtest [1460/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/crmftest [1461/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/chktest [1462/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_hpke_unittest.o [1463/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_rsapss_unittest.o [1464/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_aeskeywrapkwp_unittest.o [1465/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_ecdsa_unittest.o [1466/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_rsapkcs1_unittest.o [1467/1469] CXX obj/gtests/pk11_gtest/pk11_gtest.pk11_ecdh_unittest.o [1468/1469] LINK /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11_gtest [1469/1469] STAMP obj/nss_tests.actions_depends.stamp + exit 0 Executing(%install): /bin/sh -e /usr/src/tmp/rpm-tmp.1927 + umask 022 + /bin/mkdir -p /usr/src/RPM/BUILD + cd /usr/src/RPM/BUILD + /bin/chmod -Rf u+rwX -- /usr/src/tmp/nss-buildroot + : + /bin/rm -rf -- /usr/src/tmp/nss-buildroot + PATH=/usr/libexec/rpm-build:/usr/src/bin:/bin:/usr/bin:/usr/X11R6/bin:/usr/games + cd nss-3.66.0 + mkdir -p /usr/src/tmp/nss-buildroot/usr/bin /usr/src/tmp/nss-buildroot/usr/lib64/pkgconfig /usr/src/tmp/nss-buildroot/usr/include + DESTDIR=/usr/src/RPM/BUILD/nss-3.66.0/dist/Release ++ nspr-config --version + NSPR_VERSION=4.31.0 + nss_h=nss/lib/nss/nss.h ++ sed -ne 's,^#define[[:space:]]\+NSS_VMAJOR[[:space:]]\+,,p' nss/lib/nss/nss.h + NSS_VMAJOR=3 ++ sed -ne 's,^#define[[:space:]]\+NSS_VMINOR[[:space:]]\+,,p' nss/lib/nss/nss.h + NSS_VMINOR=66 ++ sed -ne 's,^#define[[:space:]]\+NSS_VPATCH[[:space:]]\+,,p' nss/lib/nss/nss.h + NSS_VPATCH=0 + cd dist + cp -aL /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/addbuiltin /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/atob /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/baddbdir /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/blake2b_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/bltest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/btoa /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certdb_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certhigh_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/chktest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/cmsutil /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/conflict /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/crlutil /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/crmftest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/cryptohi_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/dbtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/der_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/derdump /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/dertimetest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/digest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ecperf /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/encodeinttest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/fbectest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/freebl_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/httpserv /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/hw-support /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/listsuites /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/lowhashtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/makepqg /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/mangle /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/modutil /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/mozpkix_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/mpi_tests /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/multinit /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/nonspr10 /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/nss /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/nss-policy-check /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/nss_bogo_shim /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ocspclnt /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ocspresp /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/oidcalc /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/p7content /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/p7env /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/p7sign /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/p7verify /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11ectest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11gcmtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11importtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk11mode /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk1sign /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pkix-errcodes /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pp /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/prng_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pwdecrypt /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/remtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/rsaperf /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/rsapoptst /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/sdrtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/secmodtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/selfserv /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/shlibsign /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/signtool /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/signver /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/smime_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/softoken_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ssl_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/ssltap /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/strsclnt /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/symkeyutil /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/sysinit_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/tstclnt /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/util_gtest /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/vfychain /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/vfyserv /usr/src/tmp/nss-buildroot/usr/bin + cp -aL /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libfreebl3.chk /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libfreebl3.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libfreebl3.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libfreeblpriv3.chk /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libfreeblpriv3.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libfreeblpriv3.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libmozpkix-testlib.a /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libmozpkix.a /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnss3.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnss3.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi-testlib.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi-testlib.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssdbm3.chk /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssdbm3.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssdbm3.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnsssysinit.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnsssysinit.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssutil3.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssutil3.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libpkcs11testmodule.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libpkcs11testmodule.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libsectool.a /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libsmime3.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libsmime3.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libsoftokn3.chk /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libsoftokn3.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libsoftokn3.so.TOC /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libssl3.so /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libssl3.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64 + rm -f -- /usr/src/tmp/nss-buildroot/usr/lib64/libfreebl3.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libfreeblpriv3.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libnss3.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libnssckbi-testlib.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libnssckbi.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libnssdbm3.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libnsssysinit.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libnssutil3.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libpkcs11testmodule.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libsmime3.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libsoftokn3.so.TOC /usr/src/tmp/nss-buildroot/usr/lib64/libssl3.so.TOC + cp -aL public/nss /usr/src/tmp/nss-buildroot/usr/include + mkdir -p -- /usr/src/tmp/nss-buildroot//usr/include/nss/private + for n in blapi.h alghmac.h cmac.h + cp -aL private/nss/blapi.h /usr/src/tmp/nss-buildroot//usr/include/nss/private/blapi.h + for n in blapi.h alghmac.h cmac.h + cp -aL private/nss/alghmac.h /usr/src/tmp/nss-buildroot//usr/include/nss/private/alghmac.h + for n in blapi.h alghmac.h cmac.h + cp -aL private/nss/cmac.h /usr/src/tmp/nss-buildroot//usr/include/nss/private/cmac.h + sed -e s,@libdir@,/usr/lib64,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss,g -e s,@NSPR_VERSION@,4.31.0,g -e s,@NSS_VERSION@,3.66.0,g /usr/src/RPM/SOURCES/nss.pc.in + sed -e s,@libdir@,/usr/lib64,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,66,g -e s,@MOD_PATCH_VERSION@,0,g /usr/src/RPM/SOURCES/nss-config.in + chmod 755 /usr/src/tmp/nss-buildroot//usr/bin/nss-config + find /usr/src/tmp/nss-buildroot/usr/bin /usr/src/tmp/nss-buildroot/usr/lib64 -type f + read f + file /usr/src/tmp/nss-buildroot/usr/bin/nss-config + grep -qs ELF + continue + read f + file /usr/src/tmp/nss-buildroot/usr/bin/vfyserv + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/vfyserv + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/vfyserv + read f + file /usr/src/tmp/nss-buildroot/usr/bin/vfychain + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/vfychain + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/vfychain + read f + file /usr/src/tmp/nss-buildroot/usr/bin/util_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/util_gtest + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/bin/tstclnt + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/tstclnt + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/tstclnt + read f + file /usr/src/tmp/nss-buildroot/usr/bin/sysinit_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/sysinit_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/sysinit_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/symkeyutil + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/symkeyutil + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/symkeyutil + read f + file /usr/src/tmp/nss-buildroot/usr/bin/strsclnt + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/strsclnt + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/strsclnt + read f + file /usr/src/tmp/nss-buildroot/usr/bin/ssltap + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/ssltap + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/ssltap + read f + file /usr/src/tmp/nss-buildroot/usr/bin/ssl_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/ssl_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/ssl_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/softoken_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/softoken_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/softoken_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/smime_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/smime_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/smime_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/signver + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/signver + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/signver + read f + file /usr/src/tmp/nss-buildroot/usr/bin/signtool + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/signtool + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/signtool + read f + file /usr/src/tmp/nss-buildroot/usr/bin/shlibsign + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/shlibsign + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/shlibsign + read f + file /usr/src/tmp/nss-buildroot/usr/bin/selfserv + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/selfserv + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/selfserv + read f + file /usr/src/tmp/nss-buildroot/usr/bin/secmodtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/secmodtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/secmodtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/sdrtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/sdrtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/sdrtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/rsapoptst + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/rsapoptst + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/rsapoptst + read f + file /usr/src/tmp/nss-buildroot/usr/bin/rsaperf + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/rsaperf + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/rsaperf + read f + file /usr/src/tmp/nss-buildroot/usr/bin/remtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/remtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/remtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pwdecrypt + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pwdecrypt + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pwdecrypt + read f + file /usr/src/tmp/nss-buildroot/usr/bin/prng_gtest + grep -qs ELF + fgrep -qs RPATH= + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/prng_gtest + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/prng_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pp + grep -qs ELF + fgrep -qs RPATH= + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pp + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pp + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pkix-errcodes + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pkix-errcodes + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pkix-errcodes + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pk1sign + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pk1sign + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pk1sign + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pk12util + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pk12util + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pk12util + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pk11mode + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pk11mode + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pk11mode + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pk11importtest + grep -qs ELF + fgrep -qs RPATH= + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pk11importtest + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pk11importtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pk11gcmtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pk11gcmtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pk11gcmtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pk11ectest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pk11ectest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pk11ectest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/pk11_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/pk11_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/pk11_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/p7verify + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/p7verify + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/p7verify + read f + file /usr/src/tmp/nss-buildroot/usr/bin/p7sign + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/p7sign + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/p7sign + read f + file /usr/src/tmp/nss-buildroot/usr/bin/p7env + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/p7env + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/p7env + read f + file /usr/src/tmp/nss-buildroot/usr/bin/p7content + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/p7content + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/p7content + read f + file /usr/src/tmp/nss-buildroot/usr/bin/oidcalc + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/oidcalc + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/oidcalc + read f + file /usr/src/tmp/nss-buildroot/usr/bin/ocspresp + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/ocspresp + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/ocspresp + read f + file /usr/src/tmp/nss-buildroot/usr/bin/ocspclnt + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/ocspclnt + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/ocspclnt + read f + file /usr/src/tmp/nss-buildroot/usr/bin/nss_bogo_shim + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/nss_bogo_shim + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/nss_bogo_shim + read f + file /usr/src/tmp/nss-buildroot/usr/bin/nss-policy-check + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/nss-policy-check + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/nss-policy-check + read f + file /usr/src/tmp/nss-buildroot/usr/bin/nss + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/nss + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/nss + read f + file /usr/src/tmp/nss-buildroot/usr/bin/nonspr10 + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/nonspr10 + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/nonspr10 + read f + file /usr/src/tmp/nss-buildroot/usr/bin/multinit + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/multinit + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/multinit + read f + file /usr/src/tmp/nss-buildroot/usr/bin/mpi_tests + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/mpi_tests + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/mpi_tests + read f + file /usr/src/tmp/nss-buildroot/usr/bin/mozpkix_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/mozpkix_gtest + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/bin/modutil + grep -qs ELF + fgrep -qs RPATH= + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/modutil + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/modutil + read f + file /usr/src/tmp/nss-buildroot/usr/bin/mangle + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/mangle + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/mangle + read f + file /usr/src/tmp/nss-buildroot/usr/bin/makepqg + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/makepqg + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/makepqg + read f + file /usr/src/tmp/nss-buildroot/usr/bin/lowhashtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/lowhashtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/lowhashtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/listsuites + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/listsuites + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/listsuites + read f + file /usr/src/tmp/nss-buildroot/usr/bin/hw-support + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/hw-support + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/hw-support + read f + file /usr/src/tmp/nss-buildroot/usr/bin/httpserv + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/httpserv + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/httpserv + read f + file /usr/src/tmp/nss-buildroot/usr/bin/freebl_gtest + grep -qs ELF + fgrep -qs RPATH= + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/freebl_gtest + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/freebl_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/fbectest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/fbectest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/fbectest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/encodeinttest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/encodeinttest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/encodeinttest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/ecperf + grep -qs ELF + fgrep -qs RPATH= + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/ecperf + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/ecperf + read f + file /usr/src/tmp/nss-buildroot/usr/bin/digest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/digest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/digest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/dertimetest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/dertimetest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/dertimetest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/derdump + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/derdump + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/derdump + read f + file /usr/src/tmp/nss-buildroot/usr/bin/der_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/der_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/der_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/dbtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/dbtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/dbtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/cryptohi_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/cryptohi_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/cryptohi_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/crmftest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/crmftest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/crmftest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/crlutil + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/crlutil + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/crlutil + read f + file /usr/src/tmp/nss-buildroot/usr/bin/conflict + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/conflict + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/conflict + read f + file /usr/src/tmp/nss-buildroot/usr/bin/cmsutil + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/cmsutil + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/cmsutil + read f + file /usr/src/tmp/nss-buildroot/usr/bin/chktest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/chktest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/chktest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/certutil + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/certutil + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/certutil + read f + file /usr/src/tmp/nss-buildroot/usr/bin/certhigh_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/certhigh_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/certhigh_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/certdb_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/certdb_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/certdb_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/btoa + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/btoa + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/btoa + read f + file /usr/src/tmp/nss-buildroot/usr/bin/bltest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/bltest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/bltest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/blake2b_gtest + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/blake2b_gtest + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/blake2b_gtest + read f + file /usr/src/tmp/nss-buildroot/usr/bin/baddbdir + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/baddbdir + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/baddbdir + read f + file /usr/src/tmp/nss-buildroot/usr/bin/atob + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/atob + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/atob + read f + file /usr/src/tmp/nss-buildroot/usr/bin/addbuiltin + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/bin/addbuiltin + fgrep -qs RPATH= + chrpath -d /usr/src/tmp/nss-buildroot/usr/bin/addbuiltin + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libssl3.so + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libssl3.so + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libsoftokn3.so + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libsoftokn3.so + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libsoftokn3.chk + grep -qs ELF + continue + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libsmime3.so + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libsmime3.so + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libsectool.a + grep -qs ELF + continue + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libpkcs11testmodule.so + grep -qs ELF + fgrep -qs RPATH= + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libpkcs11testmodule.so + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libnssutil3.so + grep -qs ELF + fgrep -qs RPATH= + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libnssutil3.so + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libnsssysinit.so + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libnsssysinit.so + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libnssdbm3.so + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libnssdbm3.so + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libnssdbm3.chk + grep -qs ELF + continue + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libnssckbi.so + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libnssckbi.so + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libnssckbi-testlib.so + grep -qs ELF + fgrep -qs RPATH= + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libnssckbi-testlib.so + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libnss3.so + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libnss3.so + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libmozpkix.a + grep -qs ELF + continue + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libmozpkix-testlib.a + grep -qs ELF + continue + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libfreeblpriv3.so + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libfreeblpriv3.so + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libfreeblpriv3.chk + grep -qs ELF + continue + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libfreebl3.so + grep -qs ELF + chrpath -l /usr/src/tmp/nss-buildroot/usr/lib64/libfreebl3.so + fgrep -qs RPATH= + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/libfreebl3.chk + grep -qs ELF + continue + read f + file /usr/src/tmp/nss-buildroot/usr/lib64/pkgconfig/nss.pc + grep -qs ELF + continue + read f + mkdir -p -- /usr/src/tmp/nss-buildroot//etc/pki/nssdb + tar -x -C /usr/src/tmp/nss-buildroot//etc/pki/nssdb -f /usr/src/RPM/SOURCES/nss-db-3.66.0.tar + find /usr/src/tmp/nss-buildroot//etc/pki/nssdb -name 'blank-*.db' -printf '%h %f\n' + read p n + mv -f -- /usr/src/tmp/nss-buildroot//etc/pki/nssdb/blank-secmod.db /usr/src/tmp/nss-buildroot//etc/pki/nssdb/secmod.db + read p n + mv -f -- /usr/src/tmp/nss-buildroot//etc/pki/nssdb/blank-key4.db /usr/src/tmp/nss-buildroot//etc/pki/nssdb/key4.db + read p n + mv -f -- /usr/src/tmp/nss-buildroot//etc/pki/nssdb/blank-key3.db /usr/src/tmp/nss-buildroot//etc/pki/nssdb/key3.db + read p n + mv -f -- /usr/src/tmp/nss-buildroot//etc/pki/nssdb/blank-cert9.db /usr/src/tmp/nss-buildroot//etc/pki/nssdb/cert9.db + read p n + mv -f -- /usr/src/tmp/nss-buildroot//etc/pki/nssdb/blank-cert8.db /usr/src/tmp/nss-buildroot//etc/pki/nssdb/cert8.db + read p n + install -p -m755 /usr/src/RPM/SOURCES/setup-nsssysinit.sh /usr/src/tmp/nss-buildroot//usr/bin/setup-nsssysinit.sh + install -p -m644 /usr/src/RPM/SOURCES/system-pkcs11.txt /usr/src/tmp/nss-buildroot//etc/pki/nssdb/pkcs11.txt + mkdir -p -- /usr/src/tmp/nss-buildroot//usr/lib64/nss + mv -- /usr/src/tmp/nss-buildroot//usr/lib64/libnssckbi.so /usr/src/tmp/nss-buildroot//usr/lib64/nss/libnssckbi.so + mkdir -p -- /usr/src/tmp/nss-buildroot//etc/alternatives/packages.d + cat + /usr/lib/rpm/brp-alt Cleaning files in /usr/src/tmp/nss-buildroot (auto) mode of './usr/lib64/nss/libnssckbi.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libssl3.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libsoftokn3.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libsmime3.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libpkcs11testmodule.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libnssutil3.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libnsssysinit.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libnssdbm3.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libnssckbi-testlib.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libnss3.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libfreeblpriv3.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) mode of './usr/lib64/libfreebl3.so' changed from 0755 (rwxr-xr-x) to 0644 (rw-r--r--) Verifying and fixing files in /usr/src/tmp/nss-buildroot (binconfig,pkgconfig,libtool,desktop,gnuconfig) Checking contents of files in /usr/src/tmp/nss-buildroot/ (default) Compressing files in /usr/src/tmp/nss-buildroot (auto) Adjusting library links in /usr/src/tmp/nss-buildroot ./usr/lib64: (from :0) libfreebl3.so -> libfreebl3.so libfreeblpriv3.so -> libfreeblpriv3.so libnss3.so -> libnss3.so libnssckbi-testlib.so -> libnssckbi-testlib.so libnssdbm3.so -> libnssdbm3.so libnsssysinit.so -> libnsssysinit.so libnssutil3.so -> libnssutil3.so libpkcs11testmodule.so -> libpkcs11testmodule.so libsmime3.so -> libsmime3.so libsoftokn3.so -> libsoftokn3.so libssl3.so -> libssl3.so 056-debuginfo.brp: WARNING: debuginfo without debug sources. Verifying ELF objects in /usr/src/tmp/nss-buildroot (arch=normal,fhs=normal,lfs=relaxed,lint=relaxed,rpath=normal,stack=normal,textrel=normal,unresolved=normal) Executing(%check): /bin/sh -e /usr/src/tmp/rpm-tmp.71713 + umask 022 + /bin/mkdir -p /usr/src/RPM/BUILD + cd /usr/src/RPM/BUILD + cd nss-3.66.0 + pushd nss/tests ~/RPM/BUILD/nss-3.66.0/nss/tests ~/RPM/BUILD/nss-3.66.0 + ./all.sh ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:138: CPU_ARCH is not x86_64, disabling -mavx2 testdir is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security init.sh init: Creating /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security ******************************************** Platform: Release Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin:/usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib:/bin:/usr/bin:/usr/src/bin:/usr/X11R6/bin:/usr/games against LIB /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib: ========== NSS Hardware Report ========== AES-NI supported PCLMUL supported SHA supported AVX supported AVX2 supported SSSE3 supported SSE4.1 supported SSE4.2 supported ========== Hardware Report End ========== Running test cycle: STANDARD ---------------------- List of tests that will be executed: cipher lowhash libpkix cert dbtests tools sdr crmf smime ssl ocsp merge pkits ec gtests ssl_gtests policy Running tests for cipher TIMESTAMP cipher BEGIN: Tue Aug 3 00:06:56 UTC 2021 cipher.sh: Cipher Tests =============================== cipher.sh: DES ECB Encrypt -------------------------------- bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des_ecb passed. cipher.sh: #1: DES ECB Encrypt - PASSED cipher.sh: DES ECB Decrypt -------------------------------- bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des_ecb passed. cipher.sh: #2: DES ECB Decrypt - PASSED cipher.sh: DES CBC Encrypt -------------------------------- bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des_cbc passed. cipher.sh: #3: DES CBC Encrypt - PASSED cipher.sh: DES CBC Decrypt -------------------------------- bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des_cbc passed. cipher.sh: #4: DES CBC Decrypt - PASSED cipher.sh: DES3 ECB Encrypt -------------------------------- bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des3_ecb passed. cipher.sh: #5: DES3 ECB Encrypt - PASSED cipher.sh: DES3 ECB Decrypt -------------------------------- bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des3_ecb passed. cipher.sh: #6: DES3 ECB Decrypt - PASSED cipher.sh: DES3 CBC Encrypt -------------------------------- bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des3_cbc passed. cipher.sh: #7: DES3 CBC Encrypt - PASSED cipher.sh: DES3 CBC Decrypt -------------------------------- bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des3_cbc passed. cipher.sh: #8: DES3 CBC Decrypt - PASSED cipher.sh: AES ECB Encrypt -------------------------------- bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. Encryption self-test for aes_ecb passed. cipher.sh: #9: AES ECB Encrypt - PASSED cipher.sh: AES ECB Decrypt -------------------------------- bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. Decryption self-test for aes_ecb passed. cipher.sh: #10: AES ECB Decrypt - PASSED cipher.sh: AES CBC Encrypt -------------------------------- bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. Encryption self-test for aes_cbc passed. cipher.sh: #11: AES CBC Encrypt - PASSED cipher.sh: AES CBC Decrypt -------------------------------- bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. Decryption self-test for aes_cbc passed. cipher.sh: #12: AES CBC Decrypt - PASSED cipher.sh: AES CTR -------------------------------- bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. bltest -T -m aes_ctr -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. Encryption self-test for aes_ctr passed. Decryption self-test for aes_ctr passed. cipher.sh: #13: AES CTR - PASSED cipher.sh: AES CTS -------------------------------- bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. bltest -T -m aes_cts -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. Encryption self-test for aes_cts passed. Decryption self-test for aes_cts passed. cipher.sh: #14: AES CTS - PASSED cipher.sh: AES GCM -------------------------------- bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. bltest -T -m aes_gcm -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. Encryption self-test for aes_gcm passed. Decryption self-test for aes_gcm passed. cipher.sh: #15: AES GCM - PASSED cipher.sh: Camellia ECB Encrypt -------------------------------- bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. cipher.sh: #16: Camellia ECB Encrypt - PASSED cipher.sh: Camellia ECB Decrypt -------------------------------- bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. cipher.sh: #17: Camellia ECB Decrypt - PASSED cipher.sh: Camellia CBC Encrypt -------------------------------- bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. cipher.sh: #18: Camellia CBC Encrypt - PASSED cipher.sh: Camellia CBC Decrypt -------------------------------- bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. cipher.sh: #19: Camellia CBC Decrypt - PASSED cipher.sh: SEED ECB Encrypt -------------------------------- bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for seed_ecb passed. cipher.sh: #20: SEED ECB Encrypt - PASSED cipher.sh: SEED ECB Decrypt -------------------------------- bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for seed_ecb passed. cipher.sh: #21: SEED ECB Decrypt - PASSED cipher.sh: SEED CBC Encrypt -------------------------------- bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for seed_cbc passed. cipher.sh: #22: SEED CBC Encrypt - PASSED cipher.sh: SEED CBC Decrypt -------------------------------- bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for seed_cbc passed. cipher.sh: #23: SEED CBC Decrypt - PASSED cipher.sh: ChaCha20 Poly1305 Encrypt -------------------------------- bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for chacha20_poly1305 passed. Encryption self-test for chacha20_poly1305 passed. cipher.sh: #24: ChaCha20 Poly1305 Encrypt - PASSED cipher.sh: ChaCha20 Poly1305 Decrypt -------------------------------- bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. bltest -T -m chacha20_poly1305 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for chacha20_poly1305 passed. Decryption self-test for chacha20_poly1305 passed. cipher.sh: #25: ChaCha20 Poly1305 Decrypt - PASSED cipher.sh: RC2 ECB Encrypt -------------------------------- bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc2_ecb passed. cipher.sh: #26: RC2 ECB Encrypt - PASSED cipher.sh: RC2 ECB Decrypt -------------------------------- bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc2_ecb passed. cipher.sh: #27: RC2 ECB Decrypt - PASSED cipher.sh: RC2 CBC Encrypt -------------------------------- bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc2_cbc passed. cipher.sh: #28: RC2 CBC Encrypt - PASSED cipher.sh: RC2 CBC Decrypt -------------------------------- bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc2_cbc passed. cipher.sh: #29: RC2 CBC Decrypt - PASSED cipher.sh: RC4 Encrypt -------------------------------- bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. cipher.sh: #30: RC4 Encrypt - PASSED cipher.sh: RC4 Decrypt -------------------------------- bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. cipher.sh: #31: RC4 Decrypt - PASSED cipher.sh: RSA Encrypt -------------------------------- bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rsa passed. cipher.sh: #32: RSA Encrypt - PASSED cipher.sh: RSA Decrypt -------------------------------- bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rsa passed. cipher.sh: #33: RSA Decrypt - PASSED cipher.sh: RSA EncryptOAEP -------------------------------- bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -E -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. Encryption self-test for rsa_oaep passed. cipher.sh: #34: RSA EncryptOAEP - PASSED cipher.sh: RSA DecryptOAEP -------------------------------- bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. bltest -T -m rsa_oaep -D -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. Decryption self-test for rsa_oaep passed. cipher.sh: #35: RSA DecryptOAEP - PASSED cipher.sh: RSA SignPSS -------------------------------- bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. bltest -T -m rsa_pss -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. Signature self-test for rsa_pss passed. cipher.sh: #36: RSA SignPSS - PASSED cipher.sh: RSA CheckSignPSS -------------------------------- bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. bltest -T -m rsa_pss -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. Verification self-test for rsa_pss passed. cipher.sh: #37: RSA CheckSignPSS - PASSED cipher.sh: RSA Populate -------------------------------- bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p bltest -T -m rsa -K -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 RSA Populate success: pkcs1v15sign-vector 0 p RSA Populate success: pkcs1v15sign-vector 1 p RSA Populate success: pkcs1v15sign-vector 2 p RSA Populate success: pkcs1v15sign-vector 3 p RSA Populate success: pkcs1v15sign-vector 4 p RSA Populate success: pkcs1v15sign-vector 5 p RSA Populate success: pkcs1v15sign-vector 6 p RSA Populate success: pkcs1v15sign-vector 7 p RSA Populate success: pkcs1v15sign-vector 8 p RSA Populate success: pkcs1v15sign-vector 9 p RSA Populate success: pkcs1v15sign-vector 10 p RSA Populate success: pkcs1v15sign-vector 11 p RSA Populate success: pkcs1v15sign-vector 12 p RSA Populate success: pkcs1v15sign-vector 13 p RSA Populate success: pkcs1v15sign-vector 14 p cipher.sh: #38: RSA Populate - PASSED cipher.sh: DSA Sign -------------------------------- bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. bltest -T -m dsa -S -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. Signature self-test for dsa passed. cipher.sh: #39: DSA Sign - PASSED cipher.sh: DSA Verify -------------------------------- bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. bltest -T -m dsa -V -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. Verification self-test for dsa passed. cipher.sh: #40: DSA Verify - PASSED cipher.sh: MD2 Hash -------------------------------- bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for md2 passed. cipher.sh: #41: MD2 Hash - PASSED cipher.sh: MD5 Hash -------------------------------- bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for md5 passed. cipher.sh: #42: MD5 Hash - PASSED cipher.sh: SHA1 Hash -------------------------------- bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha1 passed. cipher.sh: #43: SHA1 Hash - PASSED cipher.sh: SHA224 Hash -------------------------------- bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. cipher.sh: #44: SHA224 Hash - PASSED cipher.sh: SHA256 Hash -------------------------------- bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. cipher.sh: #45: SHA256 Hash - PASSED cipher.sh: SHA384 Hash -------------------------------- bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. cipher.sh: #46: SHA384 Hash - PASSED cipher.sh: SHA512 Hash -------------------------------- bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. cipher.sh: #47: SHA512 Hash - PASSED cipher.sh: NIST AES128 GCM Decrypt -------------------------------- pk11gcmtest aes kat gcm /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt128.rsp Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests 46 test groups PASS cipher.sh: #48: NIST AES128 GCM Decrypt - PASSED cipher.sh: NIST AES192 GCM Decrypt -------------------------------- pk11gcmtest aes kat gcm /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt192.rsp Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests 46 test groups PASS cipher.sh: #49: NIST AES192 GCM Decrypt - PASSED cipher.sh: NIST AES256 GCM Decrypt -------------------------------- pk11gcmtest aes kat gcm /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt256.rsp Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests 46 test groups PASS cipher.sh: #50: NIST AES256 GCM Decrypt - PASSED cipher.sh: NIST AES128 GCM Encrypt -------------------------------- pk11gcmtest aes kat gcm /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV128.rsp Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests 46 test groups PASS cipher.sh: #51: NIST AES128 GCM Encrypt - PASSED cipher.sh: NIST AES192 GCM Encrypt -------------------------------- pk11gcmtest aes kat gcm /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV192.rsp Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests 46 test groups PASS cipher.sh: #52: NIST AES192 GCM Encrypt - PASSED cipher.sh: NIST AES256 GCM Encrypt -------------------------------- pk11gcmtest aes kat gcm /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV256.rsp Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests 46 test groups PASS cipher.sh: #53: NIST AES256 GCM Encrypt - PASSED cipher.sh: RSA Reconstruct Private Keys Test -------------------------------- rsapoptst -t all -r 10 Leaking keys... id = { 00 0f }; ---> leak expected Leaking keys... id = { 01 0f }; ---> leak expected id = { 00 0f }; ---> leak expected Leaking keys... id = { 02 0f }; ---> leak expected id = { 01 0f }; ---> leak expected id = { 00 0f }; ---> leak expected Leaking keys... id = { 03 0f }; ---> leak expected id = { 02 0f }; ---> leak expected id = { 01 0f }; ---> leak expected id = { 00 0f }; ---> leak expected Leaking keys... id = { 04 0f }; ---> leak expected id = { 03 0f }; ---> leak expected id = { 02 0f }; ---> leak expected id = { 01 0f }; ---> leak expected id = { 00 0f }; ---> leak expected Leaking keys... id = { 05 0f }; ---> leak expected id = { 04 0f }; ---> leak expected id = { 03 0f }; ---> leak expected id = { 02 0f }; ---> leak expected id = { 01 0f }; ---> leak expected id = { 00 0f }; ---> leak expected Leaking keys... id = { 06 0f }; ---> leak expected id = { 05 0f }; ---> leak expected id = { 04 0f }; ---> leak expected id = { 03 0f }; ---> leak expected id = { 02 0f }; ---> leak expected id = { 01 0f }; ---> leak expected id = { 00 0f }; ---> leak expected Leaking keys... id = { 07 0f }; ---> leak expected id = { 06 0f }; ---> leak expected id = { 05 0f }; ---> leak expected id = { 04 0f }; ---> leak expected id = { 03 0f }; ---> leak expected id = { 02 0f }; ---> leak expected id = { 01 0f }; ---> leak expected id = { 00 0f }; ---> leak expected Leaking keys... id = { 08 0f }; ---> leak expected id = { 07 0f }; ---> leak expected id = { 06 0f }; ---> leak expected id = { 05 0f }; ---> leak expected id = { 04 0f }; ---> leak expected id = { 03 0f }; ---> leak expected id = { 02 0f }; ---> leak expected id = { 01 0f }; ---> leak expected id = { 00 0f }; ---> leak expected Leaking keys... id = { 09 0f }; ---> leak expected id = { 08 0f }; ---> leak expected id = { 07 0f }; ---> leak expected id = { 06 0f }; ---> leak expected id = { 05 0f }; ---> leak expected id = { 04 0f }; ---> leak expected id = { 03 0f }; ---> leak expected id = { 02 0f }; ---> leak expected id = { 01 0f }; ---> leak expected id = { 00 0f }; ---> leak expected Running RSA Populate test run 0 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus Running RSA Populate test run 1 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus Running RSA Populate test run 2 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus Running RSA Populate test run 3 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus Running RSA Populate test run 4 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus Running RSA Populate test run 5 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus Running RSA Populate test run 6 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus Running RSA Populate test run 7 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus Running RSA Populate test run 8 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus Running RSA Populate test run 9 public exponent, modulus, prime1 private exponent, modulus, prime2 private exponent, prime1, prime2 public exponent, private exponent, modulus pub priv prime test: 0 failures out of 10 runs (0.000000 %) cipher.sh: #54: RSA Reconstruct Private Keys Test - PASSED TIMESTAMP cipher END: Tue Aug 3 00:07:14 UTC 2021 Running tests for lowhash TIMESTAMP lowhash BEGIN: Tue Aug 3 00:07:14 UTC 2021 lowhash.sh: Lowhash Tests =============================== lowhashtest with fips mode=0 lowhashtest MD5 lowhash.sh: #1: lowhashtest with fips mode=0 for MD5 - PASSED lowhashtest SHA1 lowhash.sh: #2: lowhashtest with fips mode=0 for SHA1 - PASSED lowhashtest SHA224 lowhash.sh: #3: lowhashtest with fips mode=0 for SHA224 - PASSED lowhashtest SHA256 lowhash.sh: #4: lowhashtest with fips mode=0 for SHA256 - PASSED lowhashtest SHA384 lowhash.sh: #5: lowhashtest with fips mode=0 for SHA384 - PASSED lowhashtest SHA512 lowhash.sh: #6: lowhashtest with fips mode=0 for SHA512 - PASSED lowhashtest with fips mode=1 lowhashtest MD5 lowhash.sh: #7: lowhashtest with fips mode=1 for MD5 - PASSED lowhashtest SHA1 lowhash.sh: #8: lowhashtest with fips mode=1 for SHA1 - PASSED lowhashtest SHA224 lowhash.sh: #9: lowhashtest with fips mode=1 for SHA224 - PASSED lowhashtest SHA256 lowhash.sh: #10: lowhashtest with fips mode=1 for SHA256 - PASSED lowhashtest SHA384 lowhash.sh: #11: lowhashtest with fips mode=1 for SHA384 - PASSED lowhashtest SHA512 lowhash.sh: #12: lowhashtest with fips mode=1 for SHA512 - PASSED lowhash.sh done TIMESTAMP lowhash END: Tue Aug 3 00:07:14 UTC 2021 Running tests for cert TIMESTAMP cert BEGIN: Tue Aug 3 00:07:14 UTC 2021 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #81: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #87: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #113: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #116: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 3b91817e3ef4aca907ebe5a7287475f0fd51c2f3 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k fc7193e01f85c3a20c8052f094c32b9e7d2b9068 -s CN=orphan -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:b8:1e:ba:87:75:2a:c6:32:cb:01:e7:66:49:48:b8: b5:52:f5:81:50:09:5f:a5:59:d1:79:d2:e8:a6:dc:6c: 2c:4f:43:5b:da:9d:5c:e3:af:4c:7f:19:b6:dc:ba:0f: 71:04:40:41:2f:53:20:ed:39:8f:47:e4:e1:9b:51:4e: 7c:22:96:d0:bb:93:0d:78:d7:5c:1b:40:22:42:86:e9: 5d:df:ef:64:3a:00:7a:5d:02:54:95:56:f5:df:76:60: d5:3c:e4:43:c1:c7:2b:09:5d:ff:fc:a1:0e:87:b2:0c: c6:fb:b3:3d:3e:8d:f3:3d:c4:b7:e2:96:53:40:d1:50: 65:a9:3d:d4:e5:d1:ff:3b:e7:ff:b2:4b:f7:7a:8f:4b: 38:bc:cf:4d:d3:c5:0d:5b:cb:f7:9c:f7:53:d3:74:e4: 96:58:41:40:dd:27:de:39:ea:5a:65:b0:c8:8c:84:0e: f0:2f:77:09:20:44:a3:75:d2:72:f3:ee:62:a5:e5:1d: 74:69:16:13:23:f2:e8:93:5d:f0:d7:a5:a3:93:c3:3c: 62:4e:68:f4:f9:5f:51:b7:83:41:e3:9a:f5:17:fb:bd: c2:51:c9:f5:e5:d8:bb:8c:fd:eb:4f:40:fa:c0:98:29: 69:18:95:d1:5c:54:51:06:a8:53:ee:cb:97:10:49:43 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:cd:1f:5e:34:07:64:7d:14:14:aa:d3:b3:55:fe:19: dd:2b:02:dd:25:9d:6b:64:4d:de:72:b2:ea:9f:f0:24: 33:27:11:70:f1:09:36:7d:36:e2:49:bc:7f:f3:5c:e6: b9:ed:1a:68:a8:db:f7:15:de:69:1c:b8:7a:57:cc:ca: dd:f4:d6:71:4c:de:c3:f5:c6:e3:d8:5a:1d:b1:5e:fa: 78:7d:92:b7:f8:1f:5d:03:fd:58:4f:8a:6a:8d:f4:b8: f6:a5:0d:78:04:32:62:58:87:28:07:af:44:7e:c6:5d: 85:d7:68:5e:7a:ba:b9:a4:a4:cf:8f:e9:6b:13:ac:37: 5b:9c:13:b3:a8:0b:b1:ab:12:40:85:7d:b8:6a:76:7b: e5:f9:1d:72:1c:cb:93:b6:35:48:22:60:78:19:67:c5: c1:5e:a4:4e:ef:b5:69:77:c7:32:72:fd:fa:7c:86:9e: a3:d0:57:63:68:4d:5c:4b:bd:9d:f8:27:fe:59:c3:ea: e6:28:75:0a:f8:3f:e4:df:18:9c:1f:8a:1f:e1:e6:bf: e3:c2:41:e7:9d:78:01:b3:df:32:df:71:84:e3:fa:8a: ee:59:20:99:e2:d0:32:4c:2d:a7:4a:0e:5c:f9:4c:97: a6:ac:c5:52:74:bc:0b:ae:50:0f:7c:74:9b:1a:60:bd Fingerprint (SHA-256): 18:98:46:55:35:86:D7:03:C3:AD:D7:ED:E6:00:FB:37:98:29:24:A3:1B:A6:FC:31:90:40:B2:29:CB:B8:81:0F Fingerprint (SHA1): 50:98:9D:73:EA:DA:02:4E:C4:A7:55:77:4A:1A:09:03:23:30:61:8B cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Verify that small RSA exponents still work ============== cert.sh: Attempt to generate a key with exponent of 3 -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -z ../tests_noise -f ../tests.pw Generating key. This may take a few moments... cert.sh: #289: Attempt to generate a key with exponent of 3 - PASSED cert.sh: Attempt to generate a key with exponent of 17 -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -z ../tests_noise -f ../tests.pw Generating key. This may take a few moments... cert.sh: #290: Attempt to generate a key with exponent of 17 - PASSED cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #291: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #292: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #293: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #294: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #295: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #296: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #297: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #298: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #299: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #300: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #301: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #302: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #303: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #304: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #305: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #306: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #307: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #308: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #309: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #310: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #311: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #312: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #313: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #314: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #315: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #316: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #317: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #318: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #319: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #320: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #321: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #322: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #323: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #324: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #325: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:53 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:01 2021 Not After : Wed Nov 03 00:08:01 2021 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:51:48:1a:20:1d:cc:b5:f0:98:b0:e0:d1:ae:e8:91: d1:63:55:08:bf:b6:a2:89:2a:6a:f1:49:0a:b5:ef:54: 80:1c:5a:18:be:eb:e0:fb:d6:e3:98:3c:34:9b:17:e6: fd:7e:19:e2:a9:68:85:d5:62:9c:86:cb:1b:0e:69:61: 58:db:ed:1f:86:69:b1:41:a5:14:36:92:fd:73:ca:7f: 2e:27:66:a7:b5:ca:8b:63:eb:ca:b3:e3:16:f5:35:7a: 7e:f4:e8:cc:96:d6:80:a5:cb:ba:77:7c:6c:00:5a:8a: d0:43:2e:5e:c6:7d:ea:63:da:f1:74:9d:37:d0:08:10: ad:e4:f6:3b:c2:9f:58:65:6f:d3:57:53:13:2e:0b:a5: 8e:30:15:d0:63:3e:1a:7c:0b:1c:f6:f1:6c:9f:26:62: da:53:9b:57:a8:8e:da:51:5c:3c:d4:c4:9a:8c:51:d0: 6e:83:90:10:9c:43:c3:ae:95:5e:5c:16:94:62:3f:83: 98:d1:be:b2:03:f9:1c:95:0e:6f:38:e2:03:9b:16:cf: 30:40:84:05:ed:c0:f1:5a:32:d2:7e:f6:28:00:6e:53: ce:69:3b:65:6a:e6:c2:a4:7b:09:8a:25:d7:99:f4:1e: 61:20:73:dd:65:32:77:db:da:7d:0f:e9:1b:94:e9:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:d9:47:a2:83:91:b6:60:cc:f0:56:52:b2:6b:e1:c8: 66:93:bf:c1:9b:b0:6e:34:e6:59:fb:bb:6d:bb:f7:12: 53:3c:95:00:e2:31:64:98:02:7d:58:1d:32:35:01:68: 10:fb:8a:24:5e:77:93:0b:24:65:00:67:7d:46:ea:6d: a7:ef:56:dc:92:59:71:f2:7a:f5:a3:41:53:9d:bd:c1: 0e:bc:92:ee:ed:ce:4b:fc:45:e6:01:87:51:b3:5f:cf: 73:ca:22:3e:66:7b:d3:0a:a5:9a:fe:20:4c:19:4d:45: f0:75:b7:d4:a6:a8:8a:5d:34:d8:b9:0b:43:b2:cd:50: 64:4f:0d:b4:6f:52:09:83:b5:46:91:a2:c7:d7:65:26: 1c:52:55:9e:c4:a0:59:86:ef:0f:76:e3:3c:81:79:34: 96:0a:d5:df:9b:ed:fb:30:c9:77:28:f6:1b:dd:5e:f4: 11:f1:f2:52:07:15:95:89:9f:e0:fc:d1:c6:37:e7:b9: 0c:56:06:d7:bf:35:b9:42:01:67:1e:ad:04:4d:a7:e3: 5b:1d:ce:16:ea:2a:72:90:90:04:58:40:3b:cc:6b:e7: b9:ee:4c:02:44:f9:6e:f1:96:36:ba:d0:49:74:a1:57: 86:3f:ad:f5:2b:b7:f1:ee:26:d5:27:4f:8a:6e:c9:2d Fingerprint (SHA-256): 8E:10:F2:48:AC:1B:33:83:17:D2:71:40:B1:8B:59:14:40:FE:4D:AA:BF:4A:F0:CD:0D:68:47:14:D1:FA:22:31 Fingerprint (SHA1): A1:C7:7E:DD:B4:1F:C2:08:A0:C4:30:44:BB:60:1A:1A:27:2D:5D:D7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #326: Certificate Key Usage Extension (1) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:55 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:02 2021 Not After : Wed Nov 03 00:08:02 2021 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:da:6c:4e:47:6e:77:04:d3:b0:00:cf:0a:df:11:1b: 3c:f5:12:76:3e:4e:4b:fe:d8:ab:dd:cf:91:e5:00:9c: e5:2d:e6:4b:66:60:6a:e5:ce:45:10:a7:8f:64:27:51: 08:23:1b:a5:e4:8a:e7:b0:36:79:75:94:e0:66:88:8e: fb:fd:8b:3e:5d:06:30:12:dd:b0:a6:70:2c:16:31:a5: a2:91:41:4c:37:d8:61:e6:e8:30:fb:1b:a5:9f:9a:27: 1a:c4:8d:80:c2:2d:b5:88:6b:71:8c:4b:fe:35:4d:64: 58:71:a4:bb:6c:1a:10:75:c0:ce:cf:83:6f:b9:fd:74: 0c:c0:8c:0b:8b:4c:65:dc:85:9c:d2:11:e4:ee:20:87: 60:51:10:4c:e2:fa:8e:d0:eb:ed:02:3a:f5:3d:44:51: b2:e8:95:76:db:ee:3c:3d:d5:bd:c8:11:51:66:89:08: f8:6e:56:bc:d1:f3:4c:c4:27:2f:8c:15:9d:e6:f1:d6: 84:2d:22:78:e5:31:9c:ae:94:5b:db:b4:66:73:d2:0d: eb:fc:a8:f8:88:c1:90:84:75:1f:e6:a1:53:73:a2:11: 51:bd:bd:93:de:d6:41:6c:d0:aa:f6:0a:f6:ef:d2:18: ac:b4:b0:bb:cf:ac:4b:7e:08:b7:f6:f1:7d:43:3f:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:15:82:ab:f4:10:24:c0:c7:44:aa:3f:cb:b8:92:1a: ed:00:a5:02:62:d9:7f:c0:80:38:e5:37:16:5b:7b:69: bc:77:b2:4f:f1:66:50:a4:96:88:79:4f:f0:d9:de:72: d2:49:33:79:37:01:c9:79:b3:70:84:83:07:0a:ce:ec: 0d:ec:e3:f4:60:00:27:e1:18:fa:21:82:26:75:ec:1c: ca:ad:90:73:98:9a:d7:63:6f:fb:03:02:14:ac:a2:44: e9:1a:82:a3:ca:f2:b9:4a:87:df:77:f6:5b:26:67:d0: f6:a4:71:c2:a8:dc:1b:82:ba:77:af:21:63:8f:5b:80: cf:7a:9e:7e:e2:76:7d:f1:fe:0c:2f:9c:2c:a9:bd:8a: 85:c8:88:6d:5e:7c:27:e8:5a:6b:fb:6f:bc:e6:52:8a: e5:1c:8d:c1:d8:e4:c7:d9:e3:e0:24:a7:f1:4e:96:d0: f2:d0:f3:b4:93:8d:b0:9f:85:71:08:89:02:ab:26:34: 5a:4a:3f:ee:7e:64:34:29:ce:ef:1e:24:52:cb:52:6e: 1b:5c:c9:9b:26:39:e1:cc:52:d4:02:d1:e6:1a:2c:8b: 7e:0f:a4:62:bf:a4:e0:2f:6b:7f:59:7c:6b:d7:92:fa: 0e:e3:ea:94:3b:18:50:d4:d8:03:19:f7:f8:b9:85:58 Fingerprint (SHA-256): 77:D7:DF:40:0F:B0:05:F0:C4:6D:08:25:CD:A9:EA:07:A8:FD:50:63:E6:D1:E4:00:58:16:05:20:BF:27:68:6D Fingerprint (SHA1): 91:13:E9:90:B7:E1:35:02:05:A7:D5:46:FF:D5:3D:FA:BF:22:F1:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #327: Certificate Key Usage Extension (2) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:57 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:03 2021 Not After : Wed Nov 03 00:08:03 2021 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:ba:b7:6a:b3:0d:e4:51:90:7d:4a:74:1f:de:17:da: cf:15:bd:e9:d9:b5:5a:a1:ac:26:cd:10:2f:3f:93:27: e7:d7:52:40:09:d0:65:b1:f7:02:c3:80:5c:cb:da:a3: 8b:63:17:57:a8:26:d9:13:42:5a:b5:0b:9c:d1:df:8e: 4e:18:ae:0b:38:e4:93:ae:e7:7f:9a:3a:84:36:69:f3: ef:dd:39:7e:d5:c0:13:dc:50:a6:ef:04:44:23:b1:3f: e5:7e:96:63:8c:44:8e:a9:48:6c:24:cf:db:42:33:a7: 0b:0c:46:89:2c:04:84:ab:a9:26:cf:28:c2:81:61:d9: 7e:b6:53:8e:3e:1e:cc:df:4a:9c:82:ff:a2:32:0d:fb: 27:e9:2b:73:95:9a:11:5c:4d:07:cb:7a:94:20:6c:08: 2e:6e:c4:d6:0f:77:12:2f:d1:9d:19:41:98:36:42:1b: 10:25:28:ce:ac:b7:ec:8c:ed:64:8b:ba:70:45:79:66: 1c:9c:97:a8:52:85:ad:ff:0a:a7:44:94:e1:04:3c:ba: 4b:b6:cb:5b:43:0e:f9:29:80:af:e7:1a:16:3f:0c:6a: 2e:09:7c:4e:4c:0e:cc:cd:03:cc:3a:09:cb:5c:fc:39: 1a:b9:ca:56:97:1a:10:55:d2:2f:c4:ce:ea:e8:e5:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:f5:e7:ec:b8:45:3f:ec:53:a0:34:0a:e9:e4:7b:60: dc:fd:63:1e:a1:26:de:ad:e2:55:6b:4a:60:c8:2b:f1: 02:a2:d1:a2:a2:f4:c3:d6:0a:c2:40:8d:7d:f1:dc:fc: 40:c5:95:e0:0a:18:c7:0c:21:67:d7:11:99:25:6e:04: 99:34:ff:94:b6:42:00:15:8a:9e:51:29:db:e7:78:d5: 0f:be:15:00:20:ae:e5:ae:a7:44:43:52:af:55:53:64: 26:b7:a2:79:fc:17:47:d8:c8:5f:aa:9a:4e:20:44:26: 35:e5:39:a2:31:4f:e6:55:e7:62:cf:d2:87:2d:00:19: d1:85:51:82:06:94:f1:61:71:96:08:d3:41:b1:84:e6: a7:ae:34:28:88:f8:9c:70:ec:0e:a8:c8:0b:bb:93:6a: b6:71:83:12:71:f4:42:c3:11:a7:ed:a0:b9:59:90:0b: c8:3f:95:69:4c:bf:86:3d:8f:2e:63:e4:1e:3d:ee:67: 1f:83:6d:0a:10:9b:a7:5e:ff:13:fc:bf:ba:48:28:e6: 3c:08:33:87:c0:79:b7:f3:66:ff:87:84:b8:e0:49:95: 1c:df:20:dc:c6:d2:b5:43:4b:99:55:35:e0:97:63:84: a4:36:f9:7e:ea:53:da:03:13:fc:09:27:b0:09:97:b9 Fingerprint (SHA-256): 6A:56:B6:A0:A1:BB:12:89:EF:17:C5:7B:A9:1A:63:77:68:FC:D5:65:39:E7:D6:16:F1:60:F7:15:61:BF:74:67 Fingerprint (SHA1): 4D:E7:F7:45:BD:85:6E:41:57:6C:4A:03:27:2B:DF:B9:8A:44:F7:3E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #328: Certificate Basic Constraints Extension (3) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:59 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:04 2021 Not After : Wed Nov 03 00:08:04 2021 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:46:e4:2e:b9:83:1b:a3:0e:f4:29:4c:96:d2:d9:00: 63:8e:bb:39:70:8a:3e:08:4f:a8:90:06:dd:88:7e:40: 8b:cc:fe:f0:f0:7e:95:85:17:63:f4:f9:13:59:c7:85: e6:a9:bc:50:48:9d:5f:bb:09:4b:c9:84:2f:ab:dc:40: 76:0d:81:5c:48:a1:6e:41:7a:ee:ea:5f:fb:42:d9:8c: d2:f0:77:24:0a:92:6b:3c:d0:62:15:28:b4:e4:70:c2: 0b:15:6e:ab:f1:e9:9e:33:98:31:19:4e:0e:52:d5:ed: 9b:92:4e:85:4b:50:ff:7c:41:65:32:5a:3d:95:43:d0: b9:af:98:54:3c:c7:e0:11:60:da:ce:f4:3a:8d:3a:09: 6b:9a:13:99:c2:71:57:f5:b7:3b:e7:50:f7:ae:51:af: e7:2b:67:1a:90:a0:c5:f0:eb:ab:dc:dd:f2:19:1d:fa: 5b:65:0b:5f:e5:50:02:4f:c9:d9:5d:ff:13:ce:dd:78: 92:8d:bd:7b:b4:89:0e:3b:38:2d:1a:81:98:05:78:1e: 8f:3a:3e:09:6e:11:ec:2a:34:2f:b9:9e:86:a3:4e:8e: de:ad:aa:6a:51:74:bd:bb:f8:56:50:62:0f:9e:3d:45: fb:89:56:80:d4:24:93:11:9b:b5:23:ee:0f:86:ce:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:5e:e3:f5:f6:90:fd:83:f6:7c:d6:82:bb:e7:62:ee: 53:6d:2e:e6:3e:2f:a7:b1:d2:f5:8d:65:91:13:f7:40: ec:f4:5d:39:84:cc:ce:7d:58:da:fa:f1:c4:1b:5d:06: b4:03:43:d9:15:84:82:58:7e:93:05:74:aa:f1:d3:c7: 21:0c:53:f8:56:d6:e1:9c:be:ee:eb:9d:71:cb:71:64: 84:7a:43:9b:a6:63:72:cb:58:a9:aa:9e:b9:1c:86:78: 04:32:ae:f0:02:11:4d:83:a2:93:64:bc:f4:9e:63:83: c7:b8:63:66:8e:b5:ec:11:78:39:82:08:c9:ff:62:c0: 6f:56:cc:22:8f:4b:19:28:37:18:42:10:ae:3e:46:e1: 85:1f:13:10:22:b0:b6:9b:e1:99:cc:30:ba:d4:bb:de: 48:dc:3a:bd:6c:54:be:08:5d:8c:98:e7:35:83:54:4d: f0:82:40:1b:ad:da:cb:68:a5:dc:9e:65:de:03:04:be: 41:73:01:fc:42:fd:6c:24:a2:03:5c:5f:27:3b:1e:df: 83:9a:d5:8e:fa:ec:51:a2:0e:bf:c4:2a:0b:5d:42:16: d5:01:b0:48:6c:33:fd:7a:d7:cf:45:aa:9d:93:d3:b1: ad:04:12:aa:af:8d:c5:5d:e8:1b:b6:1b:b0:b1:26:4f Fingerprint (SHA-256): 9D:7A:62:6C:D8:11:FC:2D:42:02:3F:5B:97:02:99:4E:4C:9B:3C:07:4C:24:3D:4E:1F:37:90:CD:77:86:88:45 Fingerprint (SHA1): 68:DC:F3:9F:BD:20:51:C1:CF:F8:56:DE:7D:E8:67:6D:51:3A:C9:52 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #329: Certificate Basic Constraints Extension (4) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:5a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:05 2021 Not After : Wed Nov 03 00:08:05 2021 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:d9:25:0c:76:4d:10:e7:9a:ff:a6:17:7b:87:a4:01: 04:10:63:24:a7:c4:07:57:90:04:35:16:67:dc:61:60: e2:3e:9c:bb:69:da:c7:9a:ff:74:18:0c:13:f7:c1:1f: 27:6d:87:e2:94:c6:60:2c:5a:ed:2e:6e:fc:14:01:06: 56:9b:73:5f:59:2c:a4:f9:e7:b6:b8:b6:43:3f:98:f9: 6e:4d:72:36:ee:a8:6a:be:e9:6f:7d:45:9e:7e:21:ae: 7e:7e:f0:b5:60:9a:85:bc:e4:42:97:92:ee:cb:7b:07: df:33:af:50:45:29:4f:88:3d:26:27:60:b0:9d:66:a7: 40:2e:2b:05:b2:70:2e:9c:ec:10:97:51:68:40:c7:55: 70:c5:4d:83:8f:af:14:fb:99:b5:f2:60:6e:a1:2e:5d: d8:69:06:ed:60:c3:7c:fb:ed:0c:cf:9b:be:3e:ac:c8: 25:b6:36:dc:96:65:65:78:ba:c5:58:75:49:89:6e:33: e3:08:b1:91:8c:1e:5d:1a:5b:7e:fa:3f:2b:f3:a1:e0: 2a:2c:1f:5f:06:34:be:1d:7f:51:5e:17:1c:5e:0a:ae: f9:0d:b7:43:aa:e3:ab:93:c1:88:fa:4f:7e:9d:e2:c2: 7b:94:22:02:9e:4c:2c:0a:ea:12:ab:01:40:82:3e:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:56:3f:86:d8:aa:3c:ea:51:72:93:2c:0f:d0:bc:f4: 0e:59:64:74:24:ca:1a:cd:1c:02:2e:b9:c8:ee:86:0f: 9c:46:b9:39:cd:c6:9d:94:33:b0:90:57:e5:1d:5c:a6: b2:2c:9a:09:95:8f:46:b0:56:72:a5:f7:8a:03:37:5b: 72:6a:70:d7:13:50:d3:34:8c:10:4c:d9:28:b4:7e:35: 96:4f:af:4d:d4:e0:39:43:a5:48:ca:97:0a:fb:16:41: 42:6b:e9:55:5c:b5:9a:d5:3c:d0:ee:ef:d8:fd:00:bc: 60:db:65:0e:63:fb:fb:27:2f:c1:a0:29:7d:06:f3:c6: a8:c2:2a:4f:e4:0c:f8:e5:5e:63:e9:a1:78:00:d2:47: ad:91:40:a1:5f:fa:66:f1:10:20:5e:cb:7a:97:5f:dd: 8d:b3:e8:cd:be:77:71:b5:fc:17:1d:c0:68:c2:ec:6c: 0d:27:39:19:e7:51:2c:b0:80:5b:3c:57:ad:16:7e:92: d0:b9:99:d4:78:47:01:c4:76:27:49:cb:b2:77:a9:90: 9e:71:ec:18:54:66:0a:c5:80:ce:6f:81:98:67:3c:36: b8:fa:94:c0:20:31:90:ba:e4:ae:e9:d6:21:7d:f6:5d: 41:27:f2:72:30:18:34:20:0d:34:24:08:41:ea:45:95 Fingerprint (SHA-256): 42:B0:FE:4E:90:2E:5D:FD:D5:F3:35:57:BA:4B:A9:06:08:FF:A5:1D:E4:E4:6F:CD:85:70:B4:D8:3B:43:84:54 Fingerprint (SHA1): 65:5B:A4:E7:0B:B8:02:D7:24:B3:47:7E:AC:8D:80:88:9C:BC:AF:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #330: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:5c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:06 2021 Not After : Wed Nov 03 00:08:06 2021 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:39:4a:a8:94:4d:68:ca:f6:5a:fa:35:c1:ea:58:89: e0:87:b9:0e:18:93:41:d6:2a:2e:fe:11:6a:22:4c:86: 8c:ac:e3:a3:9e:9a:b8:d9:81:2d:b5:d7:95:90:27:fa: ca:e2:5c:43:6e:7c:4a:5c:03:0a:ea:1f:9a:c7:b7:e6: 41:57:61:70:0b:45:e3:55:ea:dc:f9:a5:9c:ad:ea:d6: 1c:96:ce:db:c9:d4:76:ce:a3:d0:3e:8b:f5:f9:99:96: d0:57:0c:90:52:a8:e0:8e:a0:f9:02:47:d4:1b:2e:f5: 90:64:06:d8:03:48:78:98:49:8f:ad:0a:94:f2:b1:d4: 59:c0:7e:42:66:a1:55:82:d5:06:fc:ee:57:f1:c8:fa: e0:ec:53:00:3c:88:be:bd:a3:c2:cd:06:88:45:38:49: 86:f6:b3:a6:c2:2b:b8:9d:69:0a:76:5f:23:4a:31:dd: 7d:20:98:eb:76:5d:56:68:8a:f3:3e:fd:6f:44:b9:2e: eb:07:fb:42:b8:6f:4b:4e:e3:93:a8:da:c8:5d:b8:af: 03:ad:a2:55:39:84:06:84:30:b0:25:11:6a:69:40:9d: 8e:a3:33:4b:98:a8:9a:36:5c:b6:05:5a:59:12:fc:31: b5:f5:6a:11:04:69:e3:02:a6:ad:b7:aa:f4:fd:15:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:d4:78:37:b6:24:9b:32:70:12:14:28:4f:af:1a:ee: b9:dd:b4:55:0f:3b:72:ec:aa:f0:a3:6f:d8:fa:d7:97: 6e:fa:87:3a:5f:31:7a:cd:20:4a:6f:95:25:12:4c:c7: 3a:ce:2d:f1:66:a0:45:83:4c:b5:94:fc:1c:0e:e6:f4: e5:f3:ab:77:ef:cb:9d:ce:5f:6d:72:63:b7:e8:d9:90: 24:87:59:79:c1:65:c6:5b:81:65:d7:c0:c5:3e:f0:58: d9:ac:e6:fd:f8:98:31:55:55:1f:3b:93:79:bd:76:e6: 9e:4c:61:b9:e3:49:3b:8f:b8:83:20:19:08:dc:49:9c: 96:b6:08:79:ad:5e:5f:5a:08:1c:4e:5e:58:5f:b5:26: 3f:12:f2:ec:c1:cf:ca:3c:b3:48:86:62:ea:57:92:3a: ad:6b:44:2a:c7:53:d0:77:f6:15:31:30:99:75:98:0b: ac:4d:7c:a1:20:1f:c0:16:cc:e1:6f:75:37:d8:76:0f: 4d:d4:dc:6f:66:ad:88:21:68:45:0b:8a:1f:cb:d7:e1: a9:eb:6b:64:1a:d9:84:d3:0a:ea:63:b2:3d:e7:c7:aa: 8d:18:22:a8:97:ed:3d:98:e8:7f:6d:7f:18:7a:6a:0f: cc:fd:e7:e3:49:5b:99:2d:ab:84:86:ab:13:cc:a2:cd Fingerprint (SHA-256): 20:1B:8B:51:CE:3B:9A:CC:35:B8:EB:8F:22:CF:97:8B:A4:D7:51:08:52:A2:84:E3:CE:6B:15:0A:64:EB:0C:66 Fingerprint (SHA1): F2:15:CF:69:47:8B:41:EC:F1:9E:74:2B:5B:CA:F9:37:0D:08:0D:F2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:5e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:07 2021 Not After : Wed Nov 03 00:08:07 2021 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:ae:e3:cf:e6:d5:c2:61:8f:23:85:06:11:d8:41:6e: 9f:9e:bf:67:b7:a7:c5:bb:0a:f2:9a:96:f4:60:3d:17: ef:35:c4:27:95:8b:38:e1:ff:f9:02:64:83:8a:be:b6: 70:4a:96:d4:f7:5b:e5:90:5d:ec:14:74:dc:28:9e:e6: 1f:66:a9:fb:1f:9b:a1:f7:57:60:dd:45:d0:d1:e4:7e: fa:19:b4:a4:c4:50:df:f0:22:e4:aa:d7:69:59:46:cc: 18:fa:c5:3b:a7:fc:d9:b6:b1:25:8c:89:b0:a0:c2:32: 13:5a:0d:5a:eb:9b:37:05:dd:41:ef:0e:99:29:c9:44: 22:33:7f:27:8b:f5:9b:ee:d6:f1:54:37:e0:c5:a9:9d: c0:ce:18:3a:73:e7:74:fb:a6:8c:3d:23:51:24:73:00: 8c:67:70:72:a4:73:ac:05:bf:56:ed:2d:7d:d5:36:5b: 3a:6d:f8:ed:c7:20:9a:91:76:1c:ec:10:65:19:fe:c1: 34:40:70:ab:7b:63:33:4b:1c:a9:63:9f:35:35:68:e9: 92:e7:0f:11:ff:d4:3c:3e:c9:97:56:66:5c:02:11:dd: 3a:05:2d:ee:04:c6:bf:d2:0f:bf:c7:79:e4:7c:31:92: 6b:f0:ee:2f:73:69:03:41:e7:88:d6:b6:d2:82:ac:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:8f:29:e5:fb:8a:97:e0:0b:a8:f4:9b:15:fc:97:5c: b1:52:65:63:a2:e3:40:31:32:c2:fb:80:78:7c:89:8b: fe:6d:05:30:00:eb:7e:44:e1:f8:b5:1a:ab:97:0d:09: d4:7e:ea:eb:51:a9:b2:36:fb:36:23:c4:a3:31:42:89: 4c:c9:3f:28:79:ce:ae:cb:92:ed:c5:ff:e2:2d:a7:0d: 1f:20:60:9a:b9:67:86:8a:25:03:ea:f0:52:e8:cb:5f: e4:dd:b6:e5:c7:47:fa:c5:0a:a9:57:d8:53:31:71:95: ca:98:f7:81:83:47:18:cd:c4:90:05:f6:f0:72:ac:01: 08:8e:2b:4d:a6:ff:36:3f:59:c4:6a:07:0a:8b:34:df: 56:65:43:cf:77:10:4a:01:64:52:0d:30:83:de:b7:dc: ed:fb:51:7a:14:bc:53:6a:82:76:b0:cb:69:46:a8:45: 10:c6:c0:8d:4c:24:f4:31:42:fd:e3:4f:36:8f:22:c0: 4b:e0:a2:23:5e:30:b4:bd:60:4c:b3:48:d7:26:3b:40: 37:2a:5f:f5:27:1d:5e:2c:7a:c2:a5:1e:d2:d2:9a:aa: 86:a9:98:dc:df:ef:a0:79:7b:80:ef:15:78:ca:8f:57: 2e:61:39:19:cb:55:11:5c:d0:db:d8:8f:1f:f5:18:15 Fingerprint (SHA-256): EF:42:F4:A5:BF:9D:CD:AA:3E:FE:50:D4:45:DE:DB:2F:95:46:5B:4E:81:EA:82:B3:AF:B5:8B:38:A0:02:2D:56 Fingerprint (SHA1): C3:E2:61:14:76:D4:00:10:E7:5F:C1:9D:28:0E:74:27:B8:C6:11:73 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: CRL Distribution Points Extension (7) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:60 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:08 2021 Not After : Wed Nov 03 00:08:08 2021 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:30:0c:48:25:88:28:db:34:41:4f:7d:71:65:a3:85: 9e:94:43:65:21:8a:f1:40:a6:67:18:22:16:21:1a:a8: d7:11:da:da:c0:59:47:b9:c5:42:6d:5a:65:6d:81:c2: 18:4b:b1:6b:db:8b:94:df:2b:01:89:78:6d:d5:67:ec: a3:57:a5:1c:60:b1:90:79:76:4a:dc:22:d1:8d:6f:b7: f0:02:5a:6d:13:3b:88:0d:1e:b0:49:75:a1:85:ce:f6: 13:66:b5:8d:81:bc:7a:0a:5f:65:8d:b2:1b:fd:d3:92: 8c:fa:64:8f:af:ed:df:94:f7:2f:e0:f7:b2:7d:8f:b7: 52:e2:b3:cf:6c:ae:46:80:3c:45:a4:b8:4e:44:a3:8c: 75:e9:91:0b:ee:99:61:e3:79:53:b9:af:c5:ab:73:96: ee:ce:f6:32:60:e0:f5:17:6c:a9:32:78:69:77:f5:38: 2c:87:09:99:89:b3:bb:0c:9f:07:cf:08:7b:68:71:d4: bf:a2:36:54:a2:0f:d4:65:0f:37:de:fb:e9:4e:09:b5: 5c:bc:43:6e:6a:bd:bf:42:e5:e7:9f:34:06:e8:16:66: 9e:35:85:1c:ef:28:17:79:1b:c7:22:ce:54:df:ea:06: 42:38:19:36:bd:b0:ba:c0:9f:25:20:e5:32:73:5a:fb Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:06:84:5f:3a:b4:4a:82:ab:8c:be:b2:4d:14:46:36: 43:89:c8:74:d9:da:4b:b6:8f:9f:30:1e:6a:15:fb:33: a3:5b:32:4c:c8:d3:af:60:af:38:e9:62:85:4c:b2:6e: 56:2c:9f:cb:3f:a0:9c:5e:9e:6b:33:32:d1:9d:9b:c3: 49:8a:c3:96:78:1f:fc:1b:cd:fa:29:08:c0:e9:9d:da: e2:74:eb:43:6a:15:a8:02:2e:fa:d6:bc:c0:b5:e2:b6: ca:57:15:e2:d3:19:db:f8:a1:0e:af:3e:02:bc:7e:49: f1:50:3f:01:a8:33:76:3d:ec:0a:77:bc:68:af:06:dd: f0:92:32:92:22:43:0f:77:84:8f:66:f9:7a:fd:1b:da: 26:53:70:32:5b:51:cf:db:8c:85:a4:31:03:35:c3:6b: 3a:05:fb:c6:c7:cb:6b:0d:bc:16:cf:cd:a8:6e:25:d4: 71:ef:cb:ac:e3:f5:63:48:83:39:20:37:87:b1:4b:b6: ef:c9:41:c6:ef:81:a4:22:79:25:35:3a:71:c4:bf:d3: 5e:c2:76:81:1e:7a:90:6d:94:96:bd:70:b9:cc:02:31: 83:46:b0:23:26:1a:fc:2c:57:92:dc:cf:3d:f0:c3:76: 4f:e2:25:cf:05:5e:1b:e6:8b:cf:97:b4:3d:e1:70:17 Fingerprint (SHA-256): AE:A3:C6:33:49:C7:87:13:39:15:C3:3F:1A:CD:ED:AD:B5:19:47:4B:88:2A:F3:4B:0B:61:DF:78:E1:FC:78:C4 Fingerprint (SHA1): 5F:1F:1C:12:57:CB:5E:FA:67:89:9F:4A:2E:22:06:71:41:15:63:B7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: CRL Distribution Points Extension (8) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:62 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:09 2021 Not After : Wed Nov 03 00:08:09 2021 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:d9:67:cf:b8:08:dc:33:77:e6:9a:70:3d:26:e5:41: 54:b5:d3:2a:14:af:ff:f3:6f:15:43:00:ea:88:38:2e: ca:d1:b6:3e:05:15:14:19:61:b2:6f:eb:73:94:3e:22: 5f:59:d8:5c:7c:83:73:1d:03:5c:2a:08:f3:4b:dd:87: 15:0d:4c:3c:8a:ae:bb:c7:94:4c:d4:c3:d3:75:a8:78: fd:47:9f:d7:86:4c:74:e9:f7:8f:bf:c7:48:56:b3:31: 9f:f9:93:ba:d9:3c:7d:3e:84:55:3d:5b:2f:4d:62:13: 0e:92:0f:db:0e:ff:cb:69:ee:a3:06:1a:fd:7a:10:00: f1:14:e0:53:9a:47:a9:c5:81:c4:0e:d4:12:71:37:49: 42:37:f6:5b:7f:c7:4d:db:6c:65:9e:6e:04:33:f9:76: 38:42:15:07:ad:fa:d1:f1:c5:fd:54:b3:52:50:c7:1a: 01:9f:5b:7e:3d:29:1a:24:79:80:c4:86:12:fd:2f:d4: 45:df:9e:42:fa:6d:c3:a0:5b:2d:f4:73:a2:f9:12:c9: 38:f7:2b:eb:ca:c0:51:be:9b:f9:13:56:8b:7e:cd:90: 63:ea:4c:60:ec:12:1d:13:fa:87:9c:7e:6d:0b:41:f7: 2f:76:dd:90:2c:12:6c:8e:ed:ce:8e:17:6d:ee:f9:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:a0:50:71:82:96:96:7c:77:74:bc:09:54:4d:4f:5a: 66:ac:ab:b0:67:bf:66:2c:a0:17:39:71:a1:62:fa:10: 16:be:95:25:72:e7:5c:1e:0a:1c:ba:6d:c6:9b:13:41: 73:b2:d0:ad:49:b3:26:28:4c:cf:57:0a:e2:37:9b:95: b9:cb:5f:52:b4:39:a5:7e:af:40:b3:8b:a1:c6:3a:2d: 4a:66:58:f2:d5:07:be:1b:4d:24:54:be:79:18:68:57: 22:37:48:64:4e:30:ab:20:5d:89:3c:74:ca:df:b6:37: ba:9b:09:c6:62:e6:fd:7a:82:77:79:89:ee:ef:9e:4f: 34:7b:e2:fc:4d:d1:9f:d2:6b:cb:e5:ac:7a:ca:dc:6f: 2a:95:45:67:be:d7:d9:f1:9f:f2:9d:af:ab:94:a8:96: bc:07:e4:8f:b2:1b:cd:53:1a:04:22:d4:ed:05:53:43: 29:ee:ae:de:dd:a6:ea:45:40:76:0e:cf:02:ae:cf:6a: 03:17:dd:94:c7:4c:9d:8a:d1:8c:52:53:03:81:59:33: 2e:43:65:d3:e0:49:b7:f3:40:0a:81:ad:0c:64:0e:b2: a2:d0:5c:31:69:e6:d8:b0:34:c3:f4:46:89:32:53:69: ee:c2:94:1d:c4:23:7f:b6:26:c6:c0:d5:09:26:d0:12 Fingerprint (SHA-256): 4B:47:0D:B4:6E:EA:35:35:A3:86:D9:AB:2F:B9:CC:70:13:73:7A:14:B5:F6:C8:59:16:0C:91:34:9C:C7:A4:C8 Fingerprint (SHA1): AF:E3:31:C6:C3:30:08:4A:66:96:6B:61:9D:CF:6C:31:2A:E7:6B:24 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Type Extension (9) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:64 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:10 2021 Not After : Wed Nov 03 00:08:10 2021 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:18:01:6f:67:d3:f8:87:13:bc:58:e5:a9:74:12:89: 30:01:8e:ee:bd:bb:2a:15:eb:93:8e:ed:ef:a2:4f:3d: d6:3c:fd:d0:49:d8:33:ec:8e:b8:a5:9c:1d:51:cc:47: f2:f0:f1:54:68:d3:b2:a0:e9:bc:12:c3:c1:f4:c3:50: 73:08:fe:03:3e:e3:c3:69:45:0c:d0:5e:d2:44:b5:43: 85:36:71:67:b8:b0:a5:df:b4:5a:68:19:cf:88:e1:98: c3:e7:a2:f0:be:eb:f9:f9:60:20:9c:8b:c5:94:03:f9: 76:c9:c3:f1:97:09:d4:fe:6e:89:0c:e1:68:6a:9c:c7: 45:b4:2b:89:af:71:10:29:f8:59:45:4b:5d:d4:d3:26: e1:61:45:3b:f2:59:a5:62:e0:43:1c:95:4a:2b:f8:df: 7b:d7:d7:6b:b7:95:cb:eb:2a:d3:16:ff:9a:d9:b8:29: 2a:0e:b2:1b:ba:60:ab:ca:03:ee:a8:12:42:d9:ae:b5: 99:c1:35:cc:3a:05:0b:1c:46:cc:78:13:be:f1:91:bf: 5f:64:fa:15:e5:b3:c2:61:ea:ab:87:d4:b8:8f:9f:59: 41:09:00:d7:8c:d2:43:e5:8f:2f:54:f3:0f:62:9e:7b: bf:e8:8c:fe:f5:41:e1:5b:18:94:e4:6b:12:a8:2e:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:56:94:1e:97:04:ee:a8:e7:c2:a0:34:e2:c9:f1:1f: e7:91:a1:f6:00:b8:63:d4:74:20:bf:f2:86:88:f9:f7: a5:45:a1:a5:01:d2:d1:96:89:2a:2f:dd:f7:2d:72:db: 21:8a:1f:b6:4c:44:7c:86:a6:c5:bd:bb:e4:af:77:a2: de:8a:f8:c7:1b:5e:27:ab:99:85:58:43:94:5b:38:12: 13:81:4d:8c:b2:c1:ad:7b:fd:5f:86:94:72:aa:a9:5f: 6f:c3:0b:c6:bd:66:ad:0b:b1:90:45:f3:03:d6:dd:ee: 54:23:97:93:27:4f:c6:40:cc:6a:33:45:3a:b8:0c:21: 5b:fe:c2:1b:b0:f3:a7:4c:8f:2c:24:d6:d7:07:36:b0: 9e:bb:e1:08:04:32:27:2a:8c:f2:07:94:b0:17:2a:4c: c3:a6:6e:29:49:a2:72:8c:1f:53:d9:67:dd:ef:0e:6e: 4e:1e:1a:e9:65:0e:d5:17:d0:2d:3b:5e:50:c7:65:d6: cb:22:cc:4f:dc:9e:c8:6b:40:e3:9e:49:d0:77:cd:e2: 7d:5b:5b:a0:a2:46:5d:b2:cf:99:e7:57:72:0e:8c:90: 8d:bc:6b:f1:03:86:22:42:a5:f4:bb:13:2c:fa:5a:15: be:73:e3:5c:30:1c:60:82:b1:00:eb:81:76:2b:d0:c0 Fingerprint (SHA-256): 6D:0B:A3:3E:1E:A3:59:F0:36:8B:8D:06:E3:E8:18:AD:C7:71:F9:8B:00:C5:F4:D2:6E:1E:A1:1A:21:D7:43:16 Fingerprint (SHA1): 17:E8:09:AF:03:D2:16:5F:71:2D:7B:BC:78:E2:E9:D0:0F:17:91:09 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Extended Key Usage Extension (10) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:66 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:08:11 2021 Not After : Wed Nov 03 00:08:11 2021 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:6c:23:eb:c7:28:f2:bd:7c:d9:b7:73:64:d0:1b:67: 94:18:ef:0d:a2:5e:28:b7:e7:35:b5:a4:67:54:1e:39: a3:a0:69:74:bb:29:13:d6:b2:99:7d:de:7a:bd:ed:8e: 9c:23:57:5c:47:a7:40:2b:c7:39:33:45:05:d2:14:47: c1:30:94:de:4d:0c:97:ce:63:f4:36:75:14:18:e9:68: 79:ac:5f:a6:67:ba:2f:8a:be:2f:20:ff:22:71:6b:0d: b9:fd:2f:d5:9a:61:3b:7c:84:4a:c6:78:53:5f:c1:e5: b3:db:bf:01:9e:85:b1:72:7d:b5:7f:0f:5d:ea:0e:51: ad:c6:cb:38:f7:d0:9c:1f:6a:ed:e1:ef:3e:ed:c4:13: 9e:b2:1f:d8:9b:84:5e:97:15:11:1e:8f:30:d4:1d:3e: 2f:94:10:2f:1d:89:5c:6d:4b:1e:cc:d8:12:d8:93:4e: 27:80:02:c0:7b:c0:02:b5:09:58:e4:e7:dc:8e:b3:58: d6:cb:cb:49:fa:4e:93:1c:6e:c9:b3:27:6d:00:f4:cd: 00:75:e1:6f:e8:9a:b5:00:e9:cd:f3:58:be:e7:51:0b: ee:88:d9:3a:e7:cf:de:61:9b:55:c4:5a:3a:fc:46:60: f0:4e:b1:68:85:36:96:60:33:02:5a:bc:44:a6:36:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:b3:9e:87:57:81:3a:18:c3:2c:84:b3:0d:ce:5c:fd: ab:e6:bb:b3:12:df:4e:00:87:27:e0:13:6f:be:94:c3: 74:80:0b:e3:59:57:a2:0a:e9:7e:67:4e:d0:d8:97:17: a0:47:33:f8:df:96:34:cd:7b:9d:41:12:e7:c1:bd:06: e6:3c:4c:fe:7a:27:e2:8c:c3:da:c1:1c:8d:78:46:82: 64:28:fc:9f:fd:60:09:74:47:46:19:ff:e1:7a:cb:5e: a6:2b:e4:31:68:1d:59:da:ef:2e:36:8b:21:17:1c:9b: b1:41:26:d9:c0:97:93:03:eb:13:17:4c:4e:b5:2b:99: 8e:77:6b:ec:17:dd:8a:48:59:93:5e:b1:f7:b7:a6:fa: b6:0c:ce:13:8e:b1:2b:88:8a:f7:00:50:9f:e1:16:c8: 25:d7:32:13:1c:78:73:b1:20:e4:66:10:f0:68:6c:ec: 40:d9:22:1f:38:61:89:a1:60:41:05:34:1f:ec:65:60: 90:18:c1:1c:ab:5d:44:14:84:c9:72:d7:59:b2:f1:65: 3b:c7:9d:35:d2:43:2d:ff:c7:d9:6a:ee:01:82:7b:36: 4d:ae:b7:32:6d:dc:93:09:2f:fa:69:e0:87:10:1c:dc: 76:04:69:84:50:ce:a8:a1:62:a6:c8:ba:4e:26:7f:75 Fingerprint (SHA-256): 30:1C:05:41:28:04:79:42:F8:3C:7B:9B:49:6E:BD:28:E1:B8:34:B8:39:20:FC:43:C4:37:82:AB:BE:BC:8E:3E Fingerprint (SHA1): 09:D8:40:C2:1B:4E:EF:F8:DE:C6:0D:F1:36:B5:92:E1:29:DE:DC:3B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Key Usage Extension (11) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #337: create cert with invalid SAN parameter (12) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #338: create cert with invalid SAN parameter (13) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #339: create cert with valid SAN parameter (14) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:6a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Aug 03 00:08:14 2021 Not After : Wed Nov 03 00:08:14 2021 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:c6:45:1e:41:fd:74:91:a4:45:8c:e3:2a:0e:84:9f: fc:f6:e9:a1:e1:c6:d5:13:d9:74:56:26:a8:10:59:1c: d8:72:91:b7:25:2e:fb:0b:06:c9:0d:c0:48:78:7f:d1: 6d:cc:f2:2a:5c:2c:4d:b5:b6:67:34:b6:d7:0d:48:24: 82:33:76:1e:0a:dd:cd:84:b2:90:41:67:70:64:52:72: 24:0a:b1:f5:b0:00:e2:76:8c:0e:5e:63:b9:b4:75:fe: f4:85:5a:6f:49:a9:1e:71:5f:25:e2:fe:4c:ad:fa:77: 05:6c:7e:e0:60:3d:e4:be:68:a6:56:17:d7:72:b6:12: 34:09:ea:70:38:99:7e:ca:32:07:09:98:14:eb:4c:e0: a9:42:61:6e:3b:c1:dd:eb:d4:4b:44:b5:f7:68:86:a1: 06:df:00:9e:0e:af:09:f3:a2:d8:2f:38:74:13:57:a7: ec:7a:5b:01:4e:3e:8c:0a:58:41:e0:da:ab:bc:0a:1a: e6:85:c5:d8:29:34:3d:1b:13:b2:e2:82:85:1b:1e:fd: 1e:8c:c0:4e:58:cd:1f:de:21:c2:cd:22:96:85:45:54: ff:f9:c5:de:1f:f3:0c:1b:5c:38:d8:19:39:74:33:ec: da:1d:99:a2:3d:2a:f7:4b:e7:ea:e3:39:42:52:5d:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:66:dd:3f:3b:fc:d0:69:93:10:9e:9b:22:12:88:77: a5:52:e0:8f:68:f5:10:c3:a6:db:3a:37:bc:17:b1:ed: 5f:db:2d:88:7f:26:e4:b3:2d:c8:fa:3c:55:d9:44:54: 38:61:f8:ed:fd:ad:ea:32:72:50:74:8b:39:6e:bf:df: bc:90:f4:bd:34:1d:3c:23:a0:36:fe:fa:9d:61:10:aa: 72:73:50:ac:88:e1:05:00:67:0c:ce:0b:d4:51:20:81: e3:5a:54:7d:71:44:c9:32:f6:02:84:39:34:60:46:40: 09:78:85:2a:96:48:d6:56:8f:fa:2a:50:f3:b9:42:45: 20:4b:ab:e2:07:7d:d4:78:44:37:db:cc:bf:95:2a:b0: 30:79:67:45:44:ac:25:a8:a7:92:b6:04:ee:6f:26:e7: 52:24:3d:94:cc:bf:d0:f6:2d:60:c6:86:5f:95:82:a8: 38:bd:5d:c6:dd:12:60:d7:1b:7e:72:07:c8:0e:ff:c4: 2e:30:94:8c:76:09:b0:98:87:5a:15:37:dc:9e:79:bd: 35:f6:96:6b:37:1d:b1:f1:f9:27:0d:9f:b5:4c:08:b3: 49:d1:7e:20:68:b1:62:b0:70:b3:cd:69:73:00:c0:0b: 1d:1e:6f:53:d5:f6:8b:47:45:10:0a:7e:a8:9a:48:22 Fingerprint (SHA-256): D0:19:FB:B3:9F:1D:24:21:32:E0:4C:5E:87:B2:A4:B6:D1:14:F7:1D:1A:37:45:95:79:B2:F1:FB:36:DA:D2:0E Fingerprint (SHA1): 0D:AC:A8:A0:9B:E5:EB:5B:CC:B4:5C:EF:84:3D:76:D3:3F:79:5E:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: create cert with valid SAN parameter (15) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #341: dump extension 2.5.29.17 to file /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #342: create cert with valid SAN parameter (17) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #343: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #344: create cert with invalid generic ext parameter (19) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #345: create cert with invalid generic ext parameter (20) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #346: create cert with invalid generic ext parameter (21) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #347: create cert with valid generic ext parameter (22) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:8f:71 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Aug 03 00:08:17 2021 Not After : Wed Nov 03 00:08:17 2021 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:f4:62:c3:bc:ba:1a:1c:98:5b:3b:37:9c:3e:03:3a: c6:69:1a:27:a9:56:b8:3f:b6:41:99:3c:dd:01:eb:5c: b9:29:59:b7:24:41:d9:87:24:fd:f3:2c:13:da:8e:ca: 92:e9:c6:c2:1d:5d:61:09:fd:26:ed:37:6c:6e:a9:5f: a5:56:2f:02:a2:56:f1:3c:cb:84:7e:ff:25:41:bb:21: 3b:9c:fd:f3:42:06:81:c5:6f:ac:24:6a:89:a4:0c:ea: ad:51:14:a7:38:5d:4c:d4:4d:9a:95:df:4c:70:a7:37: 63:c3:35:d7:8c:1c:e6:79:f0:ed:0b:91:06:2d:d1:ae: 48:53:92:ed:a5:84:fa:e2:0f:24:84:5c:23:99:f3:bb: 1f:ef:b7:94:69:32:2d:81:e7:93:3f:4c:cf:07:88:f8: 84:94:d8:ed:85:04:3a:09:03:47:3c:bd:4e:82:ad:56: 7f:1d:e3:a4:22:00:9b:b3:d2:9a:9a:54:fd:2a:ce:a4: c7:c7:7c:c1:8a:db:0b:d3:35:32:b5:62:8f:91:45:cb: 7f:dc:fe:c5:bd:58:09:8a:3f:c9:5d:6f:9e:a4:b5:23: 65:1d:d4:ae:70:7b:41:a0:75:48:92:1a:fb:55:73:8d: a4:40:33:aa:49:1f:91:1a:6d:8e:8e:55:0d:d3:60:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:d0:d7:36:4e:af:25:3c:4f:c1:58:fb:99:01:f1:70: c4:77:16:82:ed:4c:21:0f:98:23:18:da:1f:6b:be:5a: d0:49:d7:f6:6f:42:24:79:f3:6c:e5:7d:07:d5:7c:3e: 42:73:4a:08:c5:5e:3d:cc:13:5a:d9:4f:b3:bc:b9:a3: 60:d4:89:55:0a:21:fd:dc:74:9e:2a:dc:0f:1e:0f:dd: 4d:40:06:2c:f8:fc:d0:93:0b:01:04:54:06:05:2a:53: cd:d3:89:cd:42:a3:a9:6a:8c:f9:dc:f8:89:40:93:5a: 25:58:aa:ed:cb:52:d0:59:b3:94:65:53:c6:78:d2:64: e7:76:c5:c4:15:94:81:ba:68:7f:54:7a:ac:60:b0:07: e1:2e:04:86:77:07:ab:a6:20:8c:77:03:35:3b:19:fd: f7:8c:4b:52:7c:a4:88:3c:04:c5:f2:3c:f1:59:d3:56: 7c:bf:ee:46:04:8a:d9:e2:35:f3:59:4f:bb:6d:f0:98: 00:1c:83:84:ff:9e:4a:3c:4a:0e:19:47:f5:3c:43:43: 81:9a:06:e9:1c:60:61:1d:23:69:07:ca:3e:bd:6a:c8: 0c:3a:54:19:f0:ce:ae:57:ba:0f:fe:12:1b:87:84:94: 0f:73:0e:c2:3b:bf:6b:24:fb:3a:f8:c5:80:b8:65:96 Fingerprint (SHA-256): 02:12:EB:83:9A:81:D1:39:11:72:44:5F:B2:5D:D9:BB:52:B9:89:2B:A9:0E:65:70:11:8B:AF:0F:A1:3F:75:5F Fingerprint (SHA1): E0:EB:45:73:41:95:99:B8:86:99:5E:D7:CB:0A:17:27:77:06:CB:04 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #348: create cert with valid generic ext parameter (23) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #349: create cert with valid generic ext parameter (24) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #350: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #351: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #352: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #353: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #354: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #355: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #356: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #357: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #358: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #359: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #360: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #361: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #362: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #363: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #364: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #365: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #366: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #367: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #368: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #369: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #370: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #371: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #372: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #373: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #374: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #375: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #376: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #377: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #378: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #379: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #380: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #381: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #382: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -o root.cert cert.sh: #383: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #384: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #385: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #386: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #387: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #388: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #389: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #390: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #391: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #392: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #397: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #400: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw cert.sh: #401: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #402: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #403: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #404: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #405: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #406: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #407: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #408: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #409: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #410: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #411: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #412: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #413: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #414: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #417: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #422: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #427: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #432: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #437: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #441: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #442: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #443: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #444: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #445: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #446: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #449: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #454: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #458: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa ed8a0c34eab44286a3cd63d858c70b5ca8db9b3d NSS Certificate DB:localhost.localdomain < 1> dsa f49db15b8a824c3c01a7049316b6f16e84d249ec NSS Certificate DB:localhost.localdomain-dsa < 2> dsa 7396e577c80f843e2029b3cf3a8a3358eb19100d NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec 0830378b814c23f93e4c4329298f3abb021bda6c NSS Certificate DB:localhost.localdomain-ec < 4> ec 815e8f94d84c8f8bd538ebd3eba30fccb8afd9f0 NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa 6b8b05ae22484e0265becda0608d7ff9816199e1 NSS Certificate DB:localhost-sni.localdomain < 7> dsa 41740e771dbd6ffd10acb152f62272ca988f4402 NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa 7a8ec3c58dad895967e9535ce0a46d44b63fe366 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec b5326270cb7903a6edebc38dac2f9e7a0e0fd4cd NSS Certificate DB:localhost-sni.localdomain-ec <10> ec a13886b280b0e482d3eb9c51d23c8fe8980f354a NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa fc7193e01f85c3a20c8052f094c32b9e7d2b9068 (orphan) cert.sh: #459: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #460: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #461: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #462: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #463: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #464: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #465: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #466: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #467: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #468: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #469: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #470: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #471: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #472: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #473: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #474: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #475: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #476: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #477: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #478: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #479: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #480: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #481: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #482: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #483: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #484: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #485: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #486: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #487: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #488: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #489: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #490: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #491: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #492: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #493: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #494: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #495: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #496: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #497: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #498: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #499: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #500: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #501: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #502: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #503: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #504: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #505: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #506: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #507: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #508: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #509: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #510: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #511: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #512: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #513: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #514: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #515: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #516: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #517: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #518: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #519: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #520: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #521: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #522: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #523: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #524: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #525: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #526: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #527: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #528: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #529: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #530: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #531: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #532: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #533: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #534: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #535: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #536: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #537: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #538: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #539: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #540: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #541: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #542: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #543: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #544: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #545: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #546: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #547: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #548: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #549: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #550: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #551: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #552: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #553: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #554: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #555: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #556: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #557: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #558: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #559: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #560: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #561: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #562: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #563: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #564: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #565: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #566: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #567: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #568: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #569: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #570: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #571: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #572: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #573: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #574: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #575: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #576: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #577: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #578: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #579: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #580: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #581: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #582: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #583: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #584: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #585: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #586: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #587: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #588: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #589: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #590: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #591: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #592: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #593: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #594: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #595: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #596: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #597: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #598: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #599: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #600: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #601: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #602: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #603: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #604: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #605: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #606: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #607: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #608: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #609: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #610: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #611: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #612: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #613: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #614: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #615: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #616: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #617: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #618: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #619: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #620: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #621: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #622: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #623: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #624: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #625: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #626: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #627: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #628: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #629: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #630: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #631: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #632: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #633: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #634: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #635: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #636: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #637: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #638: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #639: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #640: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #641: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #642: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #643: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #644: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #645: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #646: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #647: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #648: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #649: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #650: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #651: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #652: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #653: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #654: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #655: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #656: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #657: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #658: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #659: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #660: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #661: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #662: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #663: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #664: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #665: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #666: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #667: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #668: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #669: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #670: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #671: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #672: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #673: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #674: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #675: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #676: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #677: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #678: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #679: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #680: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #681: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #682: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #683: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #684: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #685: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #686: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #687: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #688: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #689: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #690: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #691: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #692: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #693: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #694: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #695: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #696: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #697: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #698: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #699: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #700: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #701: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #702: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #703: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #704: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #705: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #706: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #707: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #708: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #709: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #710: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #711: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Tue Aug 3 00:09:17 UTC 2021 Running tests for dbtests TIMESTAMP dbtests BEGIN: Tue Aug 3 00:09:17 UTC 2021 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- certutil: could not find certificate named "TestUser": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #10: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/secmod.db" does not exist. database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/cert8.db" does not exist. database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/key3.db" does not exist. dbtests.sh: #11: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir ERROR: Directory "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/secmod.db" does not exist. database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/cert8.db" does not exist. database checked is /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/key3.db" does not exist. dbtests.sh: #12: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x 2 builder builder 240 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir -r--r----- 1 builder builder 1226 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r----- 1 builder builder 1426 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r----- 1 builder builder 582 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r----- 1 builder builder 707 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r----- 1 builder builder 881 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/TestUser-rsa-pss.cert -r--r----- 1 builder builder 872 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/TestUser.cert -r-------- 1 builder builder 274432 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/cert9.db -r-------- 1 builder builder 217088 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/key4.db -r-------- 1 builder builder 586 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/pkcs11.txt -r--r----- 1 builder builder 728 Aug 3 00:09 /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #13: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:49 2021 Not After : Mon Aug 03 00:07:49 2026 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:bc:ab:fb:42:ae:dc:19:17:53:2d:bb:71:db:19:f2: 26:84:12:a3:5b:f1:6f:37:e6:e6:37:9e:6d:43:45:03: 8b:c6:15:69:33:e2:1a:1d:f1:aa:58:93:15:c9:e2:67: c2:26:fc:59:9f:92:13:02:3f:2c:ef:ba:46:bf:6d:c0: 2f:e1:44:6b:78:3f:52:17:a3:e9:14:6b:f2:7a:29:2e: 21:68:d1:91:77:f5:54:11:91:b0:34:c7:b2:0f:fd:6e: b8:f8:18:9b:4c:ab:34:12:fd:de:93:af:68:6e:cd:be: 0f:ad:e7:4f:2f:da:49:a6:35:0c:4c:f2:0e:f0:39:ea: 0f:5c:61:ee:e9:ad:25:46:7b:55:e5:a8:6b:8c:bf:50: a0:c3:ef:db:7d:e6:e3:39:b6:fc:b9:5f:99:15:c6:0a: 4c:83:fc:d0:70:e9:d1:df:cc:5c:47:fe:d6:15:3a:c5: 3e:a5:58:09:5d:25:79:2f:fc:c3:6a:e9:c9:6f:07:54: 4f:48:e2:95:76:03:9c:c5:da:27:cd:1d:bc:05:3d:b6: 5d:45:14:e0:09:dc:5a:fc:9f:87:a7:05:38:4b:3f:40: 97:24:d5:b5:6e:04:a4:0a:76:80:5d:39:e9:f8:76:42: bc:ff:8f:85:3e:21:db:5e:7a:5c:52:02:15:35:e1:e9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:e4:74:dc:c7:60:5e:93:d5:30:75:5b:02:f1:fa:a3: c2:99:93:b4:15:5e:be:67:66:94:38:50:9b:ea:e2:ca: 6b:a3:a6:d7:4d:94:db:a8:eb:64:fe:f4:9d:20:e0:b7: d2:6a:8f:55:05:83:dd:1d:51:d2:c4:02:89:5e:5d:f9: 38:32:24:59:d7:5b:cb:62:40:51:27:0a:7d:07:c2:c6: 99:f4:d7:de:90:37:05:c4:6d:3c:27:69:97:06:d7:46: 99:98:cd:a8:ce:8b:ee:e9:4c:b0:9f:11:46:23:9d:84: f2:d4:3a:cc:4e:a3:20:ef:e4:e1:52:54:c2:9f:fd:cf: 3d:ed:25:2b:e3:31:5e:1f:57:e6:11:df:8a:61:91:40: b7:66:c2:e1:a3:95:40:1b:11:39:e9:20:cf:71:bd:a6: 2f:ce:57:df:1b:16:56:0d:80:6f:9f:fa:58:9a:8f:04: 61:74:c0:42:68:06:9f:58:bf:53:26:4c:2f:49:8f:a4: 45:d7:b9:be:f8:77:6d:93:f9:c9:4a:05:87:db:ab:fa: 19:fe:60:32:52:68:98:ff:92:21:2b:c0:00:fb:ae:1c: 2d:ea:b2:4b:3b:c9:c6:66:fe:b8:a3:d5:7d:fe:19:a9: 33:cf:88:9a:c9:0a:35:b6:39:c4:8b:e0:bf:d7:42:26 Fingerprint (SHA-256): E9:8F:C3:D3:14:64:C2:AE:B8:D8:4F:8A:B8:79:55:86:3C:A5:54:97:40:07:1F:63:58:0B:4A:EE:FB:B0:51:A9 Fingerprint (SHA1): 70:B2:1B:E7:2F:C0:72:86:6B:F7:D4:94:81:B3:15:B6:90:C5:F1:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #14: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { cb, 2e, 2b, 3a, ad, ef, ee, e5, 5d, ed, 1b, 2a, d1, 1f, 32, 78 0b, 78, 8f, ab, 54, da, 18, dd, c3, 54, bf, 25, 6e, 27, f3, b1 16, 1d, 0a, a9, 3f, 98, aa, 6a, b2, 43, c4, ae, 32, 64, b0, 4b 1d, a8, 90, 58, 8a, 92, 70, b4, f5, 6b, b0, bc, c0, 26, 67, 0e 9b, 3d, 77, e5, 85, 49, 19, 0c, d2, 85, f9, 7b, cd, c8, 35, f1 aa, 05, cc, 47, 4f, bb, 8f, 1e, f1, fb, f5, 19, f1, 27, 21, d7 e8, f0, 3a, f6, 0b, 21, d1, 2f, f7, 72, b6, 1f, 9b, 34, 0e, 16 6e, 50, 6f, 6e, 96, 1d, ec, 80, e2, 6c, 98, b8, 22, d7, 2d, 7d}; privKey CKA_ID = [20 bytes] { 2c, 65, ea, 56, 8c, 84, 6e, f7, a1, 9e, 2d, 45, 26, cf, f8, d5 4e, eb, da, 0b}; pubKey CKA_ID = [20 bytes] { 2c, 65, ea, 56, 8c, 84, 6e, f7, a1, 9e, 2d, 45, 26, cf, f8, d5 4e, eb, da, 0b}; matching public key found pubValue = [128 bytes] { 0f, 41, c8, 5b, 9d, a9, b3, 49, 4f, 2b, bf, b4, 18, 6b, 29, 84 43, fa, 15, 34, 30, 13, c1, 10, 5e, 8a, f7, e4, c0, 5c, 24, a2 fd, a9, 05, cc, 3c, 2b, 27, 81, 03, 76, 3c, 55, ae, 55, fa, 44 45, a9, 5f, 93, b1, 7e, b2, bb, e5, 15, 2b, 4a, 86, 7c, 31, 53 18, 72, 3f, 5a, 7b, ea, fc, 82, 94, 9c, c3, b6, 29, 70, 2f, 6f 83, 08, 47, 0f, e6, 67, f2, cd, 46, 9d, c9, 00, 09, a5, 1f, 55 9b, 2a, 3f, 18, 0c, ec, d1, 8a, 99, b1, 7f, 14, 1d, e5, 65, c5 56, 48, c3, c4, 92, e4, 28, 44, 16, 21, 8f, 11, 41, cb, 6f, 45}; privKey CKA_ID = [20 bytes] { 29, f5, fd, 39, 1d, 66, 85, 3e, ee, 5c, 52, 7c, ca, f7, 7b, 66 3c, 07, 18, 54}; pubKey CKA_ID = [20 bytes] { 2c, 65, ea, 56, 8c, 84, 6e, f7, a1, 9e, 2d, 45, 26, cf, f8, d5 4e, eb, da, 0b}; pubKey CKA_ID = [20 bytes] { 29, f5, fd, 39, 1d, 66, 85, 3e, ee, 5c, 52, 7c, ca, f7, 7b, 66 3c, 07, 18, 54}; matching public key found pubValue = [65 bytes] { 04, 39, cb, d6, 86, 84, 86, 4c, 24, 10, 74, fe, ab, 01, 0c, 99 87, 90, 39, f6, f2, 9d, 81, e3, e0, 51, 3a, b1, e5, 62, 73, fb eb, 05, 10, 41, ac, ee, 46, c2, 65, 73, 7f, 66, b2, 65, ef, 85 3d, b9, 46, c0, 7d, ff, 92, 89, 37, c4, 93, b6, 82, 5c, c6, f0 1c}; privKey CKA_ID = [20 bytes] { bd, 71, 13, d7, c1, 67, 75, 42, 5a, ed, e7, 3b, 3b, 42, 51, 1c ed, af, 69, aa}; pubKey CKA_ID = [20 bytes] { 2c, 65, ea, 56, 8c, 84, 6e, f7, a1, 9e, 2d, 45, 26, cf, f8, d5 4e, eb, da, 0b}; pubKey CKA_ID = [20 bytes] { 29, f5, fd, 39, 1d, 66, 85, 3e, ee, 5c, 52, 7c, ca, f7, 7b, 66 3c, 07, 18, 54}; pubKey CKA_ID = [20 bytes] { bd, 71, 13, d7, c1, 67, 75, 42, 5a, ed, e7, 3b, 3b, 42, 51, 1c ed, af, 69, aa}; matching public key found dbtests.sh: #15: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED TIMESTAMP dbtests END: Tue Aug 3 00:09:18 UTC 2021 Running tests for tools TIMESTAMP tools BEGIN: Tue Aug 3 00:09:18 UTC 2021 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4e:7c:7b:5a:55:32:0c:ae:77:2c:63:2d:d9:15:7c:8f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:1b:67:64:0c:72:2e:16:d5:4d:46:a3:de:75:c0: 6d:c4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:82:f9:ca:ae:5b:94:fd:4f:f9:c7:8f:6d:2d:6d:14 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:54:b3:c2:8d:81:b7:11:34:11:eb:cc:81:74:7c: eb:bd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Aug 03 00:07:24 2021 Not After : Mon Aug 03 00:07:24 2071 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:ce:a6:8b:d4:82:a6:3b:eb:69:f3:df:c6:16:59: 13:1a:8d:c2:c2:58:8e:60:ea:2e:09:8d:ef:e2:6c:99: 80:91:9a:e0:07:0a:1f:a0:07:b8:cf:9e:96:e6:56:b8: 50:47:18:3a:e9:8d:1c:88:fd:88:e2:68:e2:6e:1b:d7: 06:a3:3f:00:96:79:2e:20:76:1f:62:48:dd:0b:c8:52: 66:88:1c:40:fa:45:3a:3d:43:78:23:de:13:f9:ea:42: 39:5d:1c:3c:39:e8:1d:52:1f:f2:e5:10:7b:96:a7:46: c3:b1:bd:44:9d:7c:55:31:4e:14:09:84:e2:86:d1:10: 85:51:58:e2:aa Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:01:36:9d:3a:21:9e:2f:02:85:94:5e: d2:1a:64:97:6e:28:09:cd:aa:ef:47:55:23:a6:4a:40: 19:6e:cd:3d:7f:f6:ae:93:59:5a:e0:d5:40:88:43:04: 07:d8:d1:90:4f:e2:75:12:1a:22:28:4e:e9:52:b2:ca: 0e:87:e3:42:60:1d:10:02:41:77:1a:4c:83:d8:65:25: 0b:f5:6a:f3:18:08:a1:2b:53:8f:cb:77:7c:de:e6:e8: 76:b3:e9:d8:32:94:54:eb:68:cd:40:dd:38:dd:6e:f4: 4b:96:58:4d:d9:9a:59:a9:3b:74:5e:68:fa:8a:9b:00: e8:1e:7b:9c:a0:5c:82:c2:25:96 Fingerprint (SHA-256): C6:44:D2:EC:3D:94:73:27:0F:88:C7:DC:5B:0C:06:EB:08:34:77:B5:20:71:56:AE:24:DD:99:E7:44:85:86:4A Fingerprint (SHA1): EC:6A:91:C9:12:62:45:02:FF:32:01:C1:75:E8:0E:8C:3B:7A:4E:CB Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:21:4f:ee:b7:68:b6:9a:3b:5f:a1:09:1c:2e:61:43: ed:9b:19:bf:f6:42:c8:15:af:d6:6f:82:d6:14:e2:4f: c1:d5:4e:d2:c7:01:be:b6:37:7d:fa:77:4d:80:fa:a5: 95:73:81:6b:80:7a:f8:7a:00:9c:ad:69:be:2f:e8:43: 4a:2e:89:83:1f:3f:44:d3:c0:ee:20:28:f3:38:3e:4b: af:94:cc:12:42:94:3f:28:b3:68:da:c4:d8:24:ad:7a: 44 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:8a:ba:d0:90:c4:e3:66:7f:e7:10: 9e:a7:5c:d7:f5:e6:65:ee:34:5c:54:8c:76:e2:c6:68: 17:ad:6a:5c:0e:3b:eb:0d:96:d0:50:ed:10:88:51:a4: cd:2f:df:ea:d9:2e:a8:3c:98:6b:5e:3a:a2:31:05:08: 14:78:3e:ef:e3:d2:f1:02:42:00:e5:7a:a8:a2:ab:90: ad:47:75:14:c4:fb:42:1e:93:5b:24:18:61:00:7b:fc: 96:a0:2e:e8:d1:a8:e4:12:39:fc:b6:09:20:ef:ad:f1: 80:aa:ca:2b:0e:f7:1c:fe:f2:9f:c8:3e:ea:3e:14:5c: 22:13:9b:e5:3f:15:30:70:4f:20:69 Fingerprint (SHA-256): E3:B8:3B:03:98:5D:F1:E2:4B:19:AA:AE:C9:A1:CC:82:C8:8D:95:A7:4D:30:26:64:FB:0D:82:17:FF:03:FD:D9 Fingerprint (SHA1): 93:73:60:25:7E:C0:CE:0D:FE:89:D0:CF:51:90:DB:21:DE:56:E0:73 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #10: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ba:94:41:b3:b0:e2:c1:a7:c2:1f:f1:ba:7c:03:e4:0f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #11: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 5d:4d:ad:45:10:9f:0d:bd:f9:c7:27:76:5a:e3:41:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 21:11:d4:0a:57:d5:a1:d2:bf:d5:05:d9:df:f7:ce:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 92:13:c9:77:0d:97:29:7e:01:05:e8:6f:dd:e6:3c:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #26: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ab:90:15:a1:da:7d:63:ab:6a:e5:26:ee:95:4c:42:6e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:26:00:54:c0:4b:34:ca:e9:c7:d1:96:34:5e:13: fe:e8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #30: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 79:f0:22:73:6a:29:7e:99:41:7e:57:4c:58:9b:10:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #34: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ac:00:bd:b1:24:1f:8e:aa:9b:64:8e:0b:ca:60:00:ca Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e6:48:16:8c:70:4b:e1:54:77:73:af:d5:6f:09: 6f:49 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #38: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 0c:1e:58:cc:41:a9:c3:5c:75:c0:d0:47:22:e2:15:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: e0:d3:6f:51:66:6e:a8:2d:19:45:10:17:20:e0:ee:1a Iteration Count: 600000 (0x927c0) tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 20:ae:f1:5d:3b:df:35:c6:c9:94:b3:49:1f:f6:d3:45 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 54:7f:2a:57:9e:5a:11:ba:69:69:e1:67:fe:bd:67:af Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 36:06:73:87:ee:31:fd:5a:e0:2a:db:39:40:fd:37:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:18:df:9f:e6:cb:eb:19:ed:5c:60:ff:33:d8:76:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: d8:13:e5:84:fc:52:e5:e0:0d:fd:05:e1:3e:3c:29:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #66: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8f:62:38:6a:59:93:64:34:62:e1:a6:e3:59:77:ce:e0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8c:0a:51:f3:ca:5b:4f:2c:6f:c9:53:61:2e:09: ad:c7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #70: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ce:7e:e8:75:48:e6:b2:28:ef:da:ac:74:97:11:b0:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #74: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9e:6d:53:9c:a7:47:0c:8b:46:68:ec:d1:a7:ac:39:74 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2d:73:8c:bc:38:22:9c:45:07:00:08:2a:be:8f: 16:43 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #78: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5a:54:5d:e9:5c:16:ea:9b:c8:6e:5d:3b:01:82:e8:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 23:b0:ea:f6:95:c8:4e:f3:90:8e:e6:19:0c:6f:68:f8 Iteration Count: 600000 (0x927c0) tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 01:0a:ad:1c:32:89:f2:25:47:05:06:7b:8e:44:04:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 33:15:39:f6:b7:fa:62:88:99:c8:32:b0:26:91:65:9b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3a:d8:7a:f3:fc:9b:e6:41:c3:03:a2:f7:91:9f:05:d9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #98: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 40:6a:f8:f6:05:a2:57:1b:a4:d6:37:07:21:dc:7c:5d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cd:33:4d:df:96:84:79:80:ee:f7:b2:89:fc:f0: 67:15 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #102: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6d:45:50:b3:a4:b2:08:af:3d:03:32:69:2a:27:3e:6c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #106: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 60:58:51:84:8e:4a:27:0c:46:be:64:fa:2a:5d:06:b7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3a:eb:15:9b:0f:d5:1a:28:0d:a3:a0:8d:1d:2a: 48:ba Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #110: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fa:0c:83:55:b8:03:d6:e6:8d:5b:4e:b4:44:b3:3f:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e7:93:00:da:b9:cb:b1:57:0d:2a:3a:2d:b5:1a:a4:67 Iteration Count: 600000 (0x927c0) tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 75:18:3e:d5:3e:81:4e:71:2a:64:58:82:76:c3:56:c8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 81:0a:08:84:30:34:b3:73:3a:70:4c:98:6f:a0:7d:24 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: f1:5c:56:92:13:3d:e7:0b:19:89:de:7a:53:b9:e7:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d7:09:1d:61:20:4b:16:cd:52:b2:3c:5e:e4:f3:a8:76 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 98:c0:a3:8b:c1:32:c4:6b:f4:12:69:0a:59:88:c3:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #138: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bf:fc:cc:00:f4:21:db:14:bb:f4:cf:8c:cf:7b:3f:98 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:24:0a:be:40:47:9b:42:bf:fc:4c:dd:6c:07:70: 70:01 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #142: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: ce:be:e1:79:7a:8f:98:d8:47:f4:fa:0e:7a:d1:54:ef Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #146: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:60:65:be:e1:42:91:6b:01:f0:af:7e:cf:b6:a0:eb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3a:fe:c1:7f:b3:65:3f:e6:3c:62:10:2c:e8:1b: a7:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #150: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 25:4c:91:f9:49:bc:8c:cf:8a:00:ed:7b:48:f6:8a:be Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 53:1f:ce:67:63:51:08:4b:b9:91:1d:64:87:66:7b:d9 Iteration Count: 600000 (0x927c0) tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: df:bb:2f:07:30:72:ad:63:9d:c1:5d:b5:3c:17:32:78 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 26:28:be:aa:0b:ee:0c:78:ac:19:35:fc:cc:9a:91:1c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 0b:b7:a9:20:cc:cd:3a:33:6f:db:a8:d8:5c:81:23:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:ef:48:5f:5d:45:a3:d6:fb:2a:79:a5:9c:97:ce:54 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: d9:67:ca:df:88:cd:cf:3f:b5:58:0b:de:7b:a4:f9:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #178: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:9a:a9:46:ad:b7:4a:88:ae:25:17:a2:f2:c7:00:9a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0c:31:5f:12:74:e6:d1:36:8c:6d:ed:c8:1d:7a: 03:01 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #182: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: ad:e6:fe:04:ce:ae:3a:23:ef:6c:11:22:b7:02:02:78 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #186: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ca:e8:00:5d:6b:f5:18:45:18:54:82:f4:ec:d6:cc:bc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:17:a3:1b:f5:17:a5:a4:49:28:f0:57:ce:f6:37: c8:45 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #190: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 19:d8:31:07:e1:a8:98:20:3c:55:92:09:d7:fc:1d:1e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 5e:86:c8:f2:b6:b9:83:d8:d2:69:c3:d6:17:2f:6a:9f Iteration Count: 600000 (0x927c0) tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: e2:17:45:a4:f8:cf:d3:1b:f7:aa:56:45:2d:ac:d4:ba Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2e:a6:0c:75:57:f0:4c:5a:63:fc:41:1a:57:52:35:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 51:0f:e1:77:6a:3b:e4:b3:44:16:e8:84:50:61:df:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #210: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6c:5c:78:de:5f:65:4d:5c:18:f9:88:cc:1b:3f:1e:af Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4b:66:df:8a:46:10:ff:66:45:0f:bd:7a:b0:ed: 2f:6c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #214: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2d:ce:c0:f4:36:a9:91:ef:1d:bd:d2:8e:a1:fe:eb:ae Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #218: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:77:05:e8:87:26:99:1c:a0:74:60:c0:8b:a4:39:63 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:bb:a0:20:54:40:17:6d:a9:b5:f0:df:3d:2d:b4: 21:e4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #222: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1b:00:a2:16:8a:b8:f6:ca:b3:63:4a:32:e1:85:2d:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:ed:b2:ca:0c:5c:0d:45:b5:e3:d6:dc:d3:f7:15:fa Iteration Count: 600000 (0x927c0) tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:41:83:20:bc:d4:46:16:83:5d:4d:55:47:f2:fa:6a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 35:c8:ee:ad:1b:69:07:1b:c2:d9:a2:34:57:d0:0d:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 1f:ce:98:31:44:15:71:6b:63:9b:e0:e7:23:90:e2:32 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 24:65:a0:72:25:f1:0c:f3:92:1f:12:44:73:17:5e:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 19:7d:c8:84:8a:58:38:5b:ef:4a:07:13:07:74:53:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #250: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:71:37:e8:c9:a1:2b:a9:6c:2a:e5:a4:a2:7f:4f:fe Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2b:fd:81:dd:79:ce:7b:64:66:a0:7b:c0:6d:ae: c9:77 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #254: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 92:7d:50:f3:d5:93:d5:f8:0d:bf:8d:15:64:35:73:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #258: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2a:33:87:a4:35:a2:ab:7f:dd:a7:a7:eb:7b:fa:f3:22 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:43:de:6c:26:53:48:c6:b6:ce:2c:6c:da:7d:ea: 5d:0b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #262: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 87:aa:11:bc:eb:c4:b0:76:14:4a:16:c7:bc:09:08:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c9:34:17:a2:22:8a:c2:c8:d4:c1:36:7c:29:36:d5:a5 Iteration Count: 600000 (0x927c0) tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8e:d5:48:b5:c2:ba:5e:3e:ef:f8:ed:e6:c7:53:5a:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ff:d0:d9:62:5b:29:a1:4e:39:16:09:e9:60:1a:85:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a6:bc:78:32:bc:2f:89:38:8c:9c:e0:bb:55:c5:a0:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9e:72:a3:14:43:e4:da:61:e4:ff:db:38:59:c5:7f:62 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 43:08:6f:0c:92:8c:b3:7f:0b:82:d8:e5:74:65:d0:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #290: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c9:b6:56:8f:f6:69:a5:cf:ba:e0:31:e1:8f:91:8d:3c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7e:77:0c:bf:a9:78:d6:01:b2:80:b6:a9:d8:ca: 0e:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #294: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 67:2b:bc:bd:2d:9e:82:32:bd:19:66:1a:4b:2e:54:78 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #298: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 76:53:56:5d:49:73:3b:76:ac:4d:c5:2d:02:bf:4d:ca Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:67:d5:9e:9b:9e:77:92:1e:d6:71:f3:f8:6c:cf: b2:a7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #302: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: c3:f4:16:e2:43:44:21:f8:6f:88:2b:14:73:ba:b7:59 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 8d:9e:d1:6b:bd:1a:1a:d9:96:da:19:9d:21:6c:52:15 Iteration Count: 600000 (0x927c0) tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a4:a7:e5:64:6d:dd:36:20:dd:fb:7a:19:6d:07:b5:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 45:d0:86:fe:04:aa:e1:64:eb:21:fe:70:05:66:08:44 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #318: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: bd:1f:70:d6:c8:2d:ba:ae:cf:ab:39:33:a1:90:a1:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #322: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d8:63:f7:c7:71:6b:2b:9b:b1:19:ac:a8:a6:fd:53:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #326: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 63:b2:bd:99:83:0f:c5:b1:0f:2e:5c:ff:9e:e1:41:f1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #330: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 77:dc:a5:fb:b1:83:4b:6f:91:02:93:be:3e:13:55:5c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7b:33:da:f3:cf:13:8e:57:b7:e5:a0:bd:ed:f3: a3:30 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #334: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9c:18:7f:5a:83:e6:a3:cd:21:1a:fb:5f:b5:f8:8a:f0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #338: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 25:04:2f:65:ae:76:f6:7a:de:55:73:c7:ca:ef:d3:17 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a5:25:51:bc:e3:ce:47:d8:9c:1f:d2:69:12:d9: d3:e2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #342: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 6a:bc:9d:4d:66:9d:9e:f0:6e:db:5b:c3:d3:32:6f:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 84:4b:13:d6:1f:12:ba:39:81:19:db:56:17:e6:31:22 Iteration Count: 600000 (0x927c0) tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 18:92:b9:33:2c:1b:68:76:4b:3a:23:94:e6:fc:5e:72 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #354: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fd:0a:ca:cd:cf:aa:41:f1:7b:28:c3:f9:c8:d3:f9:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #358: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:f6:2f:23:d5:89:f0:71:c5:eb:db:75:fa:98:4e:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #362: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:bd:b0:ab:44:c7:8c:14:aa:be:cb:3d:d7:55:1c:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #366: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a0:1f:2d:da:b5:c8:45:aa:a8:3e:92:31:f2:c8:ce:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #370: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5c:01:03:73:88:23:d6:32:3d:41:c5:32:11:11:db:46 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9b:e3:9d:e7:de:19:52:f4:6f:ea:b8:33:6c:1f: ce:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #374: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:38:6a:d3:e6:da:4e:5d:93:c6:3a:54:91:16:e9:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #378: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:6d:85:c9:ec:9c:0c:c1:58:8c:62:db:87:b9:88:f0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ad:7e:22:cc:36:df:84:fe:0d:8d:a5:9b:1b:e1: 0e:46 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #382: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: db:96:37:c7:c7:e6:8f:fb:56:c6:e5:58:db:e5:7b:a4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ef:dc:a3:f2:62:54:24:35:52:b8:df:2b:1c:31:c5:fd Iteration Count: 600000 (0x927c0) tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0f:e2:a5:6e:3a:74:57:b5:61:09:2a:32:01:97:b6:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #394: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4e:e2:9a:7b:f3:4c:a3:d3:ec:62:78:93:33:20:b9:98 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #398: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 28:b1:4b:19:98:ae:1a:ae:72:f4:1d:a5:7d:f8:48:9a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:f8:9a:fc:ae:a0:5e:26:d4:ef:97:ab:b9:c8:2b: 7b:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #402: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1c:93:3a:14:eb:d6:6d:7c:eb:2f:96:68:f7:73:6e:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #406: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ed:3d:e2:60:87:40:b1:ea:3b:a7:ec:e2:b9:3b:97:ed Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:00:41:28:5d:ef:47:ba:4c:24:a9:1e:81:fd:07: 26:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 16:7d:af:75:a3:9b:ab:f8:88:3d:70:c7:e9:b1:2f:0f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:53:0c:dd:b3:8f:82:09:7e:87:ef:90:6f:be:e7: 20:40 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 45:4b:0e:00:2a:ec:e8:b5:a9:3a:13:2e:27:b6:7d:a2 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:be:64:22:e6:93:0b:ed:ea:cf:62:ee:df:59:7b: 35:21 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #418: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 43:0c:9e:3d:7b:e3:1f:be:17:30:cc:43:43:9c:0c:05 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:41:ea:62:92:91:66:2d:95:0e:b4:45:e9:62:24: 6c:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #422: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:3f:fb:6a:2d:a4:d3:95:b2:29:e8:3b:98:33:b7:e2 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:ef:ae:7d:29:79:ab:a2:02:06:ef:38:eb:f1:68: f0:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:9c:f2:3d:31:d9:c2:d4:d5:43:41:6e:f4:70:cc:75 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:95:f6:32:1e:4c:49:19:6e:d7:3c:05:9a:d7:4f: 99:00 tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 32:1e:1d:b1:0a:fc:ca:80:40:f1:90:c5:1d:91:e9:6a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:84:8e:58:1b:ee:fd:dd:b2:da:5e:af:f8:76:ac: b9:d4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #434: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c9:66:de:30:1d:38:49:26:f5:77:a9:15:74:e6:ac:6e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #438: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 57:b0:44:d2:1a:fa:bf:b4:10:04:05:71:36:0d:46:a4 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:ff:ce:1e:b9:25:b8:2a:e0:8e:75:f9:4d:68:36: c1:70 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #442: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ef:3d:93:92:93:ce:19:ba:4e:84:ab:13:54:d0:a2:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #446: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7c:76:23:6b:30:21:99:eb:fb:7e:f6:1c:88:e4:9e:fb Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:a2:5a:85:7d:56:85:3c:ee:9c:0e:a2:29:6b:3e: 08:39 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ee:d2:e5:41:b9:8e:c5:74:04:ed:80:75:df:d7:3a:0f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:12:0f:de:40:ef:a9:e4:6e:f6:8a:b1:e3:5f:a7: 41:6d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 06:9f:c3:f3:26:10:c9:01:bf:c7:41:72:97:c3:58:d4 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:2f:d1:a8:1b:a2:a5:5c:02:3f:61:bb:f3:5a:ae: db:16 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #458: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c9:fe:9a:0a:7e:10:01:8b:54:7d:ef:64:ae:f4:d4:cd Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ec:bd:cc:f5:dd:40:f0:d4:d5:70:d4:80:12:44: b1:c9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #462: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d1:74:cd:fb:a5:f3:b5:a7:4d:b2:18:ab:50:71:2e:72 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:e0:51:89:ce:3f:01:f7:6d:fd:ef:76:f7:c3:78: e9:13 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: aa:56:79:eb:73:07:49:be:19:e9:29:31:c3:1f:d9:e3 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:50:7d:c9:0d:60:05:97:4e:ed:71:94:83:52:0d: 7a:eb tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:f6:21:fd:92:f6:ec:ad:e4:53:14:10:0e:bd:44:60 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:d7:fd:6c:97:6b:37:9d:dc:4d:72:86:1b:a1:a1: a5:72 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #474: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 98:bf:2e:d2:4a:2b:5d:81:b3:87:f9:3d:b4:5e:65:cc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #478: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1f:67:0e:03:ca:de:a2:e6:a4:81:0d:96:65:3b:a7:5d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:73:48:32:3c:e6:c2:f0:80:05:af:ab:7f:7c:54: 86:b5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #482: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c3:a3:10:70:cd:e0:61:9c:a5:4a:47:b3:0c:21:8f:33 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #486: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e0:28:a5:09:f3:2c:0f:45:0b:bc:00:1e:db:17:44:cd Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:2e:51:4b:6b:11:9a:c9:ae:47:76:98:ab:0d:41: 28:e7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #490: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4d:33:39:c6:88:50:a6:fa:13:d2:4f:57:dc:0e:21:cc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:47:e7:ae:9d:f4:31:93:be:6a:dc:9d:3f:e6:9b: 21:3d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #494: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 47:a9:aa:93:d1:36:9c:d5:fc:99:3e:fc:d3:93:5a:66 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:58:36:5b:b1:04:4a:e0:d8:f9:bc:1b:51:cd:dc: 5b:c0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 44:e1:5d:f4:e8:43:fc:6a:b1:49:4f:64:79:ed:8a:6f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:15:d0:e6:84:27:9e:c2:88:7a:ed:5a:0f:fb:4e: 3a:17 tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1b:f5:9f:cc:34:f2:60:ec:1b:2a:5c:04:2a:b3:6e:7b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:e3:dc:22:79:d7:62:3f:78:7f:5b:d8:70:66:d1: 12:ca Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #506: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 19:8d:c9:14:e9:24:a5:83:af:0c:67:58:c8:3b:3f:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #510: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 69:44:0b:9b:a2:4b:c3:b0:94:d7:ed:9e:db:58:81:6b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:31:0e:23:47:4f:bb:5f:10:3f:2d:53:41:69:c2: b3:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #514: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 29:40:ee:ce:84:82:a8:15:13:21:18:62:02:07:6e:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #518: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 63:db:08:35:d3:c2:ef:7f:fc:3e:03:e8:32:83:61:64 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:a9:e8:b6:54:42:d6:5d:89:bf:a6:32:e4:94:07: 59:76 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #522: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e4:39:da:ca:69:30:c2:67:b9:c6:25:71:96:ed:52:6d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4c:4b:e7:ef:fb:51:33:44:11:52:fd:6c:e8:bf: 82:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #526: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 71:f1:7a:0f:97:dc:bb:e5:a0:72:d6:8e:89:00:aa:6b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:bd:0a:6a:bd:c5:63:6a:22:e9:e4:e8:c0:ac:c4: d7:c3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #530: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d4:4c:1c:5b:02:0b:64:df:d3:0c:db:fb:9d:1d:69:3a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4c:84:a8:ce:56:0a:9a:ee:c7:f5:57:f0:e3:13: c0:76 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #534: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 35:33:b2:d8:3f:96:3e:6f:da:c7:cd:06:b1:6b:aa:b7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:1c:14:e2:e7:40:76:a2:d2:62:56:2d:48:01:b6: c4:ea Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 00:0c:d6:b9:d6:90:aa:63:e4:07:1e:ad:ab:c9:65:50 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:5f:95:64:d4:76:60:c5:6e:89:fb:af:65:65:61: c5:ff tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ee:e2:47:dc:0e:45:2b:8f:b2:a6:06:3b:88:1c:c7:08 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:c8:72:ba:af:fe:ee:b0:37:ab:a3:e7:50:b1:9f: 02:35 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #546: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 42:a6:0f:83:dd:94:84:28:3c:4a:7a:9f:81:24:bc:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #550: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b5:8d:fc:9a:c0:cf:bd:12:3f:ab:fd:dd:ee:ef:64:e8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:9d:28:59:03:9a:95:8c:3c:bd:4b:81:17:2d:73: 51:b3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #554: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 79:f1:9b:a4:bc:3a:fa:fb:59:d2:84:38:d0:37:c6:05 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #558: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d8:4b:14:a4:d5:0e:6a:32:d2:93:85:31:a5:18:fd:3c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:2d:6c:7d:99:4a:5d:4a:17:be:68:4d:cd:3d:81: 49:2c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #562: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:0f:ac:dd:e2:eb:f4:60:da:6e:2e:b8:d3:c0:cd:d3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e2:5f:1f:ca:f5:70:3d:a2:5f:53:4d:a9:31:c1: 8f:59 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #566: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0e:8b:ae:21:eb:40:89:11:91:0d:27:ea:06:d3:c9:10 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:e6:c5:15:ca:de:b2:4b:1c:7d:b8:cf:20:80:01: a0:d2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #570: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3c:78:eb:28:67:cb:f0:2b:27:ef:3d:11:35:ee:af:8b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e3:fc:0b:da:24:ba:5b:bb:6b:5f:42:cd:86:98: 51:0f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #574: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 57:2a:c3:1d:62:12:95:c8:b0:67:39:a7:66:ba:80:b7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:1a:33:42:05:92:81:84:d9:b6:e9:92:32:72:52: c5:27 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 73:e2:74:d0:19:00:a1:df:33:d1:2d:3c:0e:72:6f:88 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:d5:00:84:49:4f:bc:a6:4f:d4:51:25:bb:29:d8: a1:86 tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 33:dc:3a:c9:a1:e4:9f:6f:69:65:97:ef:f0:e3:88:51 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:b9:ba:91:68:5e:3e:79:6b:34:23:45:30:af:f6: 19:a3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #586: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 25:48:f3:94:bf:7f:12:9e:68:f6:46:7a:77:b6:d6:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #590: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f8:e3:1f:89:56:d8:40:19:0a:f3:3f:ad:f5:17:13:c5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:ad:c4:00:a6:9d:74:81:6f:49:45:eb:12:7a:06: 69:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #594: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ad:27:ae:3c:f7:b3:3e:28:e2:0f:0a:10:49:51:f5:94 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #598: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:73:b1:90:fb:51:55:e5:2a:50:0f:c7:81:72:99:44 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:4f:e8:6c:d0:d1:de:5d:34:17:40:49:40:01:62: b6:6f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #602: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d6:e8:51:cb:18:82:3d:d2:82:ed:5c:71:9b:45:2a:2a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:74:fd:8c:5a:19:46:9c:96:1a:55:c9:1a:c5:bc: 79:0f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #606: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 03:d8:0d:2f:64:db:2d:7b:27:e3:2d:d4:0e:3d:d2:3d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:bd:c4:68:5f:c7:fe:ce:89:b6:38:86:79:3f:f4: 03:a4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #610: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 08:9f:21:ab:d3:9f:ca:fa:09:1b:c9:29:c9:23:0b:4c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f6:82:02:8a:21:6c:a2:84:0f:0a:ee:90:60:4b: 70:9e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #614: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3a:64:e2:74:4d:af:48:2a:39:22:71:39:6c:c9:44:92 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:f0:4a:56:53:ec:73:ca:2a:f2:dc:fe:a0:97:d2: 49:0d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7d:7b:53:e1:07:0b:ad:0d:c9:aa:17:6b:f2:91:6d:81 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:d2:6b:e1:c5:fc:d4:d4:7c:d5:07:96:3d:b5:4d: cc:b2 tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 13:53:6f:8d:5e:0f:55:37:ab:84:0d:dc:eb:4c:10:ea Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:ee:b2:73:2d:bc:5c:72:7e:28:05:cc:81:fc:eb: 2a:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #626: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 98:82:15:6d:af:b5:fa:7c:0c:a2:27:c0:f6:f6:88:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 92:57:b9:cf:97:bb:5c:4e:62:21:3a:2e:f1:46:af:bb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 72:ab:a3:c3:47:b5:1d:4e:a2:77:c4:33:4e:67:cc:ae Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 68:e4:2f:0e:05:48:af:65:14:21:b2:c9:12:02:a3:73 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a4:55:8b:5d:fa:12:98:1b:a2:a1:2b:04:c0:2b:06:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 86:db:98:99:9a:42:4b:cc:b8:03:2a:96:cd:d5:6a:9b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:99:1e:8c:05:70:a6:e4:3e:03:94:e3:26:3c:07:c8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7e:12:b5:5f:d2:00:88:d8:e5:20:3e:b0:92:b9:c6:2d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 02:ac:c8:e1:a8:42:80:3c:bc:60:df:f4:e1:8f:b7:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d0:5d:03:45:89:8b:18:8c:cd:cc:ad:5b:88:68:96:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5c:06:91:5b:a4:74:83:40:fa:9b:e4:88:7b:80:4a:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:23:3d:09:14:a5:a5:5b:c4:92:c0:bc:54:b1:b3:0e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #674: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0b:fd:2d:b2:d7:d7:06:66:4a:28:9b:40:ad:18:00:4c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:00:27:2b:4d:ad:d8:37:d8:f7:de:06:a4:0b:7e: b1:cc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 13:83:84:00:cd:59:77:d1:44:d7:2b:e5:c8:f8:f6:c0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:21:74:41:d6:94:f8:f9:b6:a6:7c:99:c9:98:bf: b1:3c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:44:19:cc:1d:b2:52:69:68:26:0a:24:7d:ee:cb:37 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:c9:62:7d:c3:5f:bf:01:f2:3e:52:47:8c:cd:b3: 51:5b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 98:6a:9f:14:4e:a7:6c:aa:b8:c2:2b:72:ca:7f:cc:1b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:4a:bc:c7:8d:d1:9c:52:c8:9c:cd:87:2b:ce:52: 15:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cc:53:53:90:af:2b:d2:a7:a2:cd:cf:b6:50:07:e8:41 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:29:35:32:9c:c9:39:d3:60:00:b9:63:1f:37:14: 2e:97 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:25:b3:3b:1b:50:69:e2:ed:36:75:74:27:98:19:4e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:48:bb:73:64:78:3b:d7:72:ba:f5:7a:fa:13:8d: 2e:45 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #698: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 36:ab:ef:ea:25:62:76:9f:69:bb:6c:d7:ff:cd:2b:44 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:24:a6:e3:3c:f0:f7:11:c4:dc:2e:7c:3b:b2:65: 12:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 09:0f:9c:f1:37:4f:f8:4a:7d:29:99:d9:e0:85:bb:1a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:f8:89:41:86:92:a5:ce:12:24:41:4a:46:96:d8: d1:b9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:07:ba:79:9f:9d:69:5f:5a:43:e1:21:c0:40:15:52 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:d7:0a:d0:63:58:83:31:4b:4b:2f:99:45:48:e6: 78:fa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 68:57:5f:79:48:bf:3f:6b:b2:08:8f:62:73:fb:4f:38 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:37:50:f1:e4:e8:6c:62:49:c4:ed:fc:38:e8:1b: e9:d9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 45:f8:1f:06:7d:24:51:7b:6e:15:a2:67:13:eb:ec:35 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:9a:ae:0b:ac:d2:75:ee:50:71:9e:58:0e:30:80: 28:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:default] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0c:21:e6:14:d1:e0:00:5f:63:0d:76:f3:e4:c4:83:0d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:ac:d0:c0:31:ec:70:f3:f2:67:c3:e8:c5:35:68: 74:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:14 2021 Not After : Mon Aug 03 00:07:14 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:7a:5c:de:6c:08:c9:ce:32:8f:b0:ae:79:e9:7b:97: ba:2a:c1:a9:03:ef:70:ad:be:eb:ee:f6:b5:90:42:09: bd:af:10:74:bd:65:83:a0:9d:08:0b:27:a1:74:99:90: 29:82:68:9f:de:a0:85:ca:b8:d6:7d:d4:27:46:cc:c4: 4f:3d:be:23:76:80:5d:e5:da:e1:1f:fd:e1:29:25:4b: e6:80:73:a1:7b:a8:00:49:1f:bf:03:34:2a:9b:bc:cb: 31:1c:4f:95:2d:20:44:f7:10:06:dc:5c:da:cf:8f:09: 4b:d9:4b:71:b7:a8:5e:27:19:a5:c5:b2:19:f3:83:88: 86:7a:25:fd:84:df:3c:3e:83:7b:fd:21:da:35:09:6e: 8d:aa:48:37:6f:14:29:a0:66:0b:7d:88:d0:72:9f:5a: f2:b8:f0:86:6b:66:50:96:5c:f0:a1:a6:58:1c:d1:be: c2:69:62:2d:42:c8:97:31:8f:eb:dc:17:67:73:29:13: 21:06:85:33:de:99:7a:10:e9:11:5b:33:e5:e1:78:9c: ef:40:ab:00:5a:58:42:10:cf:a2:bc:64:9b:46:74:a2: 43:bf:24:65:a7:25:4c:0b:0d:45:e1:d2:ce:02:71:91: 67:05:52:13:f7:99:f7:63:24:d1:6e:45:a7:5e:a2:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a1:cb:5a:f2:90:e6:b2:63:e9:ca:00:75:3b:8b:cc: 24:9b:82:db:ee:be:0e:61:15:60:ca:d5:4e:84:5a:71: 5b:ec:62:e7:b1:02:58:2e:ed:bd:b0:ef:0f:18:c9:e8: c9:d5:57:c0:87:1c:0e:96:4a:86:61:5b:88:62:20:a7: 52:2f:76:a7:e0:c1:57:e9:29:bc:a6:9d:fb:60:2d:7b: d3:6e:19:34:c7:73:ca:26:6b:db:07:fb:14:61:76:cc: e0:a0:2d:27:62:5e:84:35:dd:d4:5c:59:b2:0f:90:32: 68:92:2f:bf:e4:e1:00:a7:3b:2d:a7:8a:a5:6c:b6:dd: d0:b2:b3:cc:98:88:54:b8:90:ce:ef:a8:e2:09:31:7f: 53:9d:d2:01:1f:4c:d6:33:22:44:39:92:ca:82:bf:79: 57:72:6c:f9:67:6e:88:87:df:0c:3b:a4:a9:7d:81:14: 87:64:ff:5e:21:b4:c8:00:a5:64:8c:e8:08:6c:33:a1: 60:f1:e4:5d:c4:2d:0a:63:f9:98:1e:c5:c8:4a:ef:52: 96:84:b7:de:fd:3f:c5:a2:12:85:60:30:c4:73:a6:64: e8:e8:cf:68:8e:15:32:f9:6a:5e:91:43:3d:3d:f9:3d: 23:68:d9:63:26:d1:ad:e7:eb:df:2e:b7:92:78:dd:65 Fingerprint (SHA-256): AB:DD:2A:66:BD:AC:1E:64:7A:63:0B:5F:F2:F1:0D:EE:7E:2D:19:98:59:95:62:E6:76:2C:A6:B0:AE:4E:45:A0 Fingerprint (SHA1): 88:1D:D9:FE:94:45:96:AA:C1:B2:18:80:F9:C2:47:7F:25:FF:D1:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:07:47 2021 Not After : Mon Aug 03 00:07:47 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:05:14:4c:05:d5:da:48:38:a4:be:6a:cf:ba:95:3e: a0:ea:64:0d:83:ca:24:60:40:d1:d8:46:ed:fc:7c:57: ad:d1:cf:ff:cf:3e:48:96:0c:29:1b:24:6f:2b:38:e3: d1:6a:00:71:9d:e2:d9:11:44:e8:da:e1:3d:63:d6:67: 68:05:a1:6e:5f:56:04:da:57:f7:80:2f:58:45:6b:15: a7:c4:e2:41:4a:f2:cc:b8:6e:de:03:f3:cd:9d:93:43: a2:ab:82:e3:08:ec:b7:bd:c6:d6:d0:d4:3d:db:42:83: 6b:3b:2f:6e:5b:b0:7b:d1:c1:8f:dc:b8:e3:24:47:8b: c6:c1:1c:92:42:42:23:d6:c6:3c:14:27:13:c9:7e:43: 97:69:63:e1:eb:5a:04:09:0a:05:0f:02:56:e3:ab:70: 27:d2:1d:25:eb:7d:f5:f0:b5:14:24:86:5e:18:4f:5c: 4c:32:a6:0b:97:51:b6:01:0d:c4:78:2e:93:bd:42:91: 35:84:13:7c:e8:6a:34:25:52:dd:0a:f6:3d:39:62:fe: 58:ab:ba:98:58:10:31:e4:8c:2e:3e:a7:a5:71:1f:2f: ad:da:e7:e0:bb:aa:2b:30:b8:dc:8f:71:40:e6:94:2c: cc:59:36:95:56:d2:83:11:0c:bf:88:93:ab:90:b3:09 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:f6:84:2b:68:22:0c:99:29:e2:b2:bf:00:a9:cd:0d: b8:db:77:de:56:7c:b8:76:51:86:d9:8b:6b:13:2e:b5: 50:51:98:e0:be:4c:8e:eb:3f:e3:02:75:33:15:d3:1d: 56:99:3f:11:a3:0b:9e:f8:c8:e7:6d:a0:d3:e3:45:8b: ab:fe:31:67:84:a5:c2:6c:b2:05:93:ae:e6:65:e4:d1: fe:f9:9c:58:e7:16:8f:55:18:b6:17:3a:69:dc:d3:6a: 1b:32:60:01:db:f3:c3:a9:a6:bb:41:33:4e:31:93:3f: 97:cc:60:02:0e:3b:b6:c7:a5:df:3b:11:2b:d6:0e:5a: f2:2e:db:d8:40:47:7e:f6:67:f8:54:63:35:6b:b0:d0: a8:f8:e6:ff:e2:48:d0:bc:d0:ac:a4:4b:4d:23:60:11: a3:31:37:32:0e:39:a8:41:5e:74:75:cb:82:c3:17:3f: b5:4b:fc:f0:66:f4:69:a2:f2:cc:53:b0:5d:5c:f9:4f: 06:ef:2c:d8:92:73:67:66:67:fa:2e:8c:2c:de:08:4c: 4a:ad:19:3e:d9:ed:d0:78:19:e9:d5:9d:21:4d:f7:60: 26:1d:86:81:74:b4:b4:52:de:9c:e0:e2:0c:41:ff:cc: 43:d2:26:22:9e:55:1a:d5:22:8f:e9:c6:83:1d:7d:2b Fingerprint (SHA-256): B9:A6:A9:17:F0:BC:31:C4:0E:92:DD:7A:B1:1C:B6:F2:30:BB:EA:84:B0:28:16:1A:E6:E6:F7:55:E6:DA:6D:A1 Fingerprint (SHA1): AC:E8:18:49:F7:E0:0F:60:D1:0D:8D:9F:71:2C:8B:70:31:56:24:DA Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #721: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #722: Exporting with [default:none:default] (pk12util -o) - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #723: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #724: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #726: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #727: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #728: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #729: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #730: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #731: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #732: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #733: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #734: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #735: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Tue Aug 3 00:21:37 UTC 2021 Running tests for sdr TIMESTAMP sdr BEGIN: Tue Aug 3 00:21:37 UTC 2021 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/tests.v1.2438121 -t "Test1" sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/tests.v2.2438121 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/tests.v3.2438121 -t "1234567" sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/tests.v1.2438121 -t "Test1" sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/tests.v2.2438121 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/tests.v3.2438121 -t "1234567" sdr.sh: #6: Decrypt - Value 3 - PASSED TIMESTAMP sdr END: Tue Aug 3 00:21:37 UTC 2021 Running tests for crmf TIMESTAMP crmf BEGIN: Tue Aug 3 00:21:37 UTC 2021 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Tue Aug 3 00:21:38 UTC 2021 Running tests for smime TIMESTAMP smime BEGIN: Tue Aug 3 00:21:38 UTC 2021 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Tue Aug 3 00:21:56 UTC 2021 Running tests for ssl TIMESTAMP ssl BEGIN: Tue Aug 3 00:21:56 UTC 2021 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:21:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:21:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3049290 >/dev/null 2>/dev/null selfserv with PID 3049290 found at Tue Aug 3 00:21:56 UTC 2021 selfserv with PID 3049290 started at Tue Aug 3 00:21:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3049290 at Tue Aug 3 00:21:57 UTC 2021 kill -USR1 3049290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3049290 killed at Tue Aug 3 00:21:57 UTC 2021 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:21:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:21:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3049606 >/dev/null 2>/dev/null selfserv with PID 3049606 found at Tue Aug 3 00:21:57 UTC 2021 selfserv with PID 3049606 started at Tue Aug 3 00:21:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3049606 at Tue Aug 3 00:21:58 UTC 2021 kill -USR1 3049606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3049606 killed at Tue Aug 3 00:21:58 UTC 2021 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:21:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:21:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3049885 >/dev/null 2>/dev/null selfserv with PID 3049885 found at Tue Aug 3 00:21:58 UTC 2021 selfserv with PID 3049885 started at Tue Aug 3 00:21:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3049885 at Tue Aug 3 00:21:59 UTC 2021 kill -USR1 3049885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3049885 killed at Tue Aug 3 00:21:59 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:21:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:21:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3050024 >/dev/null 2>/dev/null selfserv with PID 3050024 found at Tue Aug 3 00:21:59 UTC 2021 selfserv with PID 3050024 started at Tue Aug 3 00:21:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3050024 at Tue Aug 3 00:22:00 UTC 2021 kill -USR1 3050024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3050024 killed at Tue Aug 3 00:22:00 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3050215 >/dev/null 2>/dev/null selfserv with PID 3050215 found at Tue Aug 3 00:22:00 UTC 2021 selfserv with PID 3050215 started at Tue Aug 3 00:22:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3050215 at Tue Aug 3 00:22:00 UTC 2021 kill -USR1 3050215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3050215 killed at Tue Aug 3 00:22:00 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3050400 >/dev/null 2>/dev/null selfserv with PID 3050400 found at Tue Aug 3 00:22:01 UTC 2021 selfserv with PID 3050400 started at Tue Aug 3 00:22:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3050400 at Tue Aug 3 00:22:01 UTC 2021 kill -USR1 3050400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3050400 killed at Tue Aug 3 00:22:01 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3050615 >/dev/null 2>/dev/null selfserv with PID 3050615 found at Tue Aug 3 00:22:01 UTC 2021 selfserv with PID 3050615 started at Tue Aug 3 00:22:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3050615 at Tue Aug 3 00:22:02 UTC 2021 kill -USR1 3050615 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3050615 killed at Tue Aug 3 00:22:02 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3050824 >/dev/null 2>/dev/null selfserv with PID 3050824 found at Tue Aug 3 00:22:02 UTC 2021 selfserv with PID 3050824 started at Tue Aug 3 00:22:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3050824 at Tue Aug 3 00:22:03 UTC 2021 kill -USR1 3050824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3050824 killed at Tue Aug 3 00:22:03 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3050945 >/dev/null 2>/dev/null selfserv with PID 3050945 found at Tue Aug 3 00:22:04 UTC 2021 selfserv with PID 3050945 started at Tue Aug 3 00:22:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3050945 at Tue Aug 3 00:22:05 UTC 2021 kill -USR1 3050945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3050945 killed at Tue Aug 3 00:22:05 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3051123 >/dev/null 2>/dev/null selfserv with PID 3051123 found at Tue Aug 3 00:22:05 UTC 2021 selfserv with PID 3051123 started at Tue Aug 3 00:22:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3051123 at Tue Aug 3 00:22:05 UTC 2021 kill -USR1 3051123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3051123 killed at Tue Aug 3 00:22:05 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3051277 >/dev/null 2>/dev/null selfserv with PID 3051277 found at Tue Aug 3 00:22:05 UTC 2021 selfserv with PID 3051277 started at Tue Aug 3 00:22:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3051277 at Tue Aug 3 00:22:06 UTC 2021 kill -USR1 3051277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3051277 killed at Tue Aug 3 00:22:06 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3051384 >/dev/null 2>/dev/null selfserv with PID 3051384 found at Tue Aug 3 00:22:06 UTC 2021 selfserv with PID 3051384 started at Tue Aug 3 00:22:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3051384 at Tue Aug 3 00:22:07 UTC 2021 kill -USR1 3051384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3051384 killed at Tue Aug 3 00:22:07 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3051498 >/dev/null 2>/dev/null selfserv with PID 3051498 found at Tue Aug 3 00:22:07 UTC 2021 selfserv with PID 3051498 started at Tue Aug 3 00:22:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3051498 at Tue Aug 3 00:22:08 UTC 2021 kill -USR1 3051498 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3051498 killed at Tue Aug 3 00:22:08 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3051600 >/dev/null 2>/dev/null selfserv with PID 3051600 found at Tue Aug 3 00:22:08 UTC 2021 selfserv with PID 3051600 started at Tue Aug 3 00:22:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3051600 at Tue Aug 3 00:22:09 UTC 2021 kill -USR1 3051600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3051600 killed at Tue Aug 3 00:22:09 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3051771 >/dev/null 2>/dev/null selfserv with PID 3051771 found at Tue Aug 3 00:22:09 UTC 2021 selfserv with PID 3051771 started at Tue Aug 3 00:22:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3051771 at Tue Aug 3 00:22:09 UTC 2021 kill -USR1 3051771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3051771 killed at Tue Aug 3 00:22:09 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3051891 >/dev/null 2>/dev/null selfserv with PID 3051891 found at Tue Aug 3 00:22:10 UTC 2021 selfserv with PID 3051891 started at Tue Aug 3 00:22:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3051891 at Tue Aug 3 00:22:11 UTC 2021 kill -USR1 3051891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3051891 killed at Tue Aug 3 00:22:11 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3052038 >/dev/null 2>/dev/null selfserv with PID 3052038 found at Tue Aug 3 00:22:11 UTC 2021 selfserv with PID 3052038 started at Tue Aug 3 00:22:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3052038 at Tue Aug 3 00:22:12 UTC 2021 kill -USR1 3052038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3052038 killed at Tue Aug 3 00:22:12 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3052270 >/dev/null 2>/dev/null selfserv with PID 3052270 found at Tue Aug 3 00:22:12 UTC 2021 selfserv with PID 3052270 started at Tue Aug 3 00:22:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3052270 at Tue Aug 3 00:22:13 UTC 2021 kill -USR1 3052270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3052270 killed at Tue Aug 3 00:22:13 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3052503 >/dev/null 2>/dev/null selfserv with PID 3052503 found at Tue Aug 3 00:22:13 UTC 2021 selfserv with PID 3052503 started at Tue Aug 3 00:22:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3052503 at Tue Aug 3 00:22:14 UTC 2021 kill -USR1 3052503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3052503 killed at Tue Aug 3 00:22:14 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3052632 >/dev/null 2>/dev/null selfserv with PID 3052632 found at Tue Aug 3 00:22:14 UTC 2021 selfserv with PID 3052632 started at Tue Aug 3 00:22:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3052632 at Tue Aug 3 00:22:14 UTC 2021 kill -USR1 3052632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3052632 killed at Tue Aug 3 00:22:14 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3052821 >/dev/null 2>/dev/null selfserv with PID 3052821 found at Tue Aug 3 00:22:15 UTC 2021 selfserv with PID 3052821 started at Tue Aug 3 00:22:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3052821 at Tue Aug 3 00:22:15 UTC 2021 kill -USR1 3052821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3052821 killed at Tue Aug 3 00:22:15 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3052926 >/dev/null 2>/dev/null selfserv with PID 3052926 found at Tue Aug 3 00:22:15 UTC 2021 selfserv with PID 3052926 started at Tue Aug 3 00:22:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3052926 at Tue Aug 3 00:22:16 UTC 2021 kill -USR1 3052926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3052926 killed at Tue Aug 3 00:22:16 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3053016 >/dev/null 2>/dev/null selfserv with PID 3053016 found at Tue Aug 3 00:22:16 UTC 2021 selfserv with PID 3053016 started at Tue Aug 3 00:22:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3053016 at Tue Aug 3 00:22:17 UTC 2021 kill -USR1 3053016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3053016 killed at Tue Aug 3 00:22:17 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3053098 >/dev/null 2>/dev/null selfserv with PID 3053098 found at Tue Aug 3 00:22:17 UTC 2021 selfserv with PID 3053098 started at Tue Aug 3 00:22:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3053098 at Tue Aug 3 00:22:18 UTC 2021 kill -USR1 3053098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3053098 killed at Tue Aug 3 00:22:18 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3053216 >/dev/null 2>/dev/null selfserv with PID 3053216 found at Tue Aug 3 00:22:18 UTC 2021 selfserv with PID 3053216 started at Tue Aug 3 00:22:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3053216 at Tue Aug 3 00:22:19 UTC 2021 kill -USR1 3053216 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3053216 killed at Tue Aug 3 00:22:19 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3053326 >/dev/null 2>/dev/null selfserv with PID 3053326 found at Tue Aug 3 00:22:19 UTC 2021 selfserv with PID 3053326 started at Tue Aug 3 00:22:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3053326 at Tue Aug 3 00:22:20 UTC 2021 kill -USR1 3053326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3053326 killed at Tue Aug 3 00:22:20 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3053437 >/dev/null 2>/dev/null selfserv with PID 3053437 found at Tue Aug 3 00:22:20 UTC 2021 selfserv with PID 3053437 started at Tue Aug 3 00:22:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3053437 at Tue Aug 3 00:22:21 UTC 2021 kill -USR1 3053437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3053437 killed at Tue Aug 3 00:22:21 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3053618 >/dev/null 2>/dev/null selfserv with PID 3053618 found at Tue Aug 3 00:22:21 UTC 2021 selfserv with PID 3053618 started at Tue Aug 3 00:22:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3053618 at Tue Aug 3 00:22:22 UTC 2021 kill -USR1 3053618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3053618 killed at Tue Aug 3 00:22:22 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3053741 >/dev/null 2>/dev/null selfserv with PID 3053741 found at Tue Aug 3 00:22:22 UTC 2021 selfserv with PID 3053741 started at Tue Aug 3 00:22:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3053741 at Tue Aug 3 00:22:22 UTC 2021 kill -USR1 3053741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3053741 killed at Tue Aug 3 00:22:22 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3053843 >/dev/null 2>/dev/null selfserv with PID 3053843 found at Tue Aug 3 00:22:23 UTC 2021 selfserv with PID 3053843 started at Tue Aug 3 00:22:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3053843 at Tue Aug 3 00:22:23 UTC 2021 kill -USR1 3053843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3053843 killed at Tue Aug 3 00:22:23 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3053963 >/dev/null 2>/dev/null selfserv with PID 3053963 found at Tue Aug 3 00:22:23 UTC 2021 selfserv with PID 3053963 started at Tue Aug 3 00:22:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3053963 at Tue Aug 3 00:22:24 UTC 2021 kill -USR1 3053963 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3053963 killed at Tue Aug 3 00:22:24 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3054057 >/dev/null 2>/dev/null selfserv with PID 3054057 found at Tue Aug 3 00:22:24 UTC 2021 selfserv with PID 3054057 started at Tue Aug 3 00:22:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3054057 at Tue Aug 3 00:22:25 UTC 2021 kill -USR1 3054057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3054057 killed at Tue Aug 3 00:22:25 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:22:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3054148 >/dev/null 2>/dev/null selfserv with PID 3054148 found at Tue Aug 3 00:22:25 UTC 2021 selfserv with PID 3054148 started at Tue Aug 3 00:22:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3054148 at Tue Aug 3 00:22:26 UTC 2021 kill -USR1 3054148 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3054148 killed at Tue Aug 3 00:22:26 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3054264 >/dev/null 2>/dev/null selfserv with PID 3054264 found at Tue Aug 3 00:22:26 UTC 2021 selfserv with PID 3054264 started at Tue Aug 3 00:22:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3054264 at Tue Aug 3 00:22:27 UTC 2021 kill -USR1 3054264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3054264 killed at Tue Aug 3 00:22:27 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3054403 >/dev/null 2>/dev/null selfserv with PID 3054403 found at Tue Aug 3 00:22:27 UTC 2021 selfserv with PID 3054403 started at Tue Aug 3 00:22:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3054403 at Tue Aug 3 00:22:28 UTC 2021 kill -USR1 3054403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3054403 killed at Tue Aug 3 00:22:28 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:22:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3054531 >/dev/null 2>/dev/null selfserv with PID 3054531 found at Tue Aug 3 00:22:28 UTC 2021 selfserv with PID 3054531 started at Tue Aug 3 00:22:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3054531 at Tue Aug 3 00:22:29 UTC 2021 kill -USR1 3054531 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3054531 killed at Tue Aug 3 00:22:29 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3054655 >/dev/null 2>/dev/null selfserv with PID 3054655 found at Tue Aug 3 00:22:29 UTC 2021 selfserv with PID 3054655 started at Tue Aug 3 00:22:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3054655 at Tue Aug 3 00:22:30 UTC 2021 kill -USR1 3054655 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3054655 killed at Tue Aug 3 00:22:30 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3054772 >/dev/null 2>/dev/null selfserv with PID 3054772 found at Tue Aug 3 00:22:30 UTC 2021 selfserv with PID 3054772 started at Tue Aug 3 00:22:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3054772 at Tue Aug 3 00:22:31 UTC 2021 kill -USR1 3054772 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3054772 killed at Tue Aug 3 00:22:31 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3054980 >/dev/null 2>/dev/null selfserv with PID 3054980 found at Tue Aug 3 00:22:31 UTC 2021 selfserv with PID 3054980 started at Tue Aug 3 00:22:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3054980 at Tue Aug 3 00:22:31 UTC 2021 kill -USR1 3054980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3054980 killed at Tue Aug 3 00:22:31 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055100 >/dev/null 2>/dev/null selfserv with PID 3055100 found at Tue Aug 3 00:22:31 UTC 2021 selfserv with PID 3055100 started at Tue Aug 3 00:22:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3055100 at Tue Aug 3 00:22:32 UTC 2021 kill -USR1 3055100 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055100 killed at Tue Aug 3 00:22:32 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055212 >/dev/null 2>/dev/null selfserv with PID 3055212 found at Tue Aug 3 00:22:32 UTC 2021 selfserv with PID 3055212 started at Tue Aug 3 00:22:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3055212 at Tue Aug 3 00:22:33 UTC 2021 kill -USR1 3055212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055212 killed at Tue Aug 3 00:22:33 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:33 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055303 >/dev/null 2>/dev/null selfserv with PID 3055303 found at Tue Aug 3 00:22:33 UTC 2021 selfserv with PID 3055303 started at Tue Aug 3 00:22:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3055303 at Tue Aug 3 00:22:34 UTC 2021 kill -USR1 3055303 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055303 killed at Tue Aug 3 00:22:34 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055427 >/dev/null 2>/dev/null selfserv with PID 3055427 found at Tue Aug 3 00:22:34 UTC 2021 selfserv with PID 3055427 started at Tue Aug 3 00:22:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3055427 at Tue Aug 3 00:22:35 UTC 2021 kill -USR1 3055427 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055427 killed at Tue Aug 3 00:22:35 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055515 >/dev/null 2>/dev/null selfserv with PID 3055515 found at Tue Aug 3 00:22:35 UTC 2021 selfserv with PID 3055515 started at Tue Aug 3 00:22:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3055515 at Tue Aug 3 00:22:36 UTC 2021 kill -USR1 3055515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055515 killed at Tue Aug 3 00:22:36 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055607 >/dev/null 2>/dev/null selfserv with PID 3055607 found at Tue Aug 3 00:22:36 UTC 2021 selfserv with PID 3055607 started at Tue Aug 3 00:22:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3055607 at Tue Aug 3 00:22:37 UTC 2021 kill -USR1 3055607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055607 killed at Tue Aug 3 00:22:37 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055717 >/dev/null 2>/dev/null selfserv with PID 3055717 found at Tue Aug 3 00:22:37 UTC 2021 selfserv with PID 3055717 started at Tue Aug 3 00:22:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3055717 at Tue Aug 3 00:22:38 UTC 2021 kill -USR1 3055717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055717 killed at Tue Aug 3 00:22:38 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055781 >/dev/null 2>/dev/null selfserv with PID 3055781 found at Tue Aug 3 00:22:38 UTC 2021 selfserv with PID 3055781 started at Tue Aug 3 00:22:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3055781 at Tue Aug 3 00:22:39 UTC 2021 kill -USR1 3055781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055781 killed at Tue Aug 3 00:22:39 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055874 >/dev/null 2>/dev/null selfserv with PID 3055874 found at Tue Aug 3 00:22:39 UTC 2021 selfserv with PID 3055874 started at Tue Aug 3 00:22:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3055874 at Tue Aug 3 00:22:40 UTC 2021 kill -USR1 3055874 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055874 killed at Tue Aug 3 00:22:40 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3055978 >/dev/null 2>/dev/null selfserv with PID 3055978 found at Tue Aug 3 00:22:40 UTC 2021 selfserv with PID 3055978 started at Tue Aug 3 00:22:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3055978 at Tue Aug 3 00:22:41 UTC 2021 kill -USR1 3055978 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3055978 killed at Tue Aug 3 00:22:41 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3056071 >/dev/null 2>/dev/null selfserv with PID 3056071 found at Tue Aug 3 00:22:41 UTC 2021 selfserv with PID 3056071 started at Tue Aug 3 00:22:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3056071 at Tue Aug 3 00:22:41 UTC 2021 kill -USR1 3056071 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3056071 killed at Tue Aug 3 00:22:41 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3056160 >/dev/null 2>/dev/null selfserv with PID 3056160 found at Tue Aug 3 00:22:41 UTC 2021 selfserv with PID 3056160 started at Tue Aug 3 00:22:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3056160 at Tue Aug 3 00:22:42 UTC 2021 kill -USR1 3056160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3056160 killed at Tue Aug 3 00:22:42 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3056250 >/dev/null 2>/dev/null selfserv with PID 3056250 found at Tue Aug 3 00:22:42 UTC 2021 selfserv with PID 3056250 started at Tue Aug 3 00:22:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3056250 at Tue Aug 3 00:22:43 UTC 2021 kill -USR1 3056250 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3056250 killed at Tue Aug 3 00:22:43 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3056361 >/dev/null 2>/dev/null selfserv with PID 3056361 found at Tue Aug 3 00:22:43 UTC 2021 selfserv with PID 3056361 started at Tue Aug 3 00:22:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3056361 at Tue Aug 3 00:22:44 UTC 2021 kill -USR1 3056361 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3056361 killed at Tue Aug 3 00:22:44 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3056465 >/dev/null 2>/dev/null selfserv with PID 3056465 found at Tue Aug 3 00:22:45 UTC 2021 selfserv with PID 3056465 started at Tue Aug 3 00:22:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3056465 at Tue Aug 3 00:22:46 UTC 2021 kill -USR1 3056465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3056465 killed at Tue Aug 3 00:22:46 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3056647 >/dev/null 2>/dev/null selfserv with PID 3056647 found at Tue Aug 3 00:22:46 UTC 2021 selfserv with PID 3056647 started at Tue Aug 3 00:22:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3056647 at Tue Aug 3 00:22:46 UTC 2021 kill -USR1 3056647 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3056647 killed at Tue Aug 3 00:22:46 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3056733 >/dev/null 2>/dev/null selfserv with PID 3056733 found at Tue Aug 3 00:22:47 UTC 2021 selfserv with PID 3056733 started at Tue Aug 3 00:22:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3056733 at Tue Aug 3 00:22:47 UTC 2021 kill -USR1 3056733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3056733 killed at Tue Aug 3 00:22:47 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3056830 >/dev/null 2>/dev/null selfserv with PID 3056830 found at Tue Aug 3 00:22:47 UTC 2021 selfserv with PID 3056830 started at Tue Aug 3 00:22:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3056830 at Tue Aug 3 00:22:48 UTC 2021 kill -USR1 3056830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3056830 killed at Tue Aug 3 00:22:48 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3056936 >/dev/null 2>/dev/null selfserv with PID 3056936 found at Tue Aug 3 00:22:48 UTC 2021 selfserv with PID 3056936 started at Tue Aug 3 00:22:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3056936 at Tue Aug 3 00:22:49 UTC 2021 kill -USR1 3056936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3056936 killed at Tue Aug 3 00:22:49 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3057105 >/dev/null 2>/dev/null selfserv with PID 3057105 found at Tue Aug 3 00:22:49 UTC 2021 selfserv with PID 3057105 started at Tue Aug 3 00:22:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3057105 at Tue Aug 3 00:22:50 UTC 2021 kill -USR1 3057105 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3057105 killed at Tue Aug 3 00:22:50 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3057234 >/dev/null 2>/dev/null selfserv with PID 3057234 found at Tue Aug 3 00:22:50 UTC 2021 selfserv with PID 3057234 started at Tue Aug 3 00:22:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3057234 at Tue Aug 3 00:22:51 UTC 2021 kill -USR1 3057234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3057234 killed at Tue Aug 3 00:22:51 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3057351 >/dev/null 2>/dev/null selfserv with PID 3057351 found at Tue Aug 3 00:22:51 UTC 2021 selfserv with PID 3057351 started at Tue Aug 3 00:22:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3057351 at Tue Aug 3 00:22:52 UTC 2021 kill -USR1 3057351 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3057351 killed at Tue Aug 3 00:22:52 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3057458 >/dev/null 2>/dev/null selfserv with PID 3057458 found at Tue Aug 3 00:22:52 UTC 2021 selfserv with PID 3057458 started at Tue Aug 3 00:22:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3057458 at Tue Aug 3 00:22:53 UTC 2021 kill -USR1 3057458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3057458 killed at Tue Aug 3 00:22:53 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3057554 >/dev/null 2>/dev/null selfserv with PID 3057554 found at Tue Aug 3 00:22:53 UTC 2021 selfserv with PID 3057554 started at Tue Aug 3 00:22:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3057554 at Tue Aug 3 00:22:54 UTC 2021 kill -USR1 3057554 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3057554 killed at Tue Aug 3 00:22:54 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3057657 >/dev/null 2>/dev/null selfserv with PID 3057657 found at Tue Aug 3 00:22:54 UTC 2021 selfserv with PID 3057657 started at Tue Aug 3 00:22:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3057657 at Tue Aug 3 00:22:55 UTC 2021 kill -USR1 3057657 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3057657 killed at Tue Aug 3 00:22:55 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3057741 >/dev/null 2>/dev/null selfserv with PID 3057741 found at Tue Aug 3 00:22:55 UTC 2021 selfserv with PID 3057741 started at Tue Aug 3 00:22:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3057741 at Tue Aug 3 00:22:56 UTC 2021 kill -USR1 3057741 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3057741 killed at Tue Aug 3 00:22:56 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:22:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3057821 >/dev/null 2>/dev/null selfserv with PID 3057821 found at Tue Aug 3 00:22:56 UTC 2021 selfserv with PID 3057821 started at Tue Aug 3 00:22:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3057821 at Tue Aug 3 00:22:57 UTC 2021 kill -USR1 3057821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3057821 killed at Tue Aug 3 00:22:57 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3057922 >/dev/null 2>/dev/null selfserv with PID 3057922 found at Tue Aug 3 00:22:57 UTC 2021 selfserv with PID 3057922 started at Tue Aug 3 00:22:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3057922 at Tue Aug 3 00:22:57 UTC 2021 kill -USR1 3057922 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3057922 killed at Tue Aug 3 00:22:57 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058014 >/dev/null 2>/dev/null selfserv with PID 3058014 found at Tue Aug 3 00:22:58 UTC 2021 selfserv with PID 3058014 started at Tue Aug 3 00:22:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3058014 at Tue Aug 3 00:22:58 UTC 2021 kill -USR1 3058014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058014 killed at Tue Aug 3 00:22:58 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:22:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058097 >/dev/null 2>/dev/null selfserv with PID 3058097 found at Tue Aug 3 00:22:58 UTC 2021 selfserv with PID 3058097 started at Tue Aug 3 00:22:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3058097 at Tue Aug 3 00:22:59 UTC 2021 kill -USR1 3058097 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058097 killed at Tue Aug 3 00:22:59 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:22:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:22:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058193 >/dev/null 2>/dev/null selfserv with PID 3058193 found at Tue Aug 3 00:22:59 UTC 2021 selfserv with PID 3058193 started at Tue Aug 3 00:22:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3058193 at Tue Aug 3 00:23:00 UTC 2021 kill -USR1 3058193 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058193 killed at Tue Aug 3 00:23:00 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058275 >/dev/null 2>/dev/null selfserv with PID 3058275 found at Tue Aug 3 00:23:00 UTC 2021 selfserv with PID 3058275 started at Tue Aug 3 00:23:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3058275 at Tue Aug 3 00:23:01 UTC 2021 kill -USR1 3058275 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058275 killed at Tue Aug 3 00:23:01 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058364 >/dev/null 2>/dev/null selfserv with PID 3058364 found at Tue Aug 3 00:23:02 UTC 2021 selfserv with PID 3058364 started at Tue Aug 3 00:23:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3058364 at Tue Aug 3 00:23:03 UTC 2021 kill -USR1 3058364 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058364 killed at Tue Aug 3 00:23:03 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058460 >/dev/null 2>/dev/null selfserv with PID 3058460 found at Tue Aug 3 00:23:03 UTC 2021 selfserv with PID 3058460 started at Tue Aug 3 00:23:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3058460 at Tue Aug 3 00:23:03 UTC 2021 kill -USR1 3058460 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058460 killed at Tue Aug 3 00:23:03 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058532 >/dev/null 2>/dev/null selfserv with PID 3058532 found at Tue Aug 3 00:23:04 UTC 2021 selfserv with PID 3058532 started at Tue Aug 3 00:23:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3058532 at Tue Aug 3 00:23:04 UTC 2021 kill -USR1 3058532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058532 killed at Tue Aug 3 00:23:04 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058620 >/dev/null 2>/dev/null selfserv with PID 3058620 found at Tue Aug 3 00:23:04 UTC 2021 selfserv with PID 3058620 started at Tue Aug 3 00:23:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3058620 at Tue Aug 3 00:23:05 UTC 2021 kill -USR1 3058620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058620 killed at Tue Aug 3 00:23:05 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:23:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058739 >/dev/null 2>/dev/null selfserv with PID 3058739 found at Tue Aug 3 00:23:05 UTC 2021 selfserv with PID 3058739 started at Tue Aug 3 00:23:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3058739 at Tue Aug 3 00:23:06 UTC 2021 kill -USR1 3058739 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058739 killed at Tue Aug 3 00:23:06 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:23:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3058890 >/dev/null 2>/dev/null selfserv with PID 3058890 found at Tue Aug 3 00:23:06 UTC 2021 selfserv with PID 3058890 started at Tue Aug 3 00:23:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3058890 at Tue Aug 3 00:23:07 UTC 2021 kill -USR1 3058890 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3058890 killed at Tue Aug 3 00:23:07 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:23:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059005 >/dev/null 2>/dev/null selfserv with PID 3059005 found at Tue Aug 3 00:23:07 UTC 2021 selfserv with PID 3059005 started at Tue Aug 3 00:23:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3059005 at Tue Aug 3 00:23:08 UTC 2021 kill -USR1 3059005 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059005 killed at Tue Aug 3 00:23:08 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059137 >/dev/null 2>/dev/null selfserv with PID 3059137 found at Tue Aug 3 00:23:08 UTC 2021 selfserv with PID 3059137 started at Tue Aug 3 00:23:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3059137 at Tue Aug 3 00:23:09 UTC 2021 kill -USR1 3059137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059137 killed at Tue Aug 3 00:23:09 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059269 >/dev/null 2>/dev/null selfserv with PID 3059269 found at Tue Aug 3 00:23:09 UTC 2021 selfserv with PID 3059269 started at Tue Aug 3 00:23:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3059269 at Tue Aug 3 00:23:10 UTC 2021 kill -USR1 3059269 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059269 killed at Tue Aug 3 00:23:10 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059386 >/dev/null 2>/dev/null selfserv with PID 3059386 found at Tue Aug 3 00:23:10 UTC 2021 selfserv with PID 3059386 started at Tue Aug 3 00:23:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3059386 at Tue Aug 3 00:23:11 UTC 2021 kill -USR1 3059386 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059386 killed at Tue Aug 3 00:23:11 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059492 >/dev/null 2>/dev/null selfserv with PID 3059492 found at Tue Aug 3 00:23:11 UTC 2021 selfserv with PID 3059492 started at Tue Aug 3 00:23:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3059492 at Tue Aug 3 00:23:12 UTC 2021 kill -USR1 3059492 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059492 killed at Tue Aug 3 00:23:12 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059593 >/dev/null 2>/dev/null selfserv with PID 3059593 found at Tue Aug 3 00:23:12 UTC 2021 selfserv with PID 3059593 started at Tue Aug 3 00:23:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3059593 at Tue Aug 3 00:23:12 UTC 2021 kill -USR1 3059593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059593 killed at Tue Aug 3 00:23:12 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059698 >/dev/null 2>/dev/null selfserv with PID 3059698 found at Tue Aug 3 00:23:12 UTC 2021 selfserv with PID 3059698 started at Tue Aug 3 00:23:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3059698 at Tue Aug 3 00:23:13 UTC 2021 kill -USR1 3059698 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059698 killed at Tue Aug 3 00:23:13 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:23:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059793 >/dev/null 2>/dev/null selfserv with PID 3059793 found at Tue Aug 3 00:23:13 UTC 2021 selfserv with PID 3059793 started at Tue Aug 3 00:23:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3059793 at Tue Aug 3 00:23:14 UTC 2021 kill -USR1 3059793 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059793 killed at Tue Aug 3 00:23:14 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:23:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059880 >/dev/null 2>/dev/null selfserv with PID 3059880 found at Tue Aug 3 00:23:14 UTC 2021 selfserv with PID 3059880 started at Tue Aug 3 00:23:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3059880 at Tue Aug 3 00:23:15 UTC 2021 kill -USR1 3059880 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059880 killed at Tue Aug 3 00:23:15 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:23:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3059958 >/dev/null 2>/dev/null selfserv with PID 3059958 found at Tue Aug 3 00:23:15 UTC 2021 selfserv with PID 3059958 started at Tue Aug 3 00:23:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3059958 at Tue Aug 3 00:23:16 UTC 2021 kill -USR1 3059958 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3059958 killed at Tue Aug 3 00:23:16 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060056 >/dev/null 2>/dev/null selfserv with PID 3060056 found at Tue Aug 3 00:23:16 UTC 2021 selfserv with PID 3060056 started at Tue Aug 3 00:23:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3060056 at Tue Aug 3 00:23:17 UTC 2021 kill -USR1 3060056 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060056 killed at Tue Aug 3 00:23:17 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060210 >/dev/null 2>/dev/null selfserv with PID 3060210 found at Tue Aug 3 00:23:17 UTC 2021 selfserv with PID 3060210 started at Tue Aug 3 00:23:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3060210 at Tue Aug 3 00:23:18 UTC 2021 kill -USR1 3060210 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060210 killed at Tue Aug 3 00:23:18 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060288 >/dev/null 2>/dev/null selfserv with PID 3060288 found at Tue Aug 3 00:23:18 UTC 2021 selfserv with PID 3060288 started at Tue Aug 3 00:23:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3060288 at Tue Aug 3 00:23:19 UTC 2021 kill -USR1 3060288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060288 killed at Tue Aug 3 00:23:19 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060408 >/dev/null 2>/dev/null selfserv with PID 3060408 found at Tue Aug 3 00:23:19 UTC 2021 selfserv with PID 3060408 started at Tue Aug 3 00:23:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3060408 at Tue Aug 3 00:23:20 UTC 2021 kill -USR1 3060408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060408 killed at Tue Aug 3 00:23:20 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060477 >/dev/null 2>/dev/null selfserv with PID 3060477 found at Tue Aug 3 00:23:20 UTC 2021 selfserv with PID 3060477 started at Tue Aug 3 00:23:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3060477 at Tue Aug 3 00:23:21 UTC 2021 kill -USR1 3060477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060477 killed at Tue Aug 3 00:23:21 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060564 >/dev/null 2>/dev/null selfserv with PID 3060564 found at Tue Aug 3 00:23:21 UTC 2021 selfserv with PID 3060564 started at Tue Aug 3 00:23:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3060564 at Tue Aug 3 00:23:22 UTC 2021 kill -USR1 3060564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060564 killed at Tue Aug 3 00:23:22 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060671 >/dev/null 2>/dev/null selfserv with PID 3060671 found at Tue Aug 3 00:23:22 UTC 2021 selfserv with PID 3060671 started at Tue Aug 3 00:23:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3060671 at Tue Aug 3 00:23:23 UTC 2021 kill -USR1 3060671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060671 killed at Tue Aug 3 00:23:23 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060753 >/dev/null 2>/dev/null selfserv with PID 3060753 found at Tue Aug 3 00:23:23 UTC 2021 selfserv with PID 3060753 started at Tue Aug 3 00:23:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3060753 at Tue Aug 3 00:23:24 UTC 2021 kill -USR1 3060753 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060753 killed at Tue Aug 3 00:23:24 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:23:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060835 >/dev/null 2>/dev/null selfserv with PID 3060835 found at Tue Aug 3 00:23:24 UTC 2021 selfserv with PID 3060835 started at Tue Aug 3 00:23:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3060835 at Tue Aug 3 00:23:25 UTC 2021 kill -USR1 3060835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060835 killed at Tue Aug 3 00:23:25 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3060967 >/dev/null 2>/dev/null selfserv with PID 3060967 found at Tue Aug 3 00:23:25 UTC 2021 selfserv with PID 3060967 started at Tue Aug 3 00:23:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3060967 at Tue Aug 3 00:23:26 UTC 2021 kill -USR1 3060967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3060967 killed at Tue Aug 3 00:23:26 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3061049 >/dev/null 2>/dev/null selfserv with PID 3061049 found at Tue Aug 3 00:23:26 UTC 2021 selfserv with PID 3061049 started at Tue Aug 3 00:23:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3061049 at Tue Aug 3 00:23:27 UTC 2021 kill -USR1 3061049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3061049 killed at Tue Aug 3 00:23:27 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3061122 >/dev/null 2>/dev/null selfserv with PID 3061122 found at Tue Aug 3 00:23:27 UTC 2021 selfserv with PID 3061122 started at Tue Aug 3 00:23:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3061122 at Tue Aug 3 00:23:27 UTC 2021 kill -USR1 3061122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3061122 killed at Tue Aug 3 00:23:27 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3061213 >/dev/null 2>/dev/null selfserv with PID 3061213 found at Tue Aug 3 00:23:28 UTC 2021 selfserv with PID 3061213 started at Tue Aug 3 00:23:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3061213 at Tue Aug 3 00:23:28 UTC 2021 kill -USR1 3061213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3061213 killed at Tue Aug 3 00:23:28 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3061340 >/dev/null 2>/dev/null selfserv with PID 3061340 found at Tue Aug 3 00:23:28 UTC 2021 selfserv with PID 3061340 started at Tue Aug 3 00:23:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3061340 at Tue Aug 3 00:23:29 UTC 2021 kill -USR1 3061340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3061340 killed at Tue Aug 3 00:23:29 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:23:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3061477 >/dev/null 2>/dev/null selfserv with PID 3061477 found at Tue Aug 3 00:23:29 UTC 2021 selfserv with PID 3061477 started at Tue Aug 3 00:23:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3061477 at Tue Aug 3 00:23:30 UTC 2021 kill -USR1 3061477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3061477 killed at Tue Aug 3 00:23:30 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:23:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3061599 >/dev/null 2>/dev/null selfserv with PID 3061599 found at Tue Aug 3 00:23:30 UTC 2021 selfserv with PID 3061599 started at Tue Aug 3 00:23:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3061599 at Tue Aug 3 00:23:31 UTC 2021 kill -USR1 3061599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3061599 killed at Tue Aug 3 00:23:31 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:23:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3061715 >/dev/null 2>/dev/null selfserv with PID 3061715 found at Tue Aug 3 00:23:31 UTC 2021 selfserv with PID 3061715 started at Tue Aug 3 00:23:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3061715 at Tue Aug 3 00:23:32 UTC 2021 kill -USR1 3061715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3061715 killed at Tue Aug 3 00:23:32 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:23:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3061869 >/dev/null 2>/dev/null selfserv with PID 3061869 found at Tue Aug 3 00:23:32 UTC 2021 selfserv with PID 3061869 started at Tue Aug 3 00:23:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3061869 at Tue Aug 3 00:23:33 UTC 2021 kill -USR1 3061869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3061869 killed at Tue Aug 3 00:23:33 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:33 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3061986 >/dev/null 2>/dev/null selfserv with PID 3061986 found at Tue Aug 3 00:23:33 UTC 2021 selfserv with PID 3061986 started at Tue Aug 3 00:23:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3061986 at Tue Aug 3 00:23:34 UTC 2021 kill -USR1 3061986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3061986 killed at Tue Aug 3 00:23:34 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062112 >/dev/null 2>/dev/null selfserv with PID 3062112 found at Tue Aug 3 00:23:34 UTC 2021 selfserv with PID 3062112 started at Tue Aug 3 00:23:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3062112 at Tue Aug 3 00:23:35 UTC 2021 kill -USR1 3062112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062112 killed at Tue Aug 3 00:23:35 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062222 >/dev/null 2>/dev/null selfserv with PID 3062222 found at Tue Aug 3 00:23:35 UTC 2021 selfserv with PID 3062222 started at Tue Aug 3 00:23:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3062222 at Tue Aug 3 00:23:35 UTC 2021 kill -USR1 3062222 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062222 killed at Tue Aug 3 00:23:35 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062305 >/dev/null 2>/dev/null selfserv with PID 3062305 found at Tue Aug 3 00:23:36 UTC 2021 selfserv with PID 3062305 started at Tue Aug 3 00:23:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #109: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3062305 at Tue Aug 3 00:23:36 UTC 2021 kill -USR1 3062305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062305 killed at Tue Aug 3 00:23:36 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062400 >/dev/null 2>/dev/null selfserv with PID 3062400 found at Tue Aug 3 00:23:36 UTC 2021 selfserv with PID 3062400 started at Tue Aug 3 00:23:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3062400 at Tue Aug 3 00:23:37 UTC 2021 kill -USR1 3062400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062400 killed at Tue Aug 3 00:23:37 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062484 >/dev/null 2>/dev/null selfserv with PID 3062484 found at Tue Aug 3 00:23:37 UTC 2021 selfserv with PID 3062484 started at Tue Aug 3 00:23:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #111: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3062484 at Tue Aug 3 00:23:38 UTC 2021 kill -USR1 3062484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062484 killed at Tue Aug 3 00:23:38 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062578 >/dev/null 2>/dev/null selfserv with PID 3062578 found at Tue Aug 3 00:23:38 UTC 2021 selfserv with PID 3062578 started at Tue Aug 3 00:23:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #112: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3062578 at Tue Aug 3 00:23:39 UTC 2021 kill -USR1 3062578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062578 killed at Tue Aug 3 00:23:39 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062679 >/dev/null 2>/dev/null selfserv with PID 3062679 found at Tue Aug 3 00:23:39 UTC 2021 selfserv with PID 3062679 started at Tue Aug 3 00:23:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #113: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3062679 at Tue Aug 3 00:23:40 UTC 2021 kill -USR1 3062679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062679 killed at Tue Aug 3 00:23:40 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062757 >/dev/null 2>/dev/null selfserv with PID 3062757 found at Tue Aug 3 00:23:40 UTC 2021 selfserv with PID 3062757 started at Tue Aug 3 00:23:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #114: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3062757 at Tue Aug 3 00:23:41 UTC 2021 kill -USR1 3062757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062757 killed at Tue Aug 3 00:23:41 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062845 >/dev/null 2>/dev/null selfserv with PID 3062845 found at Tue Aug 3 00:23:41 UTC 2021 selfserv with PID 3062845 started at Tue Aug 3 00:23:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #115: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3062845 at Tue Aug 3 00:23:42 UTC 2021 kill -USR1 3062845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062845 killed at Tue Aug 3 00:23:42 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3062946 >/dev/null 2>/dev/null selfserv with PID 3062946 found at Tue Aug 3 00:23:42 UTC 2021 selfserv with PID 3062946 started at Tue Aug 3 00:23:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #116: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3062946 at Tue Aug 3 00:23:43 UTC 2021 kill -USR1 3062946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3062946 killed at Tue Aug 3 00:23:43 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3063035 >/dev/null 2>/dev/null selfserv with PID 3063035 found at Tue Aug 3 00:23:43 UTC 2021 selfserv with PID 3063035 started at Tue Aug 3 00:23:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #117: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3063035 at Tue Aug 3 00:23:44 UTC 2021 kill -USR1 3063035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3063035 killed at Tue Aug 3 00:23:44 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3063129 >/dev/null 2>/dev/null selfserv with PID 3063129 found at Tue Aug 3 00:23:44 UTC 2021 selfserv with PID 3063129 started at Tue Aug 3 00:23:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #118: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3063129 at Tue Aug 3 00:23:44 UTC 2021 kill -USR1 3063129 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3063129 killed at Tue Aug 3 00:23:44 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3063213 >/dev/null 2>/dev/null selfserv with PID 3063213 found at Tue Aug 3 00:23:44 UTC 2021 selfserv with PID 3063213 started at Tue Aug 3 00:23:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3063213 at Tue Aug 3 00:23:45 UTC 2021 kill -USR1 3063213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3063213 killed at Tue Aug 3 00:23:45 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3063379 >/dev/null 2>/dev/null selfserv with PID 3063379 found at Tue Aug 3 00:23:45 UTC 2021 selfserv with PID 3063379 started at Tue Aug 3 00:23:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #120: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3063379 at Tue Aug 3 00:23:46 UTC 2021 kill -USR1 3063379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3063379 killed at Tue Aug 3 00:23:46 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3063588 >/dev/null 2>/dev/null selfserv with PID 3063588 found at Tue Aug 3 00:23:46 UTC 2021 selfserv with PID 3063588 started at Tue Aug 3 00:23:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #121: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3063588 at Tue Aug 3 00:23:47 UTC 2021 kill -USR1 3063588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3063588 killed at Tue Aug 3 00:23:47 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3063726 >/dev/null 2>/dev/null selfserv with PID 3063726 found at Tue Aug 3 00:23:47 UTC 2021 selfserv with PID 3063726 started at Tue Aug 3 00:23:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3063726 at Tue Aug 3 00:23:48 UTC 2021 kill -USR1 3063726 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3063726 killed at Tue Aug 3 00:23:48 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3063871 >/dev/null 2>/dev/null selfserv with PID 3063871 found at Tue Aug 3 00:23:48 UTC 2021 selfserv with PID 3063871 started at Tue Aug 3 00:23:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #123: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3063871 at Tue Aug 3 00:23:49 UTC 2021 kill -USR1 3063871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3063871 killed at Tue Aug 3 00:23:49 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3064035 >/dev/null 2>/dev/null selfserv with PID 3064035 found at Tue Aug 3 00:23:49 UTC 2021 selfserv with PID 3064035 started at Tue Aug 3 00:23:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #124: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3064035 at Tue Aug 3 00:23:50 UTC 2021 kill -USR1 3064035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3064035 killed at Tue Aug 3 00:23:50 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3064182 >/dev/null 2>/dev/null selfserv with PID 3064182 found at Tue Aug 3 00:23:50 UTC 2021 selfserv with PID 3064182 started at Tue Aug 3 00:23:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #125: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3064182 at Tue Aug 3 00:23:51 UTC 2021 kill -USR1 3064182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3064182 killed at Tue Aug 3 00:23:51 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3064299 >/dev/null 2>/dev/null selfserv with PID 3064299 found at Tue Aug 3 00:23:51 UTC 2021 selfserv with PID 3064299 started at Tue Aug 3 00:23:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #126: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3064299 at Tue Aug 3 00:23:52 UTC 2021 kill -USR1 3064299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3064299 killed at Tue Aug 3 00:23:52 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3064439 >/dev/null 2>/dev/null selfserv with PID 3064439 found at Tue Aug 3 00:23:52 UTC 2021 selfserv with PID 3064439 started at Tue Aug 3 00:23:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #127: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3064439 at Tue Aug 3 00:23:53 UTC 2021 kill -USR1 3064439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3064439 killed at Tue Aug 3 00:23:53 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3064577 >/dev/null 2>/dev/null selfserv with PID 3064577 found at Tue Aug 3 00:23:53 UTC 2021 selfserv with PID 3064577 started at Tue Aug 3 00:23:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #128: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3064577 at Tue Aug 3 00:23:54 UTC 2021 kill -USR1 3064577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3064577 killed at Tue Aug 3 00:23:54 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3064718 >/dev/null 2>/dev/null selfserv with PID 3064718 found at Tue Aug 3 00:23:54 UTC 2021 selfserv with PID 3064718 started at Tue Aug 3 00:23:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #129: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3064718 at Tue Aug 3 00:23:55 UTC 2021 kill -USR1 3064718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3064718 killed at Tue Aug 3 00:23:55 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3064863 >/dev/null 2>/dev/null selfserv with PID 3064863 found at Tue Aug 3 00:23:55 UTC 2021 selfserv with PID 3064863 started at Tue Aug 3 00:23:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #130: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3064863 at Tue Aug 3 00:23:55 UTC 2021 kill -USR1 3064863 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3064863 killed at Tue Aug 3 00:23:55 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3065076 >/dev/null 2>/dev/null selfserv with PID 3065076 found at Tue Aug 3 00:23:56 UTC 2021 selfserv with PID 3065076 started at Tue Aug 3 00:23:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3065076 at Tue Aug 3 00:23:56 UTC 2021 kill -USR1 3065076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3065076 killed at Tue Aug 3 00:23:56 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:23:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3065226 >/dev/null 2>/dev/null selfserv with PID 3065226 found at Tue Aug 3 00:23:56 UTC 2021 selfserv with PID 3065226 started at Tue Aug 3 00:23:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #132: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3065226 at Tue Aug 3 00:23:57 UTC 2021 kill -USR1 3065226 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3065226 killed at Tue Aug 3 00:23:57 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3065373 >/dev/null 2>/dev/null selfserv with PID 3065373 found at Tue Aug 3 00:23:57 UTC 2021 selfserv with PID 3065373 started at Tue Aug 3 00:23:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3065373 at Tue Aug 3 00:23:58 UTC 2021 kill -USR1 3065373 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3065373 killed at Tue Aug 3 00:23:58 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3065497 >/dev/null 2>/dev/null selfserv with PID 3065497 found at Tue Aug 3 00:23:58 UTC 2021 selfserv with PID 3065497 started at Tue Aug 3 00:23:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3065497 at Tue Aug 3 00:23:59 UTC 2021 kill -USR1 3065497 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3065497 killed at Tue Aug 3 00:23:59 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:23:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:23:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3065616 >/dev/null 2>/dev/null selfserv with PID 3065616 found at Tue Aug 3 00:23:59 UTC 2021 selfserv with PID 3065616 started at Tue Aug 3 00:23:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3065616 at Tue Aug 3 00:24:00 UTC 2021 kill -USR1 3065616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3065616 killed at Tue Aug 3 00:24:00 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3065750 >/dev/null 2>/dev/null selfserv with PID 3065750 found at Tue Aug 3 00:24:00 UTC 2021 selfserv with PID 3065750 started at Tue Aug 3 00:24:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #136: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3065750 at Tue Aug 3 00:24:01 UTC 2021 kill -USR1 3065750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3065750 killed at Tue Aug 3 00:24:01 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3065875 >/dev/null 2>/dev/null selfserv with PID 3065875 found at Tue Aug 3 00:24:01 UTC 2021 selfserv with PID 3065875 started at Tue Aug 3 00:24:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #137: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3065875 at Tue Aug 3 00:24:02 UTC 2021 kill -USR1 3065875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3065875 killed at Tue Aug 3 00:24:02 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3066014 >/dev/null 2>/dev/null selfserv with PID 3066014 found at Tue Aug 3 00:24:02 UTC 2021 selfserv with PID 3066014 started at Tue Aug 3 00:24:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #138: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3066014 at Tue Aug 3 00:24:02 UTC 2021 kill -USR1 3066014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3066014 killed at Tue Aug 3 00:24:02 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3066163 >/dev/null 2>/dev/null selfserv with PID 3066163 found at Tue Aug 3 00:24:03 UTC 2021 selfserv with PID 3066163 started at Tue Aug 3 00:24:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3066163 at Tue Aug 3 00:24:03 UTC 2021 kill -USR1 3066163 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3066163 killed at Tue Aug 3 00:24:03 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3066284 >/dev/null 2>/dev/null selfserv with PID 3066284 found at Tue Aug 3 00:24:03 UTC 2021 selfserv with PID 3066284 started at Tue Aug 3 00:24:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3066284 at Tue Aug 3 00:24:04 UTC 2021 kill -USR1 3066284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3066284 killed at Tue Aug 3 00:24:04 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3066409 >/dev/null 2>/dev/null selfserv with PID 3066409 found at Tue Aug 3 00:24:04 UTC 2021 selfserv with PID 3066409 started at Tue Aug 3 00:24:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3066409 at Tue Aug 3 00:24:05 UTC 2021 kill -USR1 3066409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3066409 killed at Tue Aug 3 00:24:05 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3066545 >/dev/null 2>/dev/null selfserv with PID 3066545 found at Tue Aug 3 00:24:05 UTC 2021 selfserv with PID 3066545 started at Tue Aug 3 00:24:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #142: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3066545 at Tue Aug 3 00:24:06 UTC 2021 kill -USR1 3066545 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3066545 killed at Tue Aug 3 00:24:06 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3066652 >/dev/null 2>/dev/null selfserv with PID 3066652 found at Tue Aug 3 00:24:06 UTC 2021 selfserv with PID 3066652 started at Tue Aug 3 00:24:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3066652 at Tue Aug 3 00:24:07 UTC 2021 kill -USR1 3066652 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3066652 killed at Tue Aug 3 00:24:07 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3066797 >/dev/null 2>/dev/null selfserv with PID 3066797 found at Tue Aug 3 00:24:07 UTC 2021 selfserv with PID 3066797 started at Tue Aug 3 00:24:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3066797 at Tue Aug 3 00:24:08 UTC 2021 kill -USR1 3066797 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3066797 killed at Tue Aug 3 00:24:08 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3066911 >/dev/null 2>/dev/null selfserv with PID 3066911 found at Tue Aug 3 00:24:08 UTC 2021 selfserv with PID 3066911 started at Tue Aug 3 00:24:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3066911 at Tue Aug 3 00:24:09 UTC 2021 kill -USR1 3066911 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3066911 killed at Tue Aug 3 00:24:09 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3067042 >/dev/null 2>/dev/null selfserv with PID 3067042 found at Tue Aug 3 00:24:09 UTC 2021 selfserv with PID 3067042 started at Tue Aug 3 00:24:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3067042 at Tue Aug 3 00:24:10 UTC 2021 kill -USR1 3067042 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3067042 killed at Tue Aug 3 00:24:10 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3067169 >/dev/null 2>/dev/null selfserv with PID 3067169 found at Tue Aug 3 00:24:10 UTC 2021 selfserv with PID 3067169 started at Tue Aug 3 00:24:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3067169 at Tue Aug 3 00:24:11 UTC 2021 kill -USR1 3067169 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3067169 killed at Tue Aug 3 00:24:11 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3067355 >/dev/null 2>/dev/null selfserv with PID 3067355 found at Tue Aug 3 00:24:11 UTC 2021 selfserv with PID 3067355 started at Tue Aug 3 00:24:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #148: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3067355 at Tue Aug 3 00:24:12 UTC 2021 kill -USR1 3067355 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3067355 killed at Tue Aug 3 00:24:12 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3067518 >/dev/null 2>/dev/null selfserv with PID 3067518 found at Tue Aug 3 00:24:12 UTC 2021 selfserv with PID 3067518 started at Tue Aug 3 00:24:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #149: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3067518 at Tue Aug 3 00:24:12 UTC 2021 kill -USR1 3067518 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3067518 killed at Tue Aug 3 00:24:12 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3067635 >/dev/null 2>/dev/null selfserv with PID 3067635 found at Tue Aug 3 00:24:13 UTC 2021 selfserv with PID 3067635 started at Tue Aug 3 00:24:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #150: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3067635 at Tue Aug 3 00:24:13 UTC 2021 kill -USR1 3067635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3067635 killed at Tue Aug 3 00:24:13 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3067775 >/dev/null 2>/dev/null selfserv with PID 3067775 found at Tue Aug 3 00:24:13 UTC 2021 selfserv with PID 3067775 started at Tue Aug 3 00:24:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3067775 at Tue Aug 3 00:24:14 UTC 2021 kill -USR1 3067775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3067775 killed at Tue Aug 3 00:24:14 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3067887 >/dev/null 2>/dev/null selfserv with PID 3067887 found at Tue Aug 3 00:24:14 UTC 2021 selfserv with PID 3067887 started at Tue Aug 3 00:24:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3067887 at Tue Aug 3 00:24:15 UTC 2021 kill -USR1 3067887 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3067887 killed at Tue Aug 3 00:24:15 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3068012 >/dev/null 2>/dev/null selfserv with PID 3068012 found at Tue Aug 3 00:24:15 UTC 2021 selfserv with PID 3068012 started at Tue Aug 3 00:24:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3068012 at Tue Aug 3 00:24:16 UTC 2021 kill -USR1 3068012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3068012 killed at Tue Aug 3 00:24:16 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3068148 >/dev/null 2>/dev/null selfserv with PID 3068148 found at Tue Aug 3 00:24:16 UTC 2021 selfserv with PID 3068148 started at Tue Aug 3 00:24:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #154: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3068148 at Tue Aug 3 00:24:17 UTC 2021 kill -USR1 3068148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3068148 killed at Tue Aug 3 00:24:17 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3068284 >/dev/null 2>/dev/null selfserv with PID 3068284 found at Tue Aug 3 00:24:17 UTC 2021 selfserv with PID 3068284 started at Tue Aug 3 00:24:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3068284 at Tue Aug 3 00:24:18 UTC 2021 kill -USR1 3068284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3068284 killed at Tue Aug 3 00:24:18 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3068476 >/dev/null 2>/dev/null selfserv with PID 3068476 found at Tue Aug 3 00:24:18 UTC 2021 selfserv with PID 3068476 started at Tue Aug 3 00:24:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #156: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3068476 at Tue Aug 3 00:24:19 UTC 2021 kill -USR1 3068476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3068476 killed at Tue Aug 3 00:24:19 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3068677 >/dev/null 2>/dev/null selfserv with PID 3068677 found at Tue Aug 3 00:24:19 UTC 2021 selfserv with PID 3068677 started at Tue Aug 3 00:24:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3068677 at Tue Aug 3 00:24:20 UTC 2021 kill -USR1 3068677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3068677 killed at Tue Aug 3 00:24:20 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3068795 >/dev/null 2>/dev/null selfserv with PID 3068795 found at Tue Aug 3 00:24:20 UTC 2021 selfserv with PID 3068795 started at Tue Aug 3 00:24:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3068795 at Tue Aug 3 00:24:21 UTC 2021 kill -USR1 3068795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3068795 killed at Tue Aug 3 00:24:21 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3068893 >/dev/null 2>/dev/null selfserv with PID 3068893 found at Tue Aug 3 00:24:21 UTC 2021 selfserv with PID 3068893 started at Tue Aug 3 00:24:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3068893 at Tue Aug 3 00:24:22 UTC 2021 kill -USR1 3068893 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3068893 killed at Tue Aug 3 00:24:22 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3069051 >/dev/null 2>/dev/null selfserv with PID 3069051 found at Tue Aug 3 00:24:22 UTC 2021 selfserv with PID 3069051 started at Tue Aug 3 00:24:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #160: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3069051 at Tue Aug 3 00:24:23 UTC 2021 kill -USR1 3069051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3069051 killed at Tue Aug 3 00:24:23 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3069221 >/dev/null 2>/dev/null selfserv with PID 3069221 found at Tue Aug 3 00:24:23 UTC 2021 selfserv with PID 3069221 started at Tue Aug 3 00:24:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #161: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3069221 at Tue Aug 3 00:24:23 UTC 2021 kill -USR1 3069221 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3069221 killed at Tue Aug 3 00:24:23 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:24:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3069372 >/dev/null 2>/dev/null selfserv with PID 3069372 found at Tue Aug 3 00:24:24 UTC 2021 selfserv with PID 3069372 started at Tue Aug 3 00:24:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #162: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3069372 at Tue Aug 3 00:24:24 UTC 2021 kill -USR1 3069372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3069372 killed at Tue Aug 3 00:24:24 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3069531 >/dev/null 2>/dev/null selfserv with PID 3069531 found at Tue Aug 3 00:24:24 UTC 2021 selfserv with PID 3069531 started at Tue Aug 3 00:24:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3069531 at Tue Aug 3 00:24:25 UTC 2021 kill -USR1 3069531 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3069531 killed at Tue Aug 3 00:24:25 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3069732 >/dev/null 2>/dev/null selfserv with PID 3069732 found at Tue Aug 3 00:24:25 UTC 2021 selfserv with PID 3069732 started at Tue Aug 3 00:24:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3069732 at Tue Aug 3 00:24:26 UTC 2021 kill -USR1 3069732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3069732 killed at Tue Aug 3 00:24:26 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3069897 >/dev/null 2>/dev/null selfserv with PID 3069897 found at Tue Aug 3 00:24:26 UTC 2021 selfserv with PID 3069897 started at Tue Aug 3 00:24:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3069897 at Tue Aug 3 00:24:27 UTC 2021 kill -USR1 3069897 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3069897 killed at Tue Aug 3 00:24:27 UTC 2021 ssl.sh: Cache CRL SSL Client Tests =============================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv starting at Tue Aug 3 00:24:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:27 UTC 2021 selfserv with PID 3070045 started at Tue Aug 3 00:24:27 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:28 UTC 2021 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:29 UTC 2021 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:29 UTC 2021 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:29 UTC 2021 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:30 UTC 2021 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:30 UTC 2021 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:30 UTC 2021 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:31 UTC 2021 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:31 UTC 2021 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:31 UTC 2021 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:32 UTC 2021 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:32 UTC 2021 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:32 UTC 2021 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:33 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:33 UTC 2021 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:33 UTC 2021 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:34 UTC 2021 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:34 UTC 2021 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:34 UTC 2021 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:35 UTC 2021 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:35 UTC 2021 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:35 UTC 2021 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:36 UTC 2021 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:36 UTC 2021 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:36 UTC 2021 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:37 UTC 2021 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:37 UTC 2021 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:37 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:38 UTC 2021 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:38 UTC 2021 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:38 UTC 2021 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:39 UTC 2021 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:39 UTC 2021 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:39 UTC 2021 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:40 UTC 2021 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:40 UTC 2021 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:40 UTC 2021 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:41 UTC 2021 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:41 UTC 2021 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:41 UTC 2021 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3070045 >/dev/null 2>/dev/null selfserv with PID 3070045 found at Tue Aug 3 00:24:42 UTC 2021 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3070045 at Tue Aug 3 00:24:42 UTC 2021 kill -USR1 3070045 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3070045 killed at Tue Aug 3 00:24:42 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:24:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:42 UTC 2021 selfserv with PID 3072040 started at Tue Aug 3 00:24:42 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:43 UTC 2021 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:43 UTC 2021 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:43 UTC 2021 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:43 UTC 2021 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:44 UTC 2021 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:44 UTC 2021 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:44 UTC 2021 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:44 UTC 2021 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:44 UTC 2021 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:45 UTC 2021 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:45 UTC 2021 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:45 UTC 2021 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:45 UTC 2021 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:46 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:46 UTC 2021 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:46 UTC 2021 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:47 UTC 2021 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:47 UTC 2021 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:47 UTC 2021 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:47 UTC 2021 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:48 UTC 2021 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:48 UTC 2021 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:48 UTC 2021 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:48 UTC 2021 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:48 UTC 2021 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:49 UTC 2021 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:49 UTC 2021 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:49 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:50 UTC 2021 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:50 UTC 2021 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:50 UTC 2021 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:50 UTC 2021 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:51 UTC 2021 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:51 UTC 2021 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:51 UTC 2021 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:51 UTC 2021 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:52 UTC 2021 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:52 UTC 2021 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:52 UTC 2021 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:52 UTC 2021 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3072040 >/dev/null 2>/dev/null selfserv with PID 3072040 found at Tue Aug 3 00:24:52 UTC 2021 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3072040 at Tue Aug 3 00:24:52 UTC 2021 kill -USR1 3072040 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3072040 killed at Tue Aug 3 00:24:53 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:24:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:53 UTC 2021 selfserv with PID 3074199 started at Tue Aug 3 00:24:53 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:53 UTC 2021 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:54 UTC 2021 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:54 UTC 2021 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:54 UTC 2021 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:54 UTC 2021 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:54 UTC 2021 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:54 UTC 2021 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:54 UTC 2021 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:55 UTC 2021 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:55 UTC 2021 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:55 UTC 2021 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:55 UTC 2021 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:55 UTC 2021 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:55 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:55 UTC 2021 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:56 UTC 2021 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:56 UTC 2021 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:56 UTC 2021 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:56 UTC 2021 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:56 UTC 2021 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:56 UTC 2021 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:56 UTC 2021 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:57 UTC 2021 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:57 UTC 2021 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:57 UTC 2021 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:57 UTC 2021 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:57 UTC 2021 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:57 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:58 UTC 2021 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:58 UTC 2021 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:58 UTC 2021 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:58 UTC 2021 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:58 UTC 2021 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:58 UTC 2021 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:58 UTC 2021 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:59 UTC 2021 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:59 UTC 2021 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:59 UTC 2021 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:59 UTC 2021 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:59 UTC 2021 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3074199 >/dev/null 2>/dev/null selfserv with PID 3074199 found at Tue Aug 3 00:24:59 UTC 2021 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3074199 at Tue Aug 3 00:24:59 UTC 2021 kill -USR1 3074199 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3074199 killed at Tue Aug 3 00:24:59 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:24:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:24:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:24:59 UTC 2021 selfserv with PID 3076088 started at Tue Aug 3 00:24:59 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:00 UTC 2021 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:01 UTC 2021 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:01 UTC 2021 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:01 UTC 2021 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:01 UTC 2021 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:01 UTC 2021 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:02 UTC 2021 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:02 UTC 2021 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:02 UTC 2021 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:02 UTC 2021 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:03 UTC 2021 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:03 UTC 2021 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:03 UTC 2021 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:03 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:03 UTC 2021 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:04 UTC 2021 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:04 UTC 2021 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:04 UTC 2021 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:04 UTC 2021 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:05 UTC 2021 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:05 UTC 2021 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:05 UTC 2021 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:05 UTC 2021 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:06 UTC 2021 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:06 UTC 2021 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:06 UTC 2021 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:06 UTC 2021 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:06 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:07 UTC 2021 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:07 UTC 2021 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:07 UTC 2021 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:07 UTC 2021 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:07 UTC 2021 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:08 UTC 2021 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:08 UTC 2021 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:08 UTC 2021 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:08 UTC 2021 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:09 UTC 2021 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:09 UTC 2021 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:09 UTC 2021 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3076088 >/dev/null 2>/dev/null selfserv with PID 3076088 found at Tue Aug 3 00:25:09 UTC 2021 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3076088 at Tue Aug 3 00:25:09 UTC 2021 kill -USR1 3076088 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3076088 killed at Tue Aug 3 00:25:09 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:25:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:25:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3078565 >/dev/null 2>/dev/null selfserv with PID 3078565 found at Tue Aug 3 00:25:09 UTC 2021 selfserv with PID 3078565 started at Tue Aug 3 00:25:09 UTC 2021 trying to kill selfserv with PID 3078565 at Tue Aug 3 00:25:09 UTC 2021 kill -USR1 3078565 ./ssl.sh: line 213: 3078565 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv -b -p 8443 2>/dev/null; selfserv with PID 3078565 killed at Tue Aug 3 00:25:09 UTC 2021 selfserv starting at Tue Aug 3 00:25:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:25:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:10 UTC 2021 selfserv with PID 3078615 started at Tue Aug 3 00:25:10 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:11 UTC 2021 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:11 UTC 2021 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:11 UTC 2021 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:12 UTC 2021 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:12 UTC 2021 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:12 UTC 2021 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:13 UTC 2021 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:13 UTC 2021 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:13 UTC 2021 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:14 UTC 2021 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:14 UTC 2021 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:14 UTC 2021 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:15 UTC 2021 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:15 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:15 UTC 2021 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:16 UTC 2021 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:16 UTC 2021 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:16 UTC 2021 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:17 UTC 2021 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:17 UTC 2021 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:17 UTC 2021 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:18 UTC 2021 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:18 UTC 2021 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:18 UTC 2021 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:19 UTC 2021 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:19 UTC 2021 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:19 UTC 2021 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:20 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:20 UTC 2021 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:20 UTC 2021 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:21 UTC 2021 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:21 UTC 2021 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:21 UTC 2021 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:22 UTC 2021 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:22 UTC 2021 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:22 UTC 2021 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:23 UTC 2021 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:23 UTC 2021 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:23 UTC 2021 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:24 UTC 2021 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3078615 >/dev/null 2>/dev/null selfserv with PID 3078615 found at Tue Aug 3 00:25:24 UTC 2021 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3078615 at Tue Aug 3 00:25:24 UTC 2021 kill -USR1 3078615 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3078615 killed at Tue Aug 3 00:25:24 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:25:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:25:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:24 UTC 2021 selfserv with PID 3080656 started at Tue Aug 3 00:25:24 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:25 UTC 2021 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:25 UTC 2021 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:26 UTC 2021 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:26 UTC 2021 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:26 UTC 2021 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:27 UTC 2021 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:27 UTC 2021 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:27 UTC 2021 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:28 UTC 2021 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:28 UTC 2021 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:29 UTC 2021 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:29 UTC 2021 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:29 UTC 2021 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:30 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:30 UTC 2021 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:30 UTC 2021 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:31 UTC 2021 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:31 UTC 2021 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:31 UTC 2021 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:32 UTC 2021 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:32 UTC 2021 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:32 UTC 2021 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:33 UTC 2021 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:33 UTC 2021 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:33 UTC 2021 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:34 UTC 2021 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:34 UTC 2021 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:34 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:35 UTC 2021 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:35 UTC 2021 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:35 UTC 2021 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:36 UTC 2021 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:36 UTC 2021 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:37 UTC 2021 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:37 UTC 2021 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:37 UTC 2021 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:38 UTC 2021 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:38 UTC 2021 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:38 UTC 2021 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:39 UTC 2021 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3080656 >/dev/null 2>/dev/null selfserv with PID 3080656 found at Tue Aug 3 00:25:39 UTC 2021 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3080656 at Tue Aug 3 00:25:39 UTC 2021 kill -USR1 3080656 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3080656 killed at Tue Aug 3 00:25:39 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:25:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:25:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:39 UTC 2021 selfserv with PID 3082645 started at Tue Aug 3 00:25:39 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:40 UTC 2021 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:40 UTC 2021 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:40 UTC 2021 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:41 UTC 2021 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:41 UTC 2021 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:41 UTC 2021 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:42 UTC 2021 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:42 UTC 2021 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:42 UTC 2021 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:42 UTC 2021 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:43 UTC 2021 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:43 UTC 2021 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:43 UTC 2021 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:43 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:44 UTC 2021 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:44 UTC 2021 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:44 UTC 2021 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:44 UTC 2021 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:45 UTC 2021 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:45 UTC 2021 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:45 UTC 2021 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:45 UTC 2021 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:46 UTC 2021 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:46 UTC 2021 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:46 UTC 2021 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:46 UTC 2021 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:47 UTC 2021 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:47 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:47 UTC 2021 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:47 UTC 2021 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:48 UTC 2021 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:48 UTC 2021 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:48 UTC 2021 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:48 UTC 2021 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:49 UTC 2021 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:49 UTC 2021 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:49 UTC 2021 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:49 UTC 2021 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:50 UTC 2021 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:50 UTC 2021 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3082645 >/dev/null 2>/dev/null selfserv with PID 3082645 found at Tue Aug 3 00:25:50 UTC 2021 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3082645 at Tue Aug 3 00:25:50 UTC 2021 kill -USR1 3082645 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3082645 killed at Tue Aug 3 00:25:50 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:25:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:25:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:50 UTC 2021 selfserv with PID 3084417 started at Tue Aug 3 00:25:50 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:51 UTC 2021 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:51 UTC 2021 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:51 UTC 2021 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:52 UTC 2021 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:52 UTC 2021 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:52 UTC 2021 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:52 UTC 2021 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:52 UTC 2021 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:52 UTC 2021 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:53 UTC 2021 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:53 UTC 2021 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:53 UTC 2021 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:53 UTC 2021 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:53 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:53 UTC 2021 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:54 UTC 2021 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:54 UTC 2021 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:54 UTC 2021 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:54 UTC 2021 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:54 UTC 2021 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:54 UTC 2021 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:54 UTC 2021 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:55 UTC 2021 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:55 UTC 2021 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:55 UTC 2021 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:55 UTC 2021 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:55 UTC 2021 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:55 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:56 UTC 2021 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:56 UTC 2021 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:56 UTC 2021 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:56 UTC 2021 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:56 UTC 2021 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:56 UTC 2021 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:56 UTC 2021 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:57 UTC 2021 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:57 UTC 2021 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:57 UTC 2021 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:57 UTC 2021 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:57 UTC 2021 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3084417 >/dev/null 2>/dev/null selfserv with PID 3084417 found at Tue Aug 3 00:25:57 UTC 2021 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3084417 at Tue Aug 3 00:25:57 UTC 2021 kill -USR1 3084417 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3084417 killed at Tue Aug 3 00:25:57 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:25:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:25:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:25:57 UTC 2021 selfserv with PID 3086039 started at Tue Aug 3 00:25:57 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:25:58 UTC 2021 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:25:58 UTC 2021 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:25:59 UTC 2021 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:25:59 UTC 2021 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:25:59 UTC 2021 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:25:59 UTC 2021 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:25:59 UTC 2021 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:25:59 UTC 2021 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:00 UTC 2021 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:00 UTC 2021 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:00 UTC 2021 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:00 UTC 2021 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:00 UTC 2021 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:01 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:01 UTC 2021 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:01 UTC 2021 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:01 UTC 2021 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:01 UTC 2021 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:01 UTC 2021 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:01 UTC 2021 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:02 UTC 2021 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:02 UTC 2021 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:02 UTC 2021 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:02 UTC 2021 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:02 UTC 2021 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:03 UTC 2021 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:03 UTC 2021 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:03 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:03 UTC 2021 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:03 UTC 2021 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:03 UTC 2021 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:04 UTC 2021 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:04 UTC 2021 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:04 UTC 2021 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:04 UTC 2021 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:04 UTC 2021 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:04 UTC 2021 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:05 UTC 2021 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:05 UTC 2021 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:05 UTC 2021 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3086039 >/dev/null 2>/dev/null selfserv with PID 3086039 found at Tue Aug 3 00:26:05 UTC 2021 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3086039 at Tue Aug 3 00:26:05 UTC 2021 kill -USR1 3086039 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3086039 killed at Tue Aug 3 00:26:05 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:26:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:26:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:05 UTC 2021 selfserv with PID 3087792 started at Tue Aug 3 00:26:05 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:06 UTC 2021 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:06 UTC 2021 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:07 UTC 2021 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:07 UTC 2021 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:07 UTC 2021 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:07 UTC 2021 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:07 UTC 2021 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:08 UTC 2021 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:08 UTC 2021 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:08 UTC 2021 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:08 UTC 2021 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:09 UTC 2021 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:09 UTC 2021 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:09 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:09 UTC 2021 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:10 UTC 2021 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:10 UTC 2021 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:10 UTC 2021 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:10 UTC 2021 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:11 UTC 2021 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:11 UTC 2021 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:11 UTC 2021 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:11 UTC 2021 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:11 UTC 2021 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:12 UTC 2021 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:12 UTC 2021 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:12 UTC 2021 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:12 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:13 UTC 2021 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:13 UTC 2021 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:13 UTC 2021 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:13 UTC 2021 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:14 UTC 2021 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:14 UTC 2021 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:14 UTC 2021 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:14 UTC 2021 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:14 UTC 2021 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:15 UTC 2021 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:15 UTC 2021 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:15 UTC 2021 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3087792 >/dev/null 2>/dev/null selfserv with PID 3087792 found at Tue Aug 3 00:26:15 UTC 2021 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3087792 at Tue Aug 3 00:26:15 UTC 2021 kill -USR1 3087792 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3087792 killed at Tue Aug 3 00:26:15 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:26:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:26:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3089539 >/dev/null 2>/dev/null selfserv with PID 3089539 found at Tue Aug 3 00:26:16 UTC 2021 selfserv with PID 3089539 started at Tue Aug 3 00:26:16 UTC 2021 trying to kill selfserv with PID 3089539 at Tue Aug 3 00:26:16 UTC 2021 kill -USR1 3089539 ./ssl.sh: line 213: 3089539 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv -b -p 8443 2>/dev/null; selfserv with PID 3089539 killed at Tue Aug 3 00:26:16 UTC 2021 selfserv starting at Tue Aug 3 00:26:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:26:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:16 UTC 2021 selfserv with PID 3089595 started at Tue Aug 3 00:26:16 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:17 UTC 2021 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:17 UTC 2021 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:17 UTC 2021 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:18 UTC 2021 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:18 UTC 2021 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:18 UTC 2021 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:19 UTC 2021 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:19 UTC 2021 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:19 UTC 2021 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:20 UTC 2021 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:20 UTC 2021 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:20 UTC 2021 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:21 UTC 2021 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:21 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:21 UTC 2021 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:22 UTC 2021 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:22 UTC 2021 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:22 UTC 2021 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:23 UTC 2021 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:23 UTC 2021 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:23 UTC 2021 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:24 UTC 2021 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:24 UTC 2021 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:24 UTC 2021 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:25 UTC 2021 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:25 UTC 2021 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:25 UTC 2021 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:26 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:26 UTC 2021 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:26 UTC 2021 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:27 UTC 2021 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:27 UTC 2021 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:27 UTC 2021 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:28 UTC 2021 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:28 UTC 2021 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:28 UTC 2021 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:29 UTC 2021 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:29 UTC 2021 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:29 UTC 2021 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:30 UTC 2021 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3089595 >/dev/null 2>/dev/null selfserv with PID 3089595 found at Tue Aug 3 00:26:30 UTC 2021 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3089595 at Tue Aug 3 00:26:30 UTC 2021 kill -USR1 3089595 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3089595 killed at Tue Aug 3 00:26:30 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:26:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:26:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:30 UTC 2021 selfserv with PID 3091667 started at Tue Aug 3 00:26:30 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:31 UTC 2021 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:32 UTC 2021 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:32 UTC 2021 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:32 UTC 2021 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:33 UTC 2021 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:33 UTC 2021 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:33 UTC 2021 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:34 UTC 2021 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:34 UTC 2021 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:34 UTC 2021 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:35 UTC 2021 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:35 UTC 2021 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:35 UTC 2021 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:36 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:36 UTC 2021 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:36 UTC 2021 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:37 UTC 2021 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:37 UTC 2021 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:37 UTC 2021 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:38 UTC 2021 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:38 UTC 2021 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:38 UTC 2021 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:39 UTC 2021 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:39 UTC 2021 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:40 UTC 2021 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:40 UTC 2021 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:40 UTC 2021 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:41 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:41 UTC 2021 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:41 UTC 2021 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:42 UTC 2021 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:42 UTC 2021 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:42 UTC 2021 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:43 UTC 2021 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:43 UTC 2021 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:43 UTC 2021 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:44 UTC 2021 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:44 UTC 2021 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:44 UTC 2021 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:45 UTC 2021 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3091667 >/dev/null 2>/dev/null selfserv with PID 3091667 found at Tue Aug 3 00:26:45 UTC 2021 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3091667 at Tue Aug 3 00:26:45 UTC 2021 kill -USR1 3091667 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3091667 killed at Tue Aug 3 00:26:45 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:26:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:26:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:45 UTC 2021 selfserv with PID 3093709 started at Tue Aug 3 00:26:45 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:46 UTC 2021 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:46 UTC 2021 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:47 UTC 2021 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:47 UTC 2021 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:47 UTC 2021 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:47 UTC 2021 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:48 UTC 2021 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:48 UTC 2021 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:48 UTC 2021 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:48 UTC 2021 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:49 UTC 2021 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:49 UTC 2021 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:49 UTC 2021 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:49 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:50 UTC 2021 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:50 UTC 2021 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:50 UTC 2021 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:50 UTC 2021 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:51 UTC 2021 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:51 UTC 2021 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:51 UTC 2021 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:51 UTC 2021 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:52 UTC 2021 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:52 UTC 2021 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:52 UTC 2021 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:52 UTC 2021 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:53 UTC 2021 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:53 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:53 UTC 2021 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:54 UTC 2021 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:54 UTC 2021 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:54 UTC 2021 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:54 UTC 2021 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:55 UTC 2021 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:55 UTC 2021 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:55 UTC 2021 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:55 UTC 2021 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:56 UTC 2021 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:56 UTC 2021 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:56 UTC 2021 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3093709 >/dev/null 2>/dev/null selfserv with PID 3093709 found at Tue Aug 3 00:26:56 UTC 2021 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3093709 at Tue Aug 3 00:26:56 UTC 2021 kill -USR1 3093709 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3093709 killed at Tue Aug 3 00:26:56 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:26:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:26:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:56 UTC 2021 selfserv with PID 3095623 started at Tue Aug 3 00:26:56 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:57 UTC 2021 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:57 UTC 2021 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:58 UTC 2021 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:58 UTC 2021 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:58 UTC 2021 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:58 UTC 2021 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:58 UTC 2021 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:58 UTC 2021 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:59 UTC 2021 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:59 UTC 2021 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:59 UTC 2021 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:59 UTC 2021 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:59 UTC 2021 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:59 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:26:59 UTC 2021 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:00 UTC 2021 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:00 UTC 2021 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:00 UTC 2021 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:00 UTC 2021 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:00 UTC 2021 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:00 UTC 2021 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:01 UTC 2021 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:01 UTC 2021 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:01 UTC 2021 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:01 UTC 2021 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:01 UTC 2021 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:01 UTC 2021 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:01 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:02 UTC 2021 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:02 UTC 2021 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:02 UTC 2021 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:02 UTC 2021 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:02 UTC 2021 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:02 UTC 2021 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:03 UTC 2021 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:03 UTC 2021 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:03 UTC 2021 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:03 UTC 2021 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:03 UTC 2021 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:03 UTC 2021 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3095623 >/dev/null 2>/dev/null selfserv with PID 3095623 found at Tue Aug 3 00:27:03 UTC 2021 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3095623 at Tue Aug 3 00:27:03 UTC 2021 kill -USR1 3095623 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3095623 killed at Tue Aug 3 00:27:03 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:27:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:04 UTC 2021 selfserv with PID 3097465 started at Tue Aug 3 00:27:04 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:04 UTC 2021 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:05 UTC 2021 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:05 UTC 2021 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:05 UTC 2021 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:05 UTC 2021 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:05 UTC 2021 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:05 UTC 2021 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:06 UTC 2021 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:06 UTC 2021 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:06 UTC 2021 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:06 UTC 2021 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:06 UTC 2021 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:06 UTC 2021 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:07 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:07 UTC 2021 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:07 UTC 2021 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:07 UTC 2021 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:07 UTC 2021 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:07 UTC 2021 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:08 UTC 2021 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:08 UTC 2021 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:08 UTC 2021 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:08 UTC 2021 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:08 UTC 2021 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:08 UTC 2021 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:09 UTC 2021 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:09 UTC 2021 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:09 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:09 UTC 2021 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:09 UTC 2021 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:09 UTC 2021 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:10 UTC 2021 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:10 UTC 2021 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:10 UTC 2021 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:10 UTC 2021 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:10 UTC 2021 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:10 UTC 2021 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:11 UTC 2021 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:11 UTC 2021 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:11 UTC 2021 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3097465 >/dev/null 2>/dev/null selfserv with PID 3097465 found at Tue Aug 3 00:27:11 UTC 2021 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3097465 at Tue Aug 3 00:27:11 UTC 2021 kill -USR1 3097465 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3097465 killed at Tue Aug 3 00:27:11 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:27:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:11 UTC 2021 selfserv with PID 3099625 started at Tue Aug 3 00:27:11 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:12 UTC 2021 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:12 UTC 2021 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:13 UTC 2021 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:13 UTC 2021 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:13 UTC 2021 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:13 UTC 2021 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:14 UTC 2021 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:14 UTC 2021 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:14 UTC 2021 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:14 UTC 2021 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:15 UTC 2021 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:15 UTC 2021 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:15 UTC 2021 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:15 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:15 UTC 2021 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:16 UTC 2021 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:16 UTC 2021 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:16 UTC 2021 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:16 UTC 2021 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:17 UTC 2021 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:17 UTC 2021 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:17 UTC 2021 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:17 UTC 2021 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:18 UTC 2021 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:18 UTC 2021 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:18 UTC 2021 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:18 UTC 2021 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:18 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:19 UTC 2021 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:19 UTC 2021 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:19 UTC 2021 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:19 UTC 2021 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:20 UTC 2021 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:20 UTC 2021 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:20 UTC 2021 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:20 UTC 2021 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:21 UTC 2021 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:21 UTC 2021 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:21 UTC 2021 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:21 UTC 2021 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3099625 >/dev/null 2>/dev/null selfserv with PID 3099625 found at Tue Aug 3 00:27:22 UTC 2021 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3099625 at Tue Aug 3 00:27:22 UTC 2021 kill -USR1 3099625 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3099625 killed at Tue Aug 3 00:27:22 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:27:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3101626 >/dev/null 2>/dev/null selfserv with PID 3101626 found at Tue Aug 3 00:27:22 UTC 2021 selfserv with PID 3101626 started at Tue Aug 3 00:27:22 UTC 2021 trying to kill selfserv with PID 3101626 at Tue Aug 3 00:27:22 UTC 2021 kill -USR1 3101626 ./ssl.sh: line 213: 3101626 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv -b -p 8443 2>/dev/null; selfserv with PID 3101626 killed at Tue Aug 3 00:27:22 UTC 2021 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv starting at Tue Aug 3 00:27:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3101675 >/dev/null 2>/dev/null selfserv with PID 3101675 found at Tue Aug 3 00:27:22 UTC 2021 selfserv with PID 3101675 started at Tue Aug 3 00:27:22 UTC 2021 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv with PID 3101675 at Tue Aug 3 00:27:23 UTC 2021 kill -USR1 3101675 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3101675 killed at Tue Aug 3 00:27:23 UTC 2021 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv starting at Tue Aug 3 00:27:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3102433 >/dev/null 2>/dev/null selfserv with PID 3102433 found at Tue Aug 3 00:27:23 UTC 2021 selfserv with PID 3102433 started at Tue Aug 3 00:27:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3102433 at Tue Aug 3 00:27:25 UTC 2021 kill -USR1 3102433 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3102433 killed at Tue Aug 3 00:27:25 UTC 2021 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv starting at Tue Aug 3 00:27:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3103553 >/dev/null 2>/dev/null selfserv with PID 3103553 found at Tue Aug 3 00:27:25 UTC 2021 selfserv with PID 3103553 started at Tue Aug 3 00:27:25 UTC 2021 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3103553 at Tue Aug 3 00:27:26 UTC 2021 kill -USR1 3103553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3103553 killed at Tue Aug 3 00:27:26 UTC 2021 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3103666 >/dev/null 2>/dev/null selfserv with PID 3103666 found at Tue Aug 3 00:27:26 UTC 2021 selfserv with PID 3103666 started at Tue Aug 3 00:27:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3103666 at Tue Aug 3 00:27:26 UTC 2021 kill -USR1 3103666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3103666 killed at Tue Aug 3 00:27:26 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:27:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3103785 >/dev/null 2>/dev/null selfserv with PID 3103785 found at Tue Aug 3 00:27:27 UTC 2021 selfserv with PID 3103785 started at Tue Aug 3 00:27:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3103785 at Tue Aug 3 00:27:27 UTC 2021 kill -USR1 3103785 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3103785 killed at Tue Aug 3 00:27:27 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:27:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3103869 >/dev/null 2>/dev/null selfserv with PID 3103869 found at Tue Aug 3 00:27:27 UTC 2021 selfserv with PID 3103869 started at Tue Aug 3 00:27:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3103869 at Tue Aug 3 00:27:28 UTC 2021 kill -USR1 3103869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3103869 killed at Tue Aug 3 00:27:28 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3103975 >/dev/null 2>/dev/null selfserv with PID 3103975 found at Tue Aug 3 00:27:28 UTC 2021 selfserv with PID 3103975 started at Tue Aug 3 00:27:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3103975 at Tue Aug 3 00:27:29 UTC 2021 kill -USR1 3103975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3103975 killed at Tue Aug 3 00:27:29 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:27:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3104054 >/dev/null 2>/dev/null selfserv with PID 3104054 found at Tue Aug 3 00:27:29 UTC 2021 selfserv with PID 3104054 started at Tue Aug 3 00:27:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3104054 at Tue Aug 3 00:27:30 UTC 2021 kill -USR1 3104054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3104054 killed at Tue Aug 3 00:27:30 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:27:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3104149 >/dev/null 2>/dev/null selfserv with PID 3104149 found at Tue Aug 3 00:27:30 UTC 2021 selfserv with PID 3104149 started at Tue Aug 3 00:27:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3104149 at Tue Aug 3 00:27:31 UTC 2021 kill -USR1 3104149 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3104149 killed at Tue Aug 3 00:27:31 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3104292 >/dev/null 2>/dev/null selfserv with PID 3104292 found at Tue Aug 3 00:27:31 UTC 2021 selfserv with PID 3104292 started at Tue Aug 3 00:27:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3104292 at Tue Aug 3 00:27:32 UTC 2021 kill -USR1 3104292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3104292 killed at Tue Aug 3 00:27:32 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:27:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3104528 >/dev/null 2>/dev/null selfserv with PID 3104528 found at Tue Aug 3 00:27:32 UTC 2021 selfserv with PID 3104528 started at Tue Aug 3 00:27:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3104528 at Tue Aug 3 00:27:33 UTC 2021 kill -USR1 3104528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3104528 killed at Tue Aug 3 00:27:33 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:27:33 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3104697 >/dev/null 2>/dev/null selfserv with PID 3104697 found at Tue Aug 3 00:27:33 UTC 2021 selfserv with PID 3104697 started at Tue Aug 3 00:27:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3104697 at Tue Aug 3 00:27:34 UTC 2021 kill -USR1 3104697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3104697 killed at Tue Aug 3 00:27:34 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3104868 >/dev/null 2>/dev/null selfserv with PID 3104868 found at Tue Aug 3 00:27:34 UTC 2021 selfserv with PID 3104868 started at Tue Aug 3 00:27:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3104868 at Tue Aug 3 00:27:35 UTC 2021 kill -USR1 3104868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3104868 killed at Tue Aug 3 00:27:35 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:27:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3104974 >/dev/null 2>/dev/null selfserv with PID 3104974 found at Tue Aug 3 00:27:35 UTC 2021 selfserv with PID 3104974 started at Tue Aug 3 00:27:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3104974 at Tue Aug 3 00:27:35 UTC 2021 kill -USR1 3104974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3104974 killed at Tue Aug 3 00:27:35 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:27:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3105135 >/dev/null 2>/dev/null selfserv with PID 3105135 found at Tue Aug 3 00:27:36 UTC 2021 selfserv with PID 3105135 started at Tue Aug 3 00:27:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3105135 at Tue Aug 3 00:27:36 UTC 2021 kill -USR1 3105135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3105135 killed at Tue Aug 3 00:27:36 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3105298 >/dev/null 2>/dev/null selfserv with PID 3105298 found at Tue Aug 3 00:27:37 UTC 2021 selfserv with PID 3105298 started at Tue Aug 3 00:27:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3105298 at Tue Aug 3 00:27:37 UTC 2021 kill -USR1 3105298 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3105298 killed at Tue Aug 3 00:27:37 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:27:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3105417 >/dev/null 2>/dev/null selfserv with PID 3105417 found at Tue Aug 3 00:27:37 UTC 2021 selfserv with PID 3105417 started at Tue Aug 3 00:27:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3105417 at Tue Aug 3 00:27:38 UTC 2021 kill -USR1 3105417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3105417 killed at Tue Aug 3 00:27:38 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:27:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3105500 >/dev/null 2>/dev/null selfserv with PID 3105500 found at Tue Aug 3 00:27:38 UTC 2021 selfserv with PID 3105500 started at Tue Aug 3 00:27:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3105500 at Tue Aug 3 00:27:39 UTC 2021 kill -USR1 3105500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3105500 killed at Tue Aug 3 00:27:39 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3105622 >/dev/null 2>/dev/null selfserv with PID 3105622 found at Tue Aug 3 00:27:39 UTC 2021 selfserv with PID 3105622 started at Tue Aug 3 00:27:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3105622 at Tue Aug 3 00:27:40 UTC 2021 kill -USR1 3105622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3105622 killed at Tue Aug 3 00:27:40 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:27:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3105706 >/dev/null 2>/dev/null selfserv with PID 3105706 found at Tue Aug 3 00:27:40 UTC 2021 selfserv with PID 3105706 started at Tue Aug 3 00:27:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3105706 at Tue Aug 3 00:27:41 UTC 2021 kill -USR1 3105706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3105706 killed at Tue Aug 3 00:27:41 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:27:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3105821 >/dev/null 2>/dev/null selfserv with PID 3105821 found at Tue Aug 3 00:27:41 UTC 2021 selfserv with PID 3105821 started at Tue Aug 3 00:27:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3105821 at Tue Aug 3 00:27:42 UTC 2021 kill -USR1 3105821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3105821 killed at Tue Aug 3 00:27:42 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3105958 >/dev/null 2>/dev/null selfserv with PID 3105958 found at Tue Aug 3 00:27:42 UTC 2021 selfserv with PID 3105958 started at Tue Aug 3 00:27:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3105958 at Tue Aug 3 00:27:43 UTC 2021 kill -USR1 3105958 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3105958 killed at Tue Aug 3 00:27:43 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:27:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3106057 >/dev/null 2>/dev/null selfserv with PID 3106057 found at Tue Aug 3 00:27:43 UTC 2021 selfserv with PID 3106057 started at Tue Aug 3 00:27:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3106057 at Tue Aug 3 00:27:44 UTC 2021 kill -USR1 3106057 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3106057 killed at Tue Aug 3 00:27:44 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:27:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3106152 >/dev/null 2>/dev/null selfserv with PID 3106152 found at Tue Aug 3 00:27:44 UTC 2021 selfserv with PID 3106152 started at Tue Aug 3 00:27:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3106152 at Tue Aug 3 00:27:45 UTC 2021 kill -USR1 3106152 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3106152 killed at Tue Aug 3 00:27:45 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3106253 >/dev/null 2>/dev/null selfserv with PID 3106253 found at Tue Aug 3 00:27:45 UTC 2021 selfserv with PID 3106253 started at Tue Aug 3 00:27:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3106253 at Tue Aug 3 00:27:46 UTC 2021 kill -USR1 3106253 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3106253 killed at Tue Aug 3 00:27:46 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:27:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3106353 >/dev/null 2>/dev/null selfserv with PID 3106353 found at Tue Aug 3 00:27:46 UTC 2021 selfserv with PID 3106353 started at Tue Aug 3 00:27:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3106353 at Tue Aug 3 00:27:47 UTC 2021 kill -USR1 3106353 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3106353 killed at Tue Aug 3 00:27:47 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:27:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3106486 >/dev/null 2>/dev/null selfserv with PID 3106486 found at Tue Aug 3 00:27:47 UTC 2021 selfserv with PID 3106486 started at Tue Aug 3 00:27:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3106486 at Tue Aug 3 00:27:48 UTC 2021 kill -USR1 3106486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3106486 killed at Tue Aug 3 00:27:48 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3106676 >/dev/null 2>/dev/null selfserv with PID 3106676 found at Tue Aug 3 00:27:48 UTC 2021 selfserv with PID 3106676 started at Tue Aug 3 00:27:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3106676 at Tue Aug 3 00:27:48 UTC 2021 kill -USR1 3106676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3106676 killed at Tue Aug 3 00:27:48 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:27:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3106758 >/dev/null 2>/dev/null selfserv with PID 3106758 found at Tue Aug 3 00:27:49 UTC 2021 selfserv with PID 3106758 started at Tue Aug 3 00:27:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3106758 at Tue Aug 3 00:27:49 UTC 2021 kill -USR1 3106758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3106758 killed at Tue Aug 3 00:27:49 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:27:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3106855 >/dev/null 2>/dev/null selfserv with PID 3106855 found at Tue Aug 3 00:27:49 UTC 2021 selfserv with PID 3106855 started at Tue Aug 3 00:27:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3106855 at Tue Aug 3 00:27:50 UTC 2021 kill -USR1 3106855 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3106855 killed at Tue Aug 3 00:27:50 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3106952 >/dev/null 2>/dev/null selfserv with PID 3106952 found at Tue Aug 3 00:27:50 UTC 2021 selfserv with PID 3106952 started at Tue Aug 3 00:27:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3106952 at Tue Aug 3 00:27:51 UTC 2021 kill -USR1 3106952 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3106952 killed at Tue Aug 3 00:27:51 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:27:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107042 >/dev/null 2>/dev/null selfserv with PID 3107042 found at Tue Aug 3 00:27:51 UTC 2021 selfserv with PID 3107042 started at Tue Aug 3 00:27:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3107042 at Tue Aug 3 00:27:52 UTC 2021 kill -USR1 3107042 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107042 killed at Tue Aug 3 00:27:52 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:27:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107132 >/dev/null 2>/dev/null selfserv with PID 3107132 found at Tue Aug 3 00:27:52 UTC 2021 selfserv with PID 3107132 started at Tue Aug 3 00:27:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3107132 at Tue Aug 3 00:27:53 UTC 2021 kill -USR1 3107132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107132 killed at Tue Aug 3 00:27:53 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:27:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107222 >/dev/null 2>/dev/null selfserv with PID 3107222 found at Tue Aug 3 00:27:53 UTC 2021 selfserv with PID 3107222 started at Tue Aug 3 00:27:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3107222 at Tue Aug 3 00:27:54 UTC 2021 kill -USR1 3107222 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107222 killed at Tue Aug 3 00:27:54 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:27:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107322 >/dev/null 2>/dev/null selfserv with PID 3107322 found at Tue Aug 3 00:27:54 UTC 2021 selfserv with PID 3107322 started at Tue Aug 3 00:27:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3107322 at Tue Aug 3 00:27:55 UTC 2021 kill -USR1 3107322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107322 killed at Tue Aug 3 00:27:55 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107407 >/dev/null 2>/dev/null selfserv with PID 3107407 found at Tue Aug 3 00:27:55 UTC 2021 selfserv with PID 3107407 started at Tue Aug 3 00:27:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3107407 at Tue Aug 3 00:27:56 UTC 2021 kill -USR1 3107407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107407 killed at Tue Aug 3 00:27:56 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:27:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107494 >/dev/null 2>/dev/null selfserv with PID 3107494 found at Tue Aug 3 00:27:56 UTC 2021 selfserv with PID 3107494 started at Tue Aug 3 00:27:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3107494 at Tue Aug 3 00:27:57 UTC 2021 kill -USR1 3107494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107494 killed at Tue Aug 3 00:27:57 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:27:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107585 >/dev/null 2>/dev/null selfserv with PID 3107585 found at Tue Aug 3 00:27:57 UTC 2021 selfserv with PID 3107585 started at Tue Aug 3 00:27:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3107585 at Tue Aug 3 00:27:58 UTC 2021 kill -USR1 3107585 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107585 killed at Tue Aug 3 00:27:58 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:27:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107666 >/dev/null 2>/dev/null selfserv with PID 3107666 found at Tue Aug 3 00:27:58 UTC 2021 selfserv with PID 3107666 started at Tue Aug 3 00:27:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3107666 at Tue Aug 3 00:27:59 UTC 2021 kill -USR1 3107666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107666 killed at Tue Aug 3 00:27:59 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:27:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:27:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107764 >/dev/null 2>/dev/null selfserv with PID 3107764 found at Tue Aug 3 00:27:59 UTC 2021 selfserv with PID 3107764 started at Tue Aug 3 00:27:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3107764 at Tue Aug 3 00:28:00 UTC 2021 kill -USR1 3107764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107764 killed at Tue Aug 3 00:28:00 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:28:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107842 >/dev/null 2>/dev/null selfserv with PID 3107842 found at Tue Aug 3 00:28:00 UTC 2021 selfserv with PID 3107842 started at Tue Aug 3 00:28:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #821: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3107842 at Tue Aug 3 00:28:00 UTC 2021 kill -USR1 3107842 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107842 killed at Tue Aug 3 00:28:00 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:28:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3107937 >/dev/null 2>/dev/null selfserv with PID 3107937 found at Tue Aug 3 00:28:00 UTC 2021 selfserv with PID 3107937 started at Tue Aug 3 00:28:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3107937 at Tue Aug 3 00:28:01 UTC 2021 kill -USR1 3107937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3107937 killed at Tue Aug 3 00:28:01 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:28:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108050 >/dev/null 2>/dev/null selfserv with PID 3108050 found at Tue Aug 3 00:28:01 UTC 2021 selfserv with PID 3108050 started at Tue Aug 3 00:28:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3108050 at Tue Aug 3 00:28:02 UTC 2021 kill -USR1 3108050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108050 killed at Tue Aug 3 00:28:02 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:28:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108186 >/dev/null 2>/dev/null selfserv with PID 3108186 found at Tue Aug 3 00:28:02 UTC 2021 selfserv with PID 3108186 started at Tue Aug 3 00:28:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3108186 at Tue Aug 3 00:28:03 UTC 2021 kill -USR1 3108186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108186 killed at Tue Aug 3 00:28:03 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:28:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108288 >/dev/null 2>/dev/null selfserv with PID 3108288 found at Tue Aug 3 00:28:03 UTC 2021 selfserv with PID 3108288 started at Tue Aug 3 00:28:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #825: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3108288 at Tue Aug 3 00:28:04 UTC 2021 kill -USR1 3108288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108288 killed at Tue Aug 3 00:28:04 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:28:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108399 >/dev/null 2>/dev/null selfserv with PID 3108399 found at Tue Aug 3 00:28:04 UTC 2021 selfserv with PID 3108399 started at Tue Aug 3 00:28:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3108399 at Tue Aug 3 00:28:05 UTC 2021 kill -USR1 3108399 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108399 killed at Tue Aug 3 00:28:05 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:28:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108511 >/dev/null 2>/dev/null selfserv with PID 3108511 found at Tue Aug 3 00:28:05 UTC 2021 selfserv with PID 3108511 started at Tue Aug 3 00:28:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3108511 at Tue Aug 3 00:28:06 UTC 2021 kill -USR1 3108511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108511 killed at Tue Aug 3 00:28:06 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:28:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108584 >/dev/null 2>/dev/null selfserv with PID 3108584 found at Tue Aug 3 00:28:06 UTC 2021 selfserv with PID 3108584 started at Tue Aug 3 00:28:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3108584 at Tue Aug 3 00:28:07 UTC 2021 kill -USR1 3108584 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108584 killed at Tue Aug 3 00:28:07 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:28:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108676 >/dev/null 2>/dev/null selfserv with PID 3108676 found at Tue Aug 3 00:28:07 UTC 2021 selfserv with PID 3108676 started at Tue Aug 3 00:28:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #829: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3108676 at Tue Aug 3 00:28:08 UTC 2021 kill -USR1 3108676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108676 killed at Tue Aug 3 00:28:08 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:28:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108758 >/dev/null 2>/dev/null selfserv with PID 3108758 found at Tue Aug 3 00:28:08 UTC 2021 selfserv with PID 3108758 started at Tue Aug 3 00:28:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3108758 at Tue Aug 3 00:28:09 UTC 2021 kill -USR1 3108758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108758 killed at Tue Aug 3 00:28:09 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:28:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108818 >/dev/null 2>/dev/null selfserv with PID 3108818 found at Tue Aug 3 00:28:09 UTC 2021 selfserv with PID 3108818 started at Tue Aug 3 00:28:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3108818 at Tue Aug 3 00:28:09 UTC 2021 kill -USR1 3108818 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108818 killed at Tue Aug 3 00:28:09 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:28:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108904 >/dev/null 2>/dev/null selfserv with PID 3108904 found at Tue Aug 3 00:28:09 UTC 2021 selfserv with PID 3108904 started at Tue Aug 3 00:28:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3108904 at Tue Aug 3 00:28:10 UTC 2021 kill -USR1 3108904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108904 killed at Tue Aug 3 00:28:10 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:28:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3108992 >/dev/null 2>/dev/null selfserv with PID 3108992 found at Tue Aug 3 00:28:10 UTC 2021 selfserv with PID 3108992 started at Tue Aug 3 00:28:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #833: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3108992 at Tue Aug 3 00:28:11 UTC 2021 kill -USR1 3108992 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3108992 killed at Tue Aug 3 00:28:11 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:28:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3109079 >/dev/null 2>/dev/null selfserv with PID 3109079 found at Tue Aug 3 00:28:11 UTC 2021 selfserv with PID 3109079 started at Tue Aug 3 00:28:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3109079 at Tue Aug 3 00:28:12 UTC 2021 kill -USR1 3109079 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3109079 killed at Tue Aug 3 00:28:12 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:28:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3109156 >/dev/null 2>/dev/null selfserv with PID 3109156 found at Tue Aug 3 00:28:12 UTC 2021 selfserv with PID 3109156 started at Tue Aug 3 00:28:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3109156 at Tue Aug 3 00:28:13 UTC 2021 kill -USR1 3109156 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3109156 killed at Tue Aug 3 00:28:13 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:28:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3109302 >/dev/null 2>/dev/null selfserv with PID 3109302 found at Tue Aug 3 00:28:13 UTC 2021 selfserv with PID 3109302 started at Tue Aug 3 00:28:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3109302 at Tue Aug 3 00:28:14 UTC 2021 kill -USR1 3109302 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3109302 killed at Tue Aug 3 00:28:14 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:28:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3109500 >/dev/null 2>/dev/null selfserv with PID 3109500 found at Tue Aug 3 00:28:14 UTC 2021 selfserv with PID 3109500 started at Tue Aug 3 00:28:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #837: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3109500 at Tue Aug 3 00:28:15 UTC 2021 kill -USR1 3109500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3109500 killed at Tue Aug 3 00:28:15 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:28:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3109621 >/dev/null 2>/dev/null selfserv with PID 3109621 found at Tue Aug 3 00:28:15 UTC 2021 selfserv with PID 3109621 started at Tue Aug 3 00:28:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3109621 at Tue Aug 3 00:28:16 UTC 2021 kill -USR1 3109621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3109621 killed at Tue Aug 3 00:28:16 UTC 2021 ssl.sh: TLS Server hello response without SNI ---- selfserv starting at Tue Aug 3 00:28:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3109715 >/dev/null 2>/dev/null selfserv with PID 3109715 found at Tue Aug 3 00:28:16 UTC 2021 selfserv with PID 3109715 started at Tue Aug 3 00:28:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3109715 at Tue Aug 3 00:28:17 UTC 2021 kill -USR1 3109715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3109715 killed at Tue Aug 3 00:28:17 UTC 2021 ssl.sh: TLS Server hello response with SNI ---- selfserv starting at Tue Aug 3 00:28:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3109823 >/dev/null 2>/dev/null selfserv with PID 3109823 found at Tue Aug 3 00:28:17 UTC 2021 selfserv with PID 3109823 started at Tue Aug 3 00:28:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3109823 at Tue Aug 3 00:28:18 UTC 2021 kill -USR1 3109823 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3109823 killed at Tue Aug 3 00:28:18 UTC 2021 ssl.sh: TLS Server response with alert ---- selfserv starting at Tue Aug 3 00:28:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3109907 >/dev/null 2>/dev/null selfserv with PID 3109907 found at Tue Aug 3 00:28:18 UTC 2021 selfserv with PID 3109907 started at Tue Aug 3 00:28:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #841: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3109907 at Tue Aug 3 00:28:19 UTC 2021 kill -USR1 3109907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3109907 killed at Tue Aug 3 00:28:19 UTC 2021 ssl.sh: SSL3 Server hello response without SNI ---- selfserv starting at Tue Aug 3 00:28:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3109978 >/dev/null 2>/dev/null selfserv with PID 3109978 found at Tue Aug 3 00:28:19 UTC 2021 selfserv with PID 3109978 started at Tue Aug 3 00:28:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3109978 at Tue Aug 3 00:28:20 UTC 2021 kill -USR1 3109978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3109978 killed at Tue Aug 3 00:28:20 UTC 2021 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv starting at Tue Aug 3 00:28:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3110134 >/dev/null 2>/dev/null selfserv with PID 3110134 found at Tue Aug 3 00:28:20 UTC 2021 selfserv with PID 3110134 started at Tue Aug 3 00:28:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #843: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3110134 at Tue Aug 3 00:28:21 UTC 2021 kill -USR1 3110134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3110134 killed at Tue Aug 3 00:28:21 UTC 2021 ssl.sh: TLS Server hello response without SNI ---- selfserv starting at Tue Aug 3 00:28:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3110339 >/dev/null 2>/dev/null selfserv with PID 3110339 found at Tue Aug 3 00:28:21 UTC 2021 selfserv with PID 3110339 started at Tue Aug 3 00:28:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #844: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3110339 at Tue Aug 3 00:28:22 UTC 2021 kill -USR1 3110339 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3110339 killed at Tue Aug 3 00:28:22 UTC 2021 ssl.sh: TLS Server hello response with SNI ---- selfserv starting at Tue Aug 3 00:28:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3110533 >/dev/null 2>/dev/null selfserv with PID 3110533 found at Tue Aug 3 00:28:22 UTC 2021 selfserv with PID 3110533 started at Tue Aug 3 00:28:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3110533 at Tue Aug 3 00:28:23 UTC 2021 kill -USR1 3110533 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3110533 killed at Tue Aug 3 00:28:23 UTC 2021 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv starting at Tue Aug 3 00:28:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3110781 >/dev/null 2>/dev/null selfserv with PID 3110781 found at Tue Aug 3 00:28:23 UTC 2021 selfserv with PID 3110781 started at Tue Aug 3 00:28:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #846: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3110781 at Tue Aug 3 00:28:24 UTC 2021 kill -USR1 3110781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3110781 killed at Tue Aug 3 00:28:24 UTC 2021 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv starting at Tue Aug 3 00:28:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3110893 >/dev/null 2>/dev/null selfserv with PID 3110893 found at Tue Aug 3 00:28:24 UTC 2021 selfserv with PID 3110893 started at Tue Aug 3 00:28:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #847: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3110893 at Tue Aug 3 00:28:25 UTC 2021 kill -USR1 3110893 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3110893 killed at Tue Aug 3 00:28:25 UTC 2021 ssl.sh: TLS Server response with alert ---- selfserv starting at Tue Aug 3 00:28:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3110985 >/dev/null 2>/dev/null selfserv with PID 3110985 found at Tue Aug 3 00:28:25 UTC 2021 selfserv with PID 3110985 started at Tue Aug 3 00:28:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #848: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3110985 at Tue Aug 3 00:28:25 UTC 2021 kill -USR1 3110985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3110985 killed at Tue Aug 3 00:28:25 UTC 2021 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv starting at Tue Aug 3 00:28:25 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3111049 >/dev/null 2>/dev/null selfserv with PID 3111049 found at Tue Aug 3 00:28:25 UTC 2021 selfserv with PID 3111049 started at Tue Aug 3 00:28:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3111049 at Tue Aug 3 00:28:26 UTC 2021 kill -USR1 3111049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3111049 killed at Tue Aug 3 00:28:26 UTC 2021 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv starting at Tue Aug 3 00:28:26 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3111148 >/dev/null 2>/dev/null selfserv with PID 3111148 found at Tue Aug 3 00:28:26 UTC 2021 selfserv with PID 3111148 started at Tue Aug 3 00:28:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv with PID 3111148 at Tue Aug 3 00:28:27 UTC 2021 kill -USR1 3111148 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3111148 killed at Tue Aug 3 00:28:27 UTC 2021 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv starting at Tue Aug 3 00:28:27 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3111244 >/dev/null 2>/dev/null selfserv with PID 3111244 found at Tue Aug 3 00:28:27 UTC 2021 selfserv with PID 3111244 started at Tue Aug 3 00:28:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3111244 at Tue Aug 3 00:28:28 UTC 2021 kill -USR1 3111244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3111244 killed at Tue Aug 3 00:28:28 UTC 2021 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv starting at Tue Aug 3 00:28:28 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3111425 >/dev/null 2>/dev/null selfserv with PID 3111425 found at Tue Aug 3 00:28:28 UTC 2021 selfserv with PID 3111425 started at Tue Aug 3 00:28:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3111425 at Tue Aug 3 00:28:29 UTC 2021 kill -USR1 3111425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3111425 killed at Tue Aug 3 00:28:29 UTC 2021 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv starting at Tue Aug 3 00:28:29 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3111610 >/dev/null 2>/dev/null selfserv with PID 3111610 found at Tue Aug 3 00:28:29 UTC 2021 selfserv with PID 3111610 started at Tue Aug 3 00:28:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3111610 at Tue Aug 3 00:28:30 UTC 2021 kill -USR1 3111610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3111610 killed at Tue Aug 3 00:28:30 UTC 2021 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv starting at Tue Aug 3 00:28:30 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3111737 >/dev/null 2>/dev/null selfserv with PID 3111737 found at Tue Aug 3 00:28:30 UTC 2021 selfserv with PID 3111737 started at Tue Aug 3 00:28:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3111737 at Tue Aug 3 00:28:30 UTC 2021 kill -USR1 3111737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3111737 killed at Tue Aug 3 00:28:30 UTC 2021 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv starting at Tue Aug 3 00:28:30 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3111876 >/dev/null 2>/dev/null selfserv with PID 3111876 found at Tue Aug 3 00:28:30 UTC 2021 selfserv with PID 3111876 started at Tue Aug 3 00:28:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3111876 at Tue Aug 3 00:28:31 UTC 2021 kill -USR1 3111876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3111876 killed at Tue Aug 3 00:28:31 UTC 2021 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv starting at Tue Aug 3 00:28:31 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3111934 >/dev/null 2>/dev/null selfserv with PID 3111934 found at Tue Aug 3 00:28:31 UTC 2021 selfserv with PID 3111934 started at Tue Aug 3 00:28:31 UTC 2021 strsclnt -4 -q -p 8443 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Aug 3 00:28:31 UTC 2021 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Aug 3 00:28:34 UTC 2021 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv with PID 3111934 at Tue Aug 3 00:28:34 UTC 2021 kill -USR1 3111934 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3111934 killed at Tue Aug 3 00:28:34 UTC 2021 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv starting at Tue Aug 3 00:28:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112404 >/dev/null 2>/dev/null selfserv with PID 3112404 found at Tue Aug 3 00:28:34 UTC 2021 selfserv with PID 3112404 started at Tue Aug 3 00:28:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3112404 at Tue Aug 3 00:28:35 UTC 2021 kill -USR1 3112404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112404 killed at Tue Aug 3 00:28:35 UTC 2021 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:28:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112457 >/dev/null 2>/dev/null selfserv with PID 3112457 found at Tue Aug 3 00:28:35 UTC 2021 selfserv with PID 3112457 started at Tue Aug 3 00:28:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3112457 at Tue Aug 3 00:28:35 UTC 2021 kill -USR1 3112457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112457 killed at Tue Aug 3 00:28:35 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112521 >/dev/null 2>/dev/null selfserv with PID 3112521 found at Tue Aug 3 00:28:35 UTC 2021 selfserv with PID 3112521 started at Tue Aug 3 00:28:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3112521 at Tue Aug 3 00:28:35 UTC 2021 kill -USR1 3112521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112521 killed at Tue Aug 3 00:28:35 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112572 >/dev/null 2>/dev/null selfserv with PID 3112572 found at Tue Aug 3 00:28:36 UTC 2021 selfserv with PID 3112572 started at Tue Aug 3 00:28:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3112572 at Tue Aug 3 00:28:36 UTC 2021 kill -USR1 3112572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112572 killed at Tue Aug 3 00:28:36 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:28:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112618 >/dev/null 2>/dev/null selfserv with PID 3112618 found at Tue Aug 3 00:28:36 UTC 2021 selfserv with PID 3112618 started at Tue Aug 3 00:28:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3112618 at Tue Aug 3 00:28:36 UTC 2021 kill -USR1 3112618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112618 killed at Tue Aug 3 00:28:36 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112671 >/dev/null 2>/dev/null selfserv with PID 3112671 found at Tue Aug 3 00:28:36 UTC 2021 selfserv with PID 3112671 started at Tue Aug 3 00:28:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3112671 at Tue Aug 3 00:28:36 UTC 2021 kill -USR1 3112671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112671 killed at Tue Aug 3 00:28:36 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112742 >/dev/null 2>/dev/null selfserv with PID 3112742 found at Tue Aug 3 00:28:37 UTC 2021 selfserv with PID 3112742 started at Tue Aug 3 00:28:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3112742 at Tue Aug 3 00:28:37 UTC 2021 kill -USR1 3112742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112742 killed at Tue Aug 3 00:28:37 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:28:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112797 >/dev/null 2>/dev/null selfserv with PID 3112797 found at Tue Aug 3 00:28:37 UTC 2021 selfserv with PID 3112797 started at Tue Aug 3 00:28:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3112797 at Tue Aug 3 00:28:37 UTC 2021 kill -USR1 3112797 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112797 killed at Tue Aug 3 00:28:37 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112847 >/dev/null 2>/dev/null selfserv with PID 3112847 found at Tue Aug 3 00:28:37 UTC 2021 selfserv with PID 3112847 started at Tue Aug 3 00:28:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3112847 at Tue Aug 3 00:28:37 UTC 2021 kill -USR1 3112847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112847 killed at Tue Aug 3 00:28:37 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3112909 >/dev/null 2>/dev/null selfserv with PID 3112909 found at Tue Aug 3 00:28:38 UTC 2021 selfserv with PID 3112909 started at Tue Aug 3 00:28:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3112909 at Tue Aug 3 00:28:38 UTC 2021 kill -USR1 3112909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3112909 killed at Tue Aug 3 00:28:38 UTC 2021 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:28:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3113123 >/dev/null 2>/dev/null selfserv with PID 3113123 found at Tue Aug 3 00:28:38 UTC 2021 selfserv with PID 3113123 started at Tue Aug 3 00:28:38 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3113123 at Tue Aug 3 00:28:38 UTC 2021 kill -USR1 3113123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3113123 killed at Tue Aug 3 00:28:38 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3113387 >/dev/null 2>/dev/null selfserv with PID 3113387 found at Tue Aug 3 00:28:38 UTC 2021 selfserv with PID 3113387 started at Tue Aug 3 00:28:38 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3113387 at Tue Aug 3 00:28:38 UTC 2021 kill -USR1 3113387 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3113387 killed at Tue Aug 3 00:28:38 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3113548 >/dev/null 2>/dev/null selfserv with PID 3113548 found at Tue Aug 3 00:28:39 UTC 2021 selfserv with PID 3113548 started at Tue Aug 3 00:28:39 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3113548 at Tue Aug 3 00:28:39 UTC 2021 kill -USR1 3113548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3113548 killed at Tue Aug 3 00:28:39 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:28:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3113686 >/dev/null 2>/dev/null selfserv with PID 3113686 found at Tue Aug 3 00:28:39 UTC 2021 selfserv with PID 3113686 started at Tue Aug 3 00:28:39 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3113686 at Tue Aug 3 00:28:39 UTC 2021 kill -USR1 3113686 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3113686 killed at Tue Aug 3 00:28:39 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3113749 >/dev/null 2>/dev/null selfserv with PID 3113749 found at Tue Aug 3 00:28:39 UTC 2021 selfserv with PID 3113749 started at Tue Aug 3 00:28:39 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3113749 at Tue Aug 3 00:28:39 UTC 2021 kill -USR1 3113749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3113749 killed at Tue Aug 3 00:28:39 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3113809 >/dev/null 2>/dev/null selfserv with PID 3113809 found at Tue Aug 3 00:28:40 UTC 2021 selfserv with PID 3113809 started at Tue Aug 3 00:28:40 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3113809 at Tue Aug 3 00:28:40 UTC 2021 kill -USR1 3113809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3113809 killed at Tue Aug 3 00:28:40 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:28:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3113914 >/dev/null 2>/dev/null selfserv with PID 3113914 found at Tue Aug 3 00:28:40 UTC 2021 selfserv with PID 3113914 started at Tue Aug 3 00:28:40 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3113914 at Tue Aug 3 00:28:40 UTC 2021 kill -USR1 3113914 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3113914 killed at Tue Aug 3 00:28:40 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3113986 >/dev/null 2>/dev/null selfserv with PID 3113986 found at Tue Aug 3 00:28:40 UTC 2021 selfserv with PID 3113986 started at Tue Aug 3 00:28:40 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3113986 at Tue Aug 3 00:28:40 UTC 2021 kill -USR1 3113986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3113986 killed at Tue Aug 3 00:28:40 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:28:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3114058 >/dev/null 2>/dev/null selfserv with PID 3114058 found at Tue Aug 3 00:28:41 UTC 2021 selfserv with PID 3114058 started at Tue Aug 3 00:28:41 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3114058 at Tue Aug 3 00:28:41 UTC 2021 kill -USR1 3114058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3114058 killed at Tue Aug 3 00:28:41 UTC 2021 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv starting at Tue Aug 3 00:28:41 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3114152 >/dev/null 2>/dev/null selfserv with PID 3114152 found at Tue Aug 3 00:28:41 UTC 2021 selfserv with PID 3114152 started at Tue Aug 3 00:28:41 UTC 2021 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv with PID 3114152 at Tue Aug 3 00:28:43 UTC 2021 kill -USR1 3114152 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3114152 killed at Tue Aug 3 00:28:43 UTC 2021 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv starting at Tue Aug 3 00:28:43 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3114947 >/dev/null 2>/dev/null selfserv with PID 3114947 found at Tue Aug 3 00:28:43 UTC 2021 selfserv with PID 3114947 started at Tue Aug 3 00:28:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3114947 at Tue Aug 3 00:28:46 UTC 2021 kill -USR1 3114947 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3114947 killed at Tue Aug 3 00:28:46 UTC 2021 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:28:46 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3116134 >/dev/null 2>/dev/null selfserv with PID 3116134 found at Tue Aug 3 00:28:46 UTC 2021 selfserv with PID 3116134 started at Tue Aug 3 00:28:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3116134 at Tue Aug 3 00:28:48 UTC 2021 kill -USR1 3116134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3116134 killed at Tue Aug 3 00:28:48 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:28:48 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3116422 >/dev/null 2>/dev/null selfserv with PID 3116422 found at Tue Aug 3 00:28:48 UTC 2021 selfserv with PID 3116422 started at Tue Aug 3 00:28:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3116422 at Tue Aug 3 00:28:50 UTC 2021 kill -USR1 3116422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3116422 killed at Tue Aug 3 00:28:50 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:28:50 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3116637 >/dev/null 2>/dev/null selfserv with PID 3116637 found at Tue Aug 3 00:28:50 UTC 2021 selfserv with PID 3116637 started at Tue Aug 3 00:28:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3116637 at Tue Aug 3 00:28:53 UTC 2021 kill -USR1 3116637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3116637 killed at Tue Aug 3 00:28:53 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:28:53 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3116829 >/dev/null 2>/dev/null selfserv with PID 3116829 found at Tue Aug 3 00:28:53 UTC 2021 selfserv with PID 3116829 started at Tue Aug 3 00:28:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3116829 at Tue Aug 3 00:28:55 UTC 2021 kill -USR1 3116829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3116829 killed at Tue Aug 3 00:28:55 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:28:55 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3117137 >/dev/null 2>/dev/null selfserv with PID 3117137 found at Tue Aug 3 00:28:55 UTC 2021 selfserv with PID 3117137 started at Tue Aug 3 00:28:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3117137 at Tue Aug 3 00:28:57 UTC 2021 kill -USR1 3117137 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3117137 killed at Tue Aug 3 00:28:57 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:28:57 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:28:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3117820 >/dev/null 2>/dev/null selfserv with PID 3117820 found at Tue Aug 3 00:28:57 UTC 2021 selfserv with PID 3117820 started at Tue Aug 3 00:28:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3117820 at Tue Aug 3 00:29:00 UTC 2021 kill -USR1 3117820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3117820 killed at Tue Aug 3 00:29:00 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:29:00 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3118809 >/dev/null 2>/dev/null selfserv with PID 3118809 found at Tue Aug 3 00:29:00 UTC 2021 selfserv with PID 3118809 started at Tue Aug 3 00:29:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3118809 at Tue Aug 3 00:29:02 UTC 2021 kill -USR1 3118809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3118809 killed at Tue Aug 3 00:29:02 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:29:02 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3119314 >/dev/null 2>/dev/null selfserv with PID 3119314 found at Tue Aug 3 00:29:02 UTC 2021 selfserv with PID 3119314 started at Tue Aug 3 00:29:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3119314 at Tue Aug 3 00:29:04 UTC 2021 kill -USR1 3119314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3119314 killed at Tue Aug 3 00:29:04 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:29:04 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3120013 >/dev/null 2>/dev/null selfserv with PID 3120013 found at Tue Aug 3 00:29:05 UTC 2021 selfserv with PID 3120013 started at Tue Aug 3 00:29:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3120013 at Tue Aug 3 00:29:07 UTC 2021 kill -USR1 3120013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3120013 killed at Tue Aug 3 00:29:07 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:29:07 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3121278 >/dev/null 2>/dev/null selfserv with PID 3121278 found at Tue Aug 3 00:29:07 UTC 2021 selfserv with PID 3121278 started at Tue Aug 3 00:29:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3121278 at Tue Aug 3 00:29:09 UTC 2021 kill -USR1 3121278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3121278 killed at Tue Aug 3 00:29:09 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:29:09 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3122128 >/dev/null 2>/dev/null selfserv with PID 3122128 found at Tue Aug 3 00:29:09 UTC 2021 selfserv with PID 3122128 started at Tue Aug 3 00:29:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3122128 at Tue Aug 3 00:29:12 UTC 2021 kill -USR1 3122128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3122128 killed at Tue Aug 3 00:29:12 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:29:12 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3122743 >/dev/null 2>/dev/null selfserv with PID 3122743 found at Tue Aug 3 00:29:12 UTC 2021 selfserv with PID 3122743 started at Tue Aug 3 00:29:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3122743 at Tue Aug 3 00:29:14 UTC 2021 kill -USR1 3122743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3122743 killed at Tue Aug 3 00:29:14 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:29:14 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3123503 >/dev/null 2>/dev/null selfserv with PID 3123503 found at Tue Aug 3 00:29:14 UTC 2021 selfserv with PID 3123503 started at Tue Aug 3 00:29:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3123503 at Tue Aug 3 00:29:16 UTC 2021 kill -USR1 3123503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3123503 killed at Tue Aug 3 00:29:16 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:29:16 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3123759 >/dev/null 2>/dev/null selfserv with PID 3123759 found at Tue Aug 3 00:29:17 UTC 2021 selfserv with PID 3123759 started at Tue Aug 3 00:29:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3123759 at Tue Aug 3 00:29:19 UTC 2021 kill -USR1 3123759 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3123759 killed at Tue Aug 3 00:29:19 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:29:19 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3123975 >/dev/null 2>/dev/null selfserv with PID 3123975 found at Tue Aug 3 00:29:19 UTC 2021 selfserv with PID 3123975 started at Tue Aug 3 00:29:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3123975 at Tue Aug 3 00:29:21 UTC 2021 kill -USR1 3123975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3123975 killed at Tue Aug 3 00:29:21 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:29:21 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3124150 >/dev/null 2>/dev/null selfserv with PID 3124150 found at Tue Aug 3 00:29:22 UTC 2021 selfserv with PID 3124150 started at Tue Aug 3 00:29:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3124150 at Tue Aug 3 00:29:24 UTC 2021 kill -USR1 3124150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3124150 killed at Tue Aug 3 00:29:24 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:29:24 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3124321 >/dev/null 2>/dev/null selfserv with PID 3124321 found at Tue Aug 3 00:29:24 UTC 2021 selfserv with PID 3124321 started at Tue Aug 3 00:29:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3124321 at Tue Aug 3 00:29:26 UTC 2021 kill -USR1 3124321 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3124321 killed at Tue Aug 3 00:29:26 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:29:26 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3124830 >/dev/null 2>/dev/null selfserv with PID 3124830 found at Tue Aug 3 00:29:26 UTC 2021 selfserv with PID 3124830 started at Tue Aug 3 00:29:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3124830 at Tue Aug 3 00:29:29 UTC 2021 kill -USR1 3124830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3124830 killed at Tue Aug 3 00:29:29 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:29:29 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3124977 >/dev/null 2>/dev/null selfserv with PID 3124977 found at Tue Aug 3 00:29:29 UTC 2021 selfserv with PID 3124977 started at Tue Aug 3 00:29:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3124977 at Tue Aug 3 00:29:31 UTC 2021 kill -USR1 3124977 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3124977 killed at Tue Aug 3 00:29:31 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:29:31 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3125089 >/dev/null 2>/dev/null selfserv with PID 3125089 found at Tue Aug 3 00:29:31 UTC 2021 selfserv with PID 3125089 started at Tue Aug 3 00:29:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3125089 at Tue Aug 3 00:29:33 UTC 2021 kill -USR1 3125089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3125089 killed at Tue Aug 3 00:29:33 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:29:33 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3125178 >/dev/null 2>/dev/null selfserv with PID 3125178 found at Tue Aug 3 00:29:33 UTC 2021 selfserv with PID 3125178 started at Tue Aug 3 00:29:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3125178 at Tue Aug 3 00:29:36 UTC 2021 kill -USR1 3125178 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3125178 killed at Tue Aug 3 00:29:36 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:29:36 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3125300 >/dev/null 2>/dev/null selfserv with PID 3125300 found at Tue Aug 3 00:29:36 UTC 2021 selfserv with PID 3125300 started at Tue Aug 3 00:29:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3125300 at Tue Aug 3 00:29:38 UTC 2021 kill -USR1 3125300 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3125300 killed at Tue Aug 3 00:29:38 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:29:38 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3125379 >/dev/null 2>/dev/null selfserv with PID 3125379 found at Tue Aug 3 00:29:38 UTC 2021 selfserv with PID 3125379 started at Tue Aug 3 00:29:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3125379 at Tue Aug 3 00:29:40 UTC 2021 kill -USR1 3125379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3125379 killed at Tue Aug 3 00:29:40 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:29:40 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3125586 >/dev/null 2>/dev/null selfserv with PID 3125586 found at Tue Aug 3 00:29:40 UTC 2021 selfserv with PID 3125586 started at Tue Aug 3 00:29:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3125586 at Tue Aug 3 00:29:43 UTC 2021 kill -USR1 3125586 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3125586 killed at Tue Aug 3 00:29:43 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:29:43 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3125743 >/dev/null 2>/dev/null selfserv with PID 3125743 found at Tue Aug 3 00:29:43 UTC 2021 selfserv with PID 3125743 started at Tue Aug 3 00:29:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3125743 at Tue Aug 3 00:29:45 UTC 2021 kill -USR1 3125743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3125743 killed at Tue Aug 3 00:29:45 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:29:45 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3125943 >/dev/null 2>/dev/null selfserv with PID 3125943 found at Tue Aug 3 00:29:45 UTC 2021 selfserv with PID 3125943 started at Tue Aug 3 00:29:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3125943 at Tue Aug 3 00:29:48 UTC 2021 kill -USR1 3125943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3125943 killed at Tue Aug 3 00:29:48 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:29:48 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3126197 >/dev/null 2>/dev/null selfserv with PID 3126197 found at Tue Aug 3 00:29:48 UTC 2021 selfserv with PID 3126197 started at Tue Aug 3 00:29:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3126197 at Tue Aug 3 00:29:50 UTC 2021 kill -USR1 3126197 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3126197 killed at Tue Aug 3 00:29:50 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:29:50 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3126405 >/dev/null 2>/dev/null selfserv with PID 3126405 found at Tue Aug 3 00:29:50 UTC 2021 selfserv with PID 3126405 started at Tue Aug 3 00:29:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3126405 at Tue Aug 3 00:29:52 UTC 2021 kill -USR1 3126405 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3126405 killed at Tue Aug 3 00:29:52 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:29:52 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3126569 >/dev/null 2>/dev/null selfserv with PID 3126569 found at Tue Aug 3 00:29:53 UTC 2021 selfserv with PID 3126569 started at Tue Aug 3 00:29:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3126569 at Tue Aug 3 00:29:55 UTC 2021 kill -USR1 3126569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3126569 killed at Tue Aug 3 00:29:55 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:29:55 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3126788 >/dev/null 2>/dev/null selfserv with PID 3126788 found at Tue Aug 3 00:29:55 UTC 2021 selfserv with PID 3126788 started at Tue Aug 3 00:29:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3126788 at Tue Aug 3 00:29:57 UTC 2021 kill -USR1 3126788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3126788 killed at Tue Aug 3 00:29:57 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:29:57 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:29:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3127079 >/dev/null 2>/dev/null selfserv with PID 3127079 found at Tue Aug 3 00:29:58 UTC 2021 selfserv with PID 3127079 started at Tue Aug 3 00:29:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3127079 at Tue Aug 3 00:30:00 UTC 2021 kill -USR1 3127079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3127079 killed at Tue Aug 3 00:30:00 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:30:00 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3127265 >/dev/null 2>/dev/null selfserv with PID 3127265 found at Tue Aug 3 00:30:00 UTC 2021 selfserv with PID 3127265 started at Tue Aug 3 00:30:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3127265 at Tue Aug 3 00:30:03 UTC 2021 kill -USR1 3127265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3127265 killed at Tue Aug 3 00:30:03 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:30:03 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3127540 >/dev/null 2>/dev/null selfserv with PID 3127540 found at Tue Aug 3 00:30:03 UTC 2021 selfserv with PID 3127540 started at Tue Aug 3 00:30:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3127540 at Tue Aug 3 00:30:05 UTC 2021 kill -USR1 3127540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3127540 killed at Tue Aug 3 00:30:05 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:30:05 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3127910 >/dev/null 2>/dev/null selfserv with PID 3127910 found at Tue Aug 3 00:30:05 UTC 2021 selfserv with PID 3127910 started at Tue Aug 3 00:30:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3127910 at Tue Aug 3 00:30:07 UTC 2021 kill -USR1 3127910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3127910 killed at Tue Aug 3 00:30:07 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:30:07 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3128471 >/dev/null 2>/dev/null selfserv with PID 3128471 found at Tue Aug 3 00:30:07 UTC 2021 selfserv with PID 3128471 started at Tue Aug 3 00:30:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3128471 at Tue Aug 3 00:30:10 UTC 2021 kill -USR1 3128471 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3128471 killed at Tue Aug 3 00:30:10 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:10 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3128868 >/dev/null 2>/dev/null selfserv with PID 3128868 found at Tue Aug 3 00:30:10 UTC 2021 selfserv with PID 3128868 started at Tue Aug 3 00:30:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3128868 at Tue Aug 3 00:30:12 UTC 2021 kill -USR1 3128868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3128868 killed at Tue Aug 3 00:30:12 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:12 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3129288 >/dev/null 2>/dev/null selfserv with PID 3129288 found at Tue Aug 3 00:30:12 UTC 2021 selfserv with PID 3129288 started at Tue Aug 3 00:30:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3129288 at Tue Aug 3 00:30:15 UTC 2021 kill -USR1 3129288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3129288 killed at Tue Aug 3 00:30:15 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:15 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3129525 >/dev/null 2>/dev/null selfserv with PID 3129525 found at Tue Aug 3 00:30:15 UTC 2021 selfserv with PID 3129525 started at Tue Aug 3 00:30:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #975: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3129525 at Tue Aug 3 00:30:17 UTC 2021 kill -USR1 3129525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3129525 killed at Tue Aug 3 00:30:17 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:17 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3129913 >/dev/null 2>/dev/null selfserv with PID 3129913 found at Tue Aug 3 00:30:17 UTC 2021 selfserv with PID 3129913 started at Tue Aug 3 00:30:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #976: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3129913 at Tue Aug 3 00:30:20 UTC 2021 kill -USR1 3129913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3129913 killed at Tue Aug 3 00:30:20 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:20 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3130426 >/dev/null 2>/dev/null selfserv with PID 3130426 found at Tue Aug 3 00:30:20 UTC 2021 selfserv with PID 3130426 started at Tue Aug 3 00:30:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3130426 at Tue Aug 3 00:30:22 UTC 2021 kill -USR1 3130426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3130426 killed at Tue Aug 3 00:30:22 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:22 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3131058 >/dev/null 2>/dev/null selfserv with PID 3131058 found at Tue Aug 3 00:30:22 UTC 2021 selfserv with PID 3131058 started at Tue Aug 3 00:30:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3131058 at Tue Aug 3 00:30:24 UTC 2021 kill -USR1 3131058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3131058 killed at Tue Aug 3 00:30:24 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:24 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3131797 >/dev/null 2>/dev/null selfserv with PID 3131797 found at Tue Aug 3 00:30:24 UTC 2021 selfserv with PID 3131797 started at Tue Aug 3 00:30:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #979: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3131797 at Tue Aug 3 00:30:27 UTC 2021 kill -USR1 3131797 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3131797 killed at Tue Aug 3 00:30:27 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:27 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3132599 >/dev/null 2>/dev/null selfserv with PID 3132599 found at Tue Aug 3 00:30:27 UTC 2021 selfserv with PID 3132599 started at Tue Aug 3 00:30:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #980: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3132599 at Tue Aug 3 00:30:29 UTC 2021 kill -USR1 3132599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3132599 killed at Tue Aug 3 00:30:29 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:29 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3133116 >/dev/null 2>/dev/null selfserv with PID 3133116 found at Tue Aug 3 00:30:29 UTC 2021 selfserv with PID 3133116 started at Tue Aug 3 00:30:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3133116 at Tue Aug 3 00:30:31 UTC 2021 kill -USR1 3133116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3133116 killed at Tue Aug 3 00:30:31 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:31 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3133642 >/dev/null 2>/dev/null selfserv with PID 3133642 found at Tue Aug 3 00:30:32 UTC 2021 selfserv with PID 3133642 started at Tue Aug 3 00:30:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3133642 at Tue Aug 3 00:30:34 UTC 2021 kill -USR1 3133642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3133642 killed at Tue Aug 3 00:30:34 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:34 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3134775 >/dev/null 2>/dev/null selfserv with PID 3134775 found at Tue Aug 3 00:30:34 UTC 2021 selfserv with PID 3134775 started at Tue Aug 3 00:30:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #983: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3134775 at Tue Aug 3 00:30:36 UTC 2021 kill -USR1 3134775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3134775 killed at Tue Aug 3 00:30:36 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:36 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3135527 >/dev/null 2>/dev/null selfserv with PID 3135527 found at Tue Aug 3 00:30:36 UTC 2021 selfserv with PID 3135527 started at Tue Aug 3 00:30:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3135527 at Tue Aug 3 00:30:39 UTC 2021 kill -USR1 3135527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3135527 killed at Tue Aug 3 00:30:39 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:39 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3136028 >/dev/null 2>/dev/null selfserv with PID 3136028 found at Tue Aug 3 00:30:39 UTC 2021 selfserv with PID 3136028 started at Tue Aug 3 00:30:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3136028 at Tue Aug 3 00:30:41 UTC 2021 kill -USR1 3136028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3136028 killed at Tue Aug 3 00:30:41 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:41 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3136354 >/dev/null 2>/dev/null selfserv with PID 3136354 found at Tue Aug 3 00:30:41 UTC 2021 selfserv with PID 3136354 started at Tue Aug 3 00:30:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3136354 at Tue Aug 3 00:30:44 UTC 2021 kill -USR1 3136354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3136354 killed at Tue Aug 3 00:30:44 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:44 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3136724 >/dev/null 2>/dev/null selfserv with PID 3136724 found at Tue Aug 3 00:30:44 UTC 2021 selfserv with PID 3136724 started at Tue Aug 3 00:30:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #987: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3136724 at Tue Aug 3 00:30:46 UTC 2021 kill -USR1 3136724 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3136724 killed at Tue Aug 3 00:30:46 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:46 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3137204 >/dev/null 2>/dev/null selfserv with PID 3137204 found at Tue Aug 3 00:30:46 UTC 2021 selfserv with PID 3137204 started at Tue Aug 3 00:30:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3137204 at Tue Aug 3 00:30:49 UTC 2021 kill -USR1 3137204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3137204 killed at Tue Aug 3 00:30:49 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:49 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3137698 >/dev/null 2>/dev/null selfserv with PID 3137698 found at Tue Aug 3 00:30:49 UTC 2021 selfserv with PID 3137698 started at Tue Aug 3 00:30:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3137698 at Tue Aug 3 00:30:51 UTC 2021 kill -USR1 3137698 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3137698 killed at Tue Aug 3 00:30:51 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:51 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3138171 >/dev/null 2>/dev/null selfserv with PID 3138171 found at Tue Aug 3 00:30:51 UTC 2021 selfserv with PID 3138171 started at Tue Aug 3 00:30:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3138171 at Tue Aug 3 00:30:54 UTC 2021 kill -USR1 3138171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3138171 killed at Tue Aug 3 00:30:54 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:30:54 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3138735 >/dev/null 2>/dev/null selfserv with PID 3138735 found at Tue Aug 3 00:30:54 UTC 2021 selfserv with PID 3138735 started at Tue Aug 3 00:30:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #991: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3138735 at Tue Aug 3 00:30:56 UTC 2021 kill -USR1 3138735 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3138735 killed at Tue Aug 3 00:30:56 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:30:56 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3139467 >/dev/null 2>/dev/null selfserv with PID 3139467 found at Tue Aug 3 00:30:56 UTC 2021 selfserv with PID 3139467 started at Tue Aug 3 00:30:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3139467 at Tue Aug 3 00:30:58 UTC 2021 kill -USR1 3139467 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3139467 killed at Tue Aug 3 00:30:58 UTC 2021 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv starting at Tue Aug 3 00:30:58 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:30:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3140368 >/dev/null 2>/dev/null selfserv with PID 3140368 found at Tue Aug 3 00:30:59 UTC 2021 selfserv with PID 3140368 started at Tue Aug 3 00:30:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3140368 at Tue Aug 3 00:31:00 UTC 2021 kill -USR1 3140368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3140368 killed at Tue Aug 3 00:31:00 UTC 2021 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:31:00 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3140730 >/dev/null 2>/dev/null selfserv with PID 3140730 found at Tue Aug 3 00:31:00 UTC 2021 selfserv with PID 3140730 started at Tue Aug 3 00:31:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3140730 at Tue Aug 3 00:31:00 UTC 2021 kill -USR1 3140730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3140730 killed at Tue Aug 3 00:31:00 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:00 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3140879 >/dev/null 2>/dev/null selfserv with PID 3140879 found at Tue Aug 3 00:31:00 UTC 2021 selfserv with PID 3140879 started at Tue Aug 3 00:31:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3140879 at Tue Aug 3 00:31:01 UTC 2021 kill -USR1 3140879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3140879 killed at Tue Aug 3 00:31:01 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:01 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3140968 >/dev/null 2>/dev/null selfserv with PID 3140968 found at Tue Aug 3 00:31:01 UTC 2021 selfserv with PID 3140968 started at Tue Aug 3 00:31:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3140968 at Tue Aug 3 00:31:02 UTC 2021 kill -USR1 3140968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3140968 killed at Tue Aug 3 00:31:02 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:31:02 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3141131 >/dev/null 2>/dev/null selfserv with PID 3141131 found at Tue Aug 3 00:31:02 UTC 2021 selfserv with PID 3141131 started at Tue Aug 3 00:31:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3141131 at Tue Aug 3 00:31:02 UTC 2021 kill -USR1 3141131 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3141131 killed at Tue Aug 3 00:31:02 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:02 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3141314 >/dev/null 2>/dev/null selfserv with PID 3141314 found at Tue Aug 3 00:31:02 UTC 2021 selfserv with PID 3141314 started at Tue Aug 3 00:31:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3141314 at Tue Aug 3 00:31:03 UTC 2021 kill -USR1 3141314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3141314 killed at Tue Aug 3 00:31:03 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:03 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3141452 >/dev/null 2>/dev/null selfserv with PID 3141452 found at Tue Aug 3 00:31:03 UTC 2021 selfserv with PID 3141452 started at Tue Aug 3 00:31:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3141452 at Tue Aug 3 00:31:04 UTC 2021 kill -USR1 3141452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3141452 killed at Tue Aug 3 00:31:04 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:31:04 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3141626 >/dev/null 2>/dev/null selfserv with PID 3141626 found at Tue Aug 3 00:31:04 UTC 2021 selfserv with PID 3141626 started at Tue Aug 3 00:31:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3141626 at Tue Aug 3 00:31:04 UTC 2021 kill -USR1 3141626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3141626 killed at Tue Aug 3 00:31:04 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:04 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3141787 >/dev/null 2>/dev/null selfserv with PID 3141787 found at Tue Aug 3 00:31:04 UTC 2021 selfserv with PID 3141787 started at Tue Aug 3 00:31:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3141787 at Tue Aug 3 00:31:05 UTC 2021 kill -USR1 3141787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3141787 killed at Tue Aug 3 00:31:05 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:05 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3141862 >/dev/null 2>/dev/null selfserv with PID 3141862 found at Tue Aug 3 00:31:05 UTC 2021 selfserv with PID 3141862 started at Tue Aug 3 00:31:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3141862 at Tue Aug 3 00:31:06 UTC 2021 kill -USR1 3141862 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3141862 killed at Tue Aug 3 00:31:06 UTC 2021 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:31:06 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3141919 >/dev/null 2>/dev/null selfserv with PID 3141919 found at Tue Aug 3 00:31:06 UTC 2021 selfserv with PID 3141919 started at Tue Aug 3 00:31:06 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3141919 at Tue Aug 3 00:31:06 UTC 2021 kill -USR1 3141919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3141919 killed at Tue Aug 3 00:31:06 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:06 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3141981 >/dev/null 2>/dev/null selfserv with PID 3141981 found at Tue Aug 3 00:31:06 UTC 2021 selfserv with PID 3141981 started at Tue Aug 3 00:31:06 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3141981 at Tue Aug 3 00:31:07 UTC 2021 kill -USR1 3141981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3141981 killed at Tue Aug 3 00:31:07 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:07 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3142075 >/dev/null 2>/dev/null selfserv with PID 3142075 found at Tue Aug 3 00:31:07 UTC 2021 selfserv with PID 3142075 started at Tue Aug 3 00:31:07 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3142075 at Tue Aug 3 00:31:08 UTC 2021 kill -USR1 3142075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3142075 killed at Tue Aug 3 00:31:08 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:31:08 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3142162 >/dev/null 2>/dev/null selfserv with PID 3142162 found at Tue Aug 3 00:31:08 UTC 2021 selfserv with PID 3142162 started at Tue Aug 3 00:31:08 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3142162 at Tue Aug 3 00:31:08 UTC 2021 kill -USR1 3142162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3142162 killed at Tue Aug 3 00:31:08 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:08 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3142270 >/dev/null 2>/dev/null selfserv with PID 3142270 found at Tue Aug 3 00:31:08 UTC 2021 selfserv with PID 3142270 started at Tue Aug 3 00:31:08 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3142270 at Tue Aug 3 00:31:09 UTC 2021 kill -USR1 3142270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3142270 killed at Tue Aug 3 00:31:09 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:09 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3142375 >/dev/null 2>/dev/null selfserv with PID 3142375 found at Tue Aug 3 00:31:09 UTC 2021 selfserv with PID 3142375 started at Tue Aug 3 00:31:09 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3142375 at Tue Aug 3 00:31:10 UTC 2021 kill -USR1 3142375 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3142375 killed at Tue Aug 3 00:31:10 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:31:10 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3142484 >/dev/null 2>/dev/null selfserv with PID 3142484 found at Tue Aug 3 00:31:10 UTC 2021 selfserv with PID 3142484 started at Tue Aug 3 00:31:10 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3142484 at Tue Aug 3 00:31:10 UTC 2021 kill -USR1 3142484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3142484 killed at Tue Aug 3 00:31:10 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:10 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3142590 >/dev/null 2>/dev/null selfserv with PID 3142590 found at Tue Aug 3 00:31:10 UTC 2021 selfserv with PID 3142590 started at Tue Aug 3 00:31:10 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3142590 at Tue Aug 3 00:31:11 UTC 2021 kill -USR1 3142590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3142590 killed at Tue Aug 3 00:31:11 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:31:11 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:31:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3142690 >/dev/null 2>/dev/null selfserv with PID 3142690 found at Tue Aug 3 00:31:11 UTC 2021 selfserv with PID 3142690 started at Tue Aug 3 00:31:11 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3142690 at Tue Aug 3 00:31:12 UTC 2021 kill -USR1 3142690 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3142690 killed at Tue Aug 3 00:31:12 UTC 2021 TIMESTAMP ssl END: Tue Aug 3 00:31:12 UTC 2021 Running tests for ocsp TIMESTAMP ocsp BEGIN: Tue Aug 3 00:31:12 UTC 2021 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Tue Aug 3 00:31:12 UTC 2021 Running tests for merge TIMESTAMP merge BEGIN: Tue Aug 3 00:31:12 UTC 2021 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/tests.v3.2438121 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:08:50 2021 Not After : Mon Aug 03 00:08:50 2026 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:f4:43:4d:b4:f6:ef:ac:2b:57:c5:23:08:fd:ec:5c: 08:c6:36:93:78:08:cf:1d:5a:7e:12:29:e0:74:16:02: a7:59:4c:82:36:52:82:51:c5:f5:72:f9:cf:25:af:a3: e4:60:70:8b:36:31:83:28:7a:21:26:06:ca:d8:cb:1d: 7a:97:7e:20:51:c9:13:05:c3:f5:3b:72:da:ed:12:e6: 61:67:0d:93:5a:5b:f0:e5:97:dd:e8:da:df:9c:ed:28: 9f:08:ba:c2:87:2b:0a:8b:30:9a:c4:3b:16:3f:6e:49: 11:ed:a7:da:3e:ed:7c:f9:f8:ce:3e:9e:a7:14:73:58: de:ea:54:5c:83:ef:e8:57:0f:db:e3:fb:0e:84:e4:95: 40:f0:0e:03:bd:26:80:8d:9f:d0:2b:9e:0e:48:d2:36: 13:06:a4:eb:f1:7c:f9:18:3a:07:58:29:58:00:a9:2d: 6b:6d:b9:00:de:af:33:8c:9b:35:f3:36:69:dc:12:85: cb:0b:49:ef:0f:4d:94:8d:2a:77:76:0d:36:0c:de:09: ab:dd:b7:8e:3b:ec:50:86:2b:19:d0:94:6e:d1:92:2a: 28:65:32:68:fb:07:c6:58:80:8b:63:bd:b9:de:0d:eb: 19:08:93:d8:5e:b3:ba:3c:ea:40:be:b9:62:4c:f8:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:7f:cf:2a:5c:82:59:85:ea:d2:0b:b9:8a:3f:bc:10: c1:38:49:ec:1e:bf:c7:a6:fb:fc:f1:7f:75:14:fd:a6: e4:17:67:21:c6:d9:82:f1:f8:9c:b5:74:48:05:c9:01: e0:1a:06:4e:82:43:13:e9:f0:06:8c:d5:5a:88:10:02: 65:6f:99:58:14:73:92:01:9b:f9:29:c2:6c:2d:17:39: 5a:b6:73:92:92:ca:09:74:04:31:74:bc:ef:50:eb:f5: 29:75:4c:f0:41:08:f5:07:8d:59:7a:17:54:0a:87:78: 1a:34:79:12:6c:d6:56:05:d5:4f:83:bf:76:16:8e:c8: 89:92:20:61:16:9c:60:80:19:3d:74:b0:a1:b1:ff:6e: ea:09:db:37:55:c9:39:1a:f9:47:40:99:ef:58:ca:b1: 11:c3:e7:12:39:5c:d4:fe:e9:37:9c:2c:ba:85:91:9b: a4:93:37:d1:db:84:95:b9:59:df:05:b5:55:4a:dc:80: 74:b5:8c:40:24:96:4d:0c:42:39:af:f5:87:6c:b4:f8: d6:d9:71:43:52:c6:6c:ca:b3:b3:3e:37:b7:52:1a:f4: ca:d0:74:ce:93:f8:07:5d:89:8e:5c:f2:0b:7f:30:95: 16:18:b3:e3:02:6a:c1:19:7c:67:17:13:c6:fb:d1:58 Fingerprint (SHA-256): FE:10:90:F6:04:F8:01:63:EB:F9:BD:9B:71:C8:26:D2:90:0F:CE:F2:4D:02:BD:83:4C:17:63:F9:A5:EB:4C:42 Fingerprint (SHA1): 42:F7:FC:F4:A2:B9:35:79:65:80:19:12:4E:1A:A8:D8:61:21:F5:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:08:52 2021 Not After : Mon Aug 03 00:08:52 2026 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:71:2d:cd:95:27:5c:0e:b4:10:c2:15:14:ba:c2:b4: 17:ae:c0:42:32:60:e3:d5:ab:ae:fc:e9:ab:fb:dd:e9: dc:e5:6d:22:c0:be:d9:8c:38:3e:6f:af:da:31:38:83: b7:e7:dd:10:76:d7:8c:06:b8:48:02:b2:3f:f3:9c:96: e5:a1:f4:f0:c3:46:92:f1:e6:29:85:b4:12:a5:82:8f: f9:27:f1:dd:d4:73:f9:ac:fa:51:8a:cb:af:86:ed:8e: a2:19:8f:55:4e:28:84:b4:2e:0e:e8:44:67:c3:f3:cc: 47:28:81:89:90:cc:bb:92:8d:12:4e:54:9d:21:c5:fa: 95:1d:79:a1:c9:5a:fe:8a:63:6a:d1:5c:9f:81:5e:91: 12:0f:fc:43:10:1c:f9:c9:4a:b6:e0:98:e8:47:3a:3c: 64:cd:fc:b4:d8:c0:2c:01:1e:f9:85:f4:53:df:d5:be: d6:fd:e7:c8:ae:0b:d1:8a:75:f2:d8:1c:c2:01:3c:bd: a8:fd:9b:5b:df:12:40:f1:17:b5:de:4c:c3:c0:fc:f2: bf:b7:b5:bf:8a:0e:4f:c6:43:d2:f7:2e:8c:ab:90:90: 61:1e:17:78:05:01:f6:92:56:b5:1a:ee:73:1f:a2:1f: d5:a2:27:4d:dd:56:7c:6e:c9:fb:26:73:3e:c9:86:a7 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:84:0c:f7:15:be:b0:b1:95:e3:57:40:d8:33:c2:ca: 35:ba:4b:ae:8e:41:02:a3:b0:67:dd:1c:1b:b8:72:1f: 37:9f:5e:53:d9:10:f3:66:de:d2:03:f3:34:85:08:9e: 45:4b:9d:a9:a2:ea:1d:a2:a9:df:bb:f2:cb:fd:f6:90: db:fe:56:37:41:4d:f2:40:0d:88:39:0a:5b:da:29:2c: 24:ff:66:62:2d:7f:88:b4:cf:c9:76:c2:91:ae:99:b0: f1:ad:a1:d3:62:88:0b:98:04:81:2c:a6:16:ef:cd:84: 8e:88:91:6f:9e:57:c0:88:50:68:6b:5f:f5:73:64:0a: dc:b4:c5:06:d6:21:e4:09:5c:38:42:53:ec:1a:96:49: 40:34:ea:38:fb:cd:0b:2a:4a:89:8a:1b:06:88:41:f9: 61:97:a3:9f:80:51:bd:69:d0:6f:99:6a:6c:4b:83:9d: cd:c2:77:9a:68:de:04:dc:6e:cf:f1:0a:4a:33:10:39: cf:75:5f:f9:08:da:84:8e:5d:24:e6:7c:fd:06:60:83: 69:37:0a:2e:93:7c:01:1b:53:aa:b9:bf:09:83:78:dc: 76:1d:d7:fd:a9:37:2d:34:74:1c:41:36:0a:32:cf:29: 38:b4:c9:20:01:c9:7b:65:07:83:2b:e4:4a:87:e6:67 Fingerprint (SHA-256): 21:29:6E:F7:8C:A8:F2:D0:2A:82:68:32:5B:92:4C:5B:71:0C:4D:E5:8A:D4:89:EC:F0:CC:68:DA:B6:4E:31:20 Fingerprint (SHA1): 7A:B6:EE:39:36:1A:59:AB:AD:82:FE:B3:E8:E8:66:D3:39:8B:7C:8E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u chain-2-clientCA-ec ,, chain-1-clientCA-ec ,, clientCA-ec T,C,C chain-2-clientCA-dsa ,, chain-1-clientCA-dsa ,, clientCA-dsa T,C,C chain-2-clientCA ,, chain-1-clientCA ,, clientCA T,C,C Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/tests.v3.2438121 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/tests.v1.2438121 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Tue Aug 03 00:09:12 2021 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Tue Aug 03 00:07:14 2021 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Tue Aug 03 00:09:08 2021 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=STANDARD NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Tue Aug 3 00:31:26 UTC 2021 Running tests for ec TIMESTAMP ec BEGIN: Tue Aug 3 00:31:26 UTC 2021 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Tue Aug 3 00:31:26 UTC 2021 ecperf.sh: ecperf test =============================== Testing NIST-P256 using freebl implementation... ECDH_Derive count: 100 sec: 0.09 op/sec: 1114.26 ECDSA_Sign count: 100 sec: 0.03 op/sec: 3257.65 ECDHE max rate = 1092.98 ECDSA_Verify count: 100 sec: 0.07 op/sec: 1403.31 ... okay. Testing NIST-P384 using freebl implementation... ECDH_Derive count: 100 sec: 0.26 op/sec: 384.15 ECDSA_Sign count: 100 sec: 0.05 op/sec: 1853.36 ECDHE max rate = 559.38 ECDSA_Verify count: 100 sec: 0.16 op/sec: 640.64 ... okay. Testing NIST-P521 using freebl implementation... ECDH_Derive count: 100 sec: 0.16 op/sec: 620.85 ECDSA_Sign count: 100 sec: 0.06 op/sec: 1788.62 ECDHE max rate = 602.37 ECDSA_Verify count: 100 sec: 0.11 op/sec: 897.43 ... okay. Testing Curve25519 using freebl implementation... ECDH_Derive count: 100 sec: 0.01 op/sec: 14775.41 ... okay. ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Tue Aug 3 00:31:27 UTC 2021 Running ec tests for ectest TIMESTAMP ectest BEGIN: Tue Aug 3 00:31:27 UTC 2021 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: freebl ec tests - PASSED ectest.sh: #7: pk11 ec tests - PASSED TIMESTAMP ectest END: Tue Aug 3 00:31:28 UTC 2021 TIMESTAMP ec END: Tue Aug 3 00:31:28 UTC 2021 Running tests for gtests TIMESTAMP gtests BEGIN: Tue Aug 3 00:31:28 UTC 2021 /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/gtests gtests: prng_gtest certhigh_gtest certdb_gtest der_gtest pk11_gtest util_gtest freebl_gtest softoken_gtest sysinit_gtest blake2b_gtest smime_gtest mozpkix_gtest gtests.sh: prng_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/prng_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/prng_gtest -n dummy -s CN=dummy -t ,, -x -m 1 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #1: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/prng_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing prng_gtest [==========] Running 240 tests from 1 test suite. [----------] Global test environment set-up. [----------] 240 tests from NISTTestVector/PRNGTest [ RUN ] NISTTestVector/PRNGTest.HashDRBG/0 [ OK ] NISTTestVector/PRNGTest.HashDRBG/0 (1 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/1 [ OK ] NISTTestVector/PRNGTest.HashDRBG/1 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/2 [ OK ] NISTTestVector/PRNGTest.HashDRBG/2 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/3 [ OK ] NISTTestVector/PRNGTest.HashDRBG/3 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/4 [ OK ] NISTTestVector/PRNGTest.HashDRBG/4 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/5 [ OK ] NISTTestVector/PRNGTest.HashDRBG/5 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/6 [ OK ] NISTTestVector/PRNGTest.HashDRBG/6 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/7 [ OK ] NISTTestVector/PRNGTest.HashDRBG/7 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/8 [ OK ] NISTTestVector/PRNGTest.HashDRBG/8 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/9 [ OK ] NISTTestVector/PRNGTest.HashDRBG/9 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/10 [ OK ] NISTTestVector/PRNGTest.HashDRBG/10 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/11 [ OK ] NISTTestVector/PRNGTest.HashDRBG/11 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/12 [ OK ] NISTTestVector/PRNGTest.HashDRBG/12 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/13 [ OK ] NISTTestVector/PRNGTest.HashDRBG/13 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/14 [ OK ] NISTTestVector/PRNGTest.HashDRBG/14 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/15 [ OK ] NISTTestVector/PRNGTest.HashDRBG/15 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/16 [ OK ] NISTTestVector/PRNGTest.HashDRBG/16 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/17 [ OK ] NISTTestVector/PRNGTest.HashDRBG/17 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/18 [ OK ] NISTTestVector/PRNGTest.HashDRBG/18 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/19 [ OK ] NISTTestVector/PRNGTest.HashDRBG/19 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/20 [ OK ] NISTTestVector/PRNGTest.HashDRBG/20 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/21 [ OK ] NISTTestVector/PRNGTest.HashDRBG/21 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/22 [ OK ] NISTTestVector/PRNGTest.HashDRBG/22 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/23 [ OK ] NISTTestVector/PRNGTest.HashDRBG/23 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/24 [ OK ] NISTTestVector/PRNGTest.HashDRBG/24 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/25 [ OK ] NISTTestVector/PRNGTest.HashDRBG/25 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/26 [ OK ] NISTTestVector/PRNGTest.HashDRBG/26 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/27 [ OK ] NISTTestVector/PRNGTest.HashDRBG/27 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/28 [ OK ] NISTTestVector/PRNGTest.HashDRBG/28 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/29 [ OK ] NISTTestVector/PRNGTest.HashDRBG/29 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/30 [ OK ] NISTTestVector/PRNGTest.HashDRBG/30 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/31 [ OK ] NISTTestVector/PRNGTest.HashDRBG/31 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/32 [ OK ] NISTTestVector/PRNGTest.HashDRBG/32 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/33 [ OK ] NISTTestVector/PRNGTest.HashDRBG/33 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/34 [ OK ] NISTTestVector/PRNGTest.HashDRBG/34 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/35 [ OK ] NISTTestVector/PRNGTest.HashDRBG/35 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/36 [ OK ] NISTTestVector/PRNGTest.HashDRBG/36 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/37 [ OK ] NISTTestVector/PRNGTest.HashDRBG/37 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/38 [ OK ] NISTTestVector/PRNGTest.HashDRBG/38 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/39 [ OK ] NISTTestVector/PRNGTest.HashDRBG/39 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/40 [ OK ] NISTTestVector/PRNGTest.HashDRBG/40 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/41 [ OK ] NISTTestVector/PRNGTest.HashDRBG/41 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/42 [ OK ] NISTTestVector/PRNGTest.HashDRBG/42 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/43 [ OK ] NISTTestVector/PRNGTest.HashDRBG/43 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/44 [ OK ] NISTTestVector/PRNGTest.HashDRBG/44 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/45 [ OK ] NISTTestVector/PRNGTest.HashDRBG/45 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/46 [ OK ] NISTTestVector/PRNGTest.HashDRBG/46 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/47 [ OK ] NISTTestVector/PRNGTest.HashDRBG/47 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/48 [ OK ] NISTTestVector/PRNGTest.HashDRBG/48 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/49 [ OK ] NISTTestVector/PRNGTest.HashDRBG/49 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/50 [ OK ] NISTTestVector/PRNGTest.HashDRBG/50 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/51 [ OK ] NISTTestVector/PRNGTest.HashDRBG/51 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/52 [ OK ] NISTTestVector/PRNGTest.HashDRBG/52 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/53 [ OK ] NISTTestVector/PRNGTest.HashDRBG/53 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/54 [ OK ] NISTTestVector/PRNGTest.HashDRBG/54 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/55 [ OK ] NISTTestVector/PRNGTest.HashDRBG/55 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/56 [ OK ] NISTTestVector/PRNGTest.HashDRBG/56 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/57 [ OK ] NISTTestVector/PRNGTest.HashDRBG/57 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/58 [ OK ] NISTTestVector/PRNGTest.HashDRBG/58 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/59 [ OK ] NISTTestVector/PRNGTest.HashDRBG/59 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/60 [ OK ] NISTTestVector/PRNGTest.HashDRBG/60 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/61 [ OK ] NISTTestVector/PRNGTest.HashDRBG/61 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/62 [ OK ] NISTTestVector/PRNGTest.HashDRBG/62 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/63 [ OK ] NISTTestVector/PRNGTest.HashDRBG/63 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/64 [ OK ] NISTTestVector/PRNGTest.HashDRBG/64 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/65 [ OK ] NISTTestVector/PRNGTest.HashDRBG/65 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/66 [ OK ] NISTTestVector/PRNGTest.HashDRBG/66 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/67 [ OK ] NISTTestVector/PRNGTest.HashDRBG/67 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/68 [ OK ] NISTTestVector/PRNGTest.HashDRBG/68 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/69 [ OK ] NISTTestVector/PRNGTest.HashDRBG/69 (1 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/70 [ OK ] NISTTestVector/PRNGTest.HashDRBG/70 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/71 [ OK ] NISTTestVector/PRNGTest.HashDRBG/71 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/72 [ OK ] NISTTestVector/PRNGTest.HashDRBG/72 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/73 [ OK ] NISTTestVector/PRNGTest.HashDRBG/73 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/74 [ OK ] NISTTestVector/PRNGTest.HashDRBG/74 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/75 [ OK ] NISTTestVector/PRNGTest.HashDRBG/75 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/76 [ OK ] NISTTestVector/PRNGTest.HashDRBG/76 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/77 [ OK ] NISTTestVector/PRNGTest.HashDRBG/77 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/78 [ OK ] NISTTestVector/PRNGTest.HashDRBG/78 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/79 [ OK ] NISTTestVector/PRNGTest.HashDRBG/79 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/80 [ OK ] NISTTestVector/PRNGTest.HashDRBG/80 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/81 [ OK ] NISTTestVector/PRNGTest.HashDRBG/81 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/82 [ OK ] NISTTestVector/PRNGTest.HashDRBG/82 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/83 [ OK ] NISTTestVector/PRNGTest.HashDRBG/83 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/84 [ OK ] NISTTestVector/PRNGTest.HashDRBG/84 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/85 [ OK ] NISTTestVector/PRNGTest.HashDRBG/85 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/86 [ OK ] NISTTestVector/PRNGTest.HashDRBG/86 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/87 [ OK ] NISTTestVector/PRNGTest.HashDRBG/87 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/88 [ OK ] NISTTestVector/PRNGTest.HashDRBG/88 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/89 [ OK ] NISTTestVector/PRNGTest.HashDRBG/89 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/90 [ OK ] NISTTestVector/PRNGTest.HashDRBG/90 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/91 [ OK ] NISTTestVector/PRNGTest.HashDRBG/91 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/92 [ OK ] NISTTestVector/PRNGTest.HashDRBG/92 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/93 [ OK ] NISTTestVector/PRNGTest.HashDRBG/93 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/94 [ OK ] NISTTestVector/PRNGTest.HashDRBG/94 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/95 [ OK ] NISTTestVector/PRNGTest.HashDRBG/95 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/96 [ OK ] NISTTestVector/PRNGTest.HashDRBG/96 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/97 [ OK ] NISTTestVector/PRNGTest.HashDRBG/97 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/98 [ OK ] NISTTestVector/PRNGTest.HashDRBG/98 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/99 [ OK ] NISTTestVector/PRNGTest.HashDRBG/99 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/100 [ OK ] NISTTestVector/PRNGTest.HashDRBG/100 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/101 [ OK ] NISTTestVector/PRNGTest.HashDRBG/101 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/102 [ OK ] NISTTestVector/PRNGTest.HashDRBG/102 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/103 [ OK ] NISTTestVector/PRNGTest.HashDRBG/103 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/104 [ OK ] NISTTestVector/PRNGTest.HashDRBG/104 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/105 [ OK ] NISTTestVector/PRNGTest.HashDRBG/105 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/106 [ OK ] NISTTestVector/PRNGTest.HashDRBG/106 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/107 [ OK ] NISTTestVector/PRNGTest.HashDRBG/107 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/108 [ OK ] NISTTestVector/PRNGTest.HashDRBG/108 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/109 [ OK ] NISTTestVector/PRNGTest.HashDRBG/109 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/110 [ OK ] NISTTestVector/PRNGTest.HashDRBG/110 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/111 [ OK ] NISTTestVector/PRNGTest.HashDRBG/111 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/112 [ OK ] NISTTestVector/PRNGTest.HashDRBG/112 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/113 [ OK ] NISTTestVector/PRNGTest.HashDRBG/113 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/114 [ OK ] NISTTestVector/PRNGTest.HashDRBG/114 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/115 [ OK ] NISTTestVector/PRNGTest.HashDRBG/115 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/116 [ OK ] NISTTestVector/PRNGTest.HashDRBG/116 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/117 [ OK ] NISTTestVector/PRNGTest.HashDRBG/117 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/118 [ OK ] NISTTestVector/PRNGTest.HashDRBG/118 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/119 [ OK ] NISTTestVector/PRNGTest.HashDRBG/119 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/120 [ OK ] NISTTestVector/PRNGTest.HashDRBG/120 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/121 [ OK ] NISTTestVector/PRNGTest.HashDRBG/121 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/122 [ OK ] NISTTestVector/PRNGTest.HashDRBG/122 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/123 [ OK ] NISTTestVector/PRNGTest.HashDRBG/123 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/124 [ OK ] NISTTestVector/PRNGTest.HashDRBG/124 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/125 [ OK ] NISTTestVector/PRNGTest.HashDRBG/125 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/126 [ OK ] NISTTestVector/PRNGTest.HashDRBG/126 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/127 [ OK ] NISTTestVector/PRNGTest.HashDRBG/127 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/128 [ OK ] NISTTestVector/PRNGTest.HashDRBG/128 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/129 [ OK ] NISTTestVector/PRNGTest.HashDRBG/129 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/130 [ OK ] NISTTestVector/PRNGTest.HashDRBG/130 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/131 [ OK ] NISTTestVector/PRNGTest.HashDRBG/131 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/132 [ OK ] NISTTestVector/PRNGTest.HashDRBG/132 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/133 [ OK ] NISTTestVector/PRNGTest.HashDRBG/133 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/134 [ OK ] NISTTestVector/PRNGTest.HashDRBG/134 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/135 [ OK ] NISTTestVector/PRNGTest.HashDRBG/135 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/136 [ OK ] NISTTestVector/PRNGTest.HashDRBG/136 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/137 [ OK ] NISTTestVector/PRNGTest.HashDRBG/137 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/138 [ OK ] NISTTestVector/PRNGTest.HashDRBG/138 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/139 [ OK ] NISTTestVector/PRNGTest.HashDRBG/139 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/140 [ OK ] NISTTestVector/PRNGTest.HashDRBG/140 (1 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/141 [ OK ] NISTTestVector/PRNGTest.HashDRBG/141 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/142 [ OK ] NISTTestVector/PRNGTest.HashDRBG/142 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/143 [ OK ] NISTTestVector/PRNGTest.HashDRBG/143 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/144 [ OK ] NISTTestVector/PRNGTest.HashDRBG/144 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/145 [ OK ] NISTTestVector/PRNGTest.HashDRBG/145 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/146 [ OK ] NISTTestVector/PRNGTest.HashDRBG/146 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/147 [ OK ] NISTTestVector/PRNGTest.HashDRBG/147 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/148 [ OK ] NISTTestVector/PRNGTest.HashDRBG/148 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/149 [ OK ] NISTTestVector/PRNGTest.HashDRBG/149 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/150 [ OK ] NISTTestVector/PRNGTest.HashDRBG/150 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/151 [ OK ] NISTTestVector/PRNGTest.HashDRBG/151 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/152 [ OK ] NISTTestVector/PRNGTest.HashDRBG/152 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/153 [ OK ] NISTTestVector/PRNGTest.HashDRBG/153 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/154 [ OK ] NISTTestVector/PRNGTest.HashDRBG/154 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/155 [ OK ] NISTTestVector/PRNGTest.HashDRBG/155 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/156 [ OK ] NISTTestVector/PRNGTest.HashDRBG/156 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/157 [ OK ] NISTTestVector/PRNGTest.HashDRBG/157 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/158 [ OK ] NISTTestVector/PRNGTest.HashDRBG/158 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/159 [ OK ] NISTTestVector/PRNGTest.HashDRBG/159 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/160 [ OK ] NISTTestVector/PRNGTest.HashDRBG/160 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/161 [ OK ] NISTTestVector/PRNGTest.HashDRBG/161 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/162 [ OK ] NISTTestVector/PRNGTest.HashDRBG/162 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/163 [ OK ] NISTTestVector/PRNGTest.HashDRBG/163 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/164 [ OK ] NISTTestVector/PRNGTest.HashDRBG/164 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/165 [ OK ] NISTTestVector/PRNGTest.HashDRBG/165 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/166 [ OK ] NISTTestVector/PRNGTest.HashDRBG/166 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/167 [ OK ] NISTTestVector/PRNGTest.HashDRBG/167 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/168 [ OK ] NISTTestVector/PRNGTest.HashDRBG/168 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/169 [ OK ] NISTTestVector/PRNGTest.HashDRBG/169 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/170 [ OK ] NISTTestVector/PRNGTest.HashDRBG/170 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/171 [ OK ] NISTTestVector/PRNGTest.HashDRBG/171 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/172 [ OK ] NISTTestVector/PRNGTest.HashDRBG/172 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/173 [ OK ] NISTTestVector/PRNGTest.HashDRBG/173 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/174 [ OK ] NISTTestVector/PRNGTest.HashDRBG/174 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/175 [ OK ] NISTTestVector/PRNGTest.HashDRBG/175 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/176 [ OK ] NISTTestVector/PRNGTest.HashDRBG/176 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/177 [ OK ] NISTTestVector/PRNGTest.HashDRBG/177 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/178 [ OK ] NISTTestVector/PRNGTest.HashDRBG/178 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/179 [ OK ] NISTTestVector/PRNGTest.HashDRBG/179 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/180 [ OK ] NISTTestVector/PRNGTest.HashDRBG/180 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/181 [ OK ] NISTTestVector/PRNGTest.HashDRBG/181 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/182 [ OK ] NISTTestVector/PRNGTest.HashDRBG/182 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/183 [ OK ] NISTTestVector/PRNGTest.HashDRBG/183 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/184 [ OK ] NISTTestVector/PRNGTest.HashDRBG/184 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/185 [ OK ] NISTTestVector/PRNGTest.HashDRBG/185 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/186 [ OK ] NISTTestVector/PRNGTest.HashDRBG/186 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/187 [ OK ] NISTTestVector/PRNGTest.HashDRBG/187 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/188 [ OK ] NISTTestVector/PRNGTest.HashDRBG/188 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/189 [ OK ] NISTTestVector/PRNGTest.HashDRBG/189 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/190 [ OK ] NISTTestVector/PRNGTest.HashDRBG/190 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/191 [ OK ] NISTTestVector/PRNGTest.HashDRBG/191 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/192 [ OK ] NISTTestVector/PRNGTest.HashDRBG/192 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/193 [ OK ] NISTTestVector/PRNGTest.HashDRBG/193 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/194 [ OK ] NISTTestVector/PRNGTest.HashDRBG/194 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/195 [ OK ] NISTTestVector/PRNGTest.HashDRBG/195 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/196 [ OK ] NISTTestVector/PRNGTest.HashDRBG/196 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/197 [ OK ] NISTTestVector/PRNGTest.HashDRBG/197 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/198 [ OK ] NISTTestVector/PRNGTest.HashDRBG/198 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/199 [ OK ] NISTTestVector/PRNGTest.HashDRBG/199 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/200 [ OK ] NISTTestVector/PRNGTest.HashDRBG/200 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/201 [ OK ] NISTTestVector/PRNGTest.HashDRBG/201 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/202 [ OK ] NISTTestVector/PRNGTest.HashDRBG/202 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/203 [ OK ] NISTTestVector/PRNGTest.HashDRBG/203 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/204 [ OK ] NISTTestVector/PRNGTest.HashDRBG/204 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/205 [ OK ] NISTTestVector/PRNGTest.HashDRBG/205 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/206 [ OK ] NISTTestVector/PRNGTest.HashDRBG/206 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/207 [ OK ] NISTTestVector/PRNGTest.HashDRBG/207 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/208 [ OK ] NISTTestVector/PRNGTest.HashDRBG/208 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/209 [ OK ] NISTTestVector/PRNGTest.HashDRBG/209 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/210 [ OK ] NISTTestVector/PRNGTest.HashDRBG/210 (1 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/211 [ OK ] NISTTestVector/PRNGTest.HashDRBG/211 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/212 [ OK ] NISTTestVector/PRNGTest.HashDRBG/212 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/213 [ OK ] NISTTestVector/PRNGTest.HashDRBG/213 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/214 [ OK ] NISTTestVector/PRNGTest.HashDRBG/214 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/215 [ OK ] NISTTestVector/PRNGTest.HashDRBG/215 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/216 [ OK ] NISTTestVector/PRNGTest.HashDRBG/216 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/217 [ OK ] NISTTestVector/PRNGTest.HashDRBG/217 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/218 [ OK ] NISTTestVector/PRNGTest.HashDRBG/218 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/219 [ OK ] NISTTestVector/PRNGTest.HashDRBG/219 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/220 [ OK ] NISTTestVector/PRNGTest.HashDRBG/220 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/221 [ OK ] NISTTestVector/PRNGTest.HashDRBG/221 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/222 [ OK ] NISTTestVector/PRNGTest.HashDRBG/222 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/223 [ OK ] NISTTestVector/PRNGTest.HashDRBG/223 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/224 [ OK ] NISTTestVector/PRNGTest.HashDRBG/224 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/225 [ OK ] NISTTestVector/PRNGTest.HashDRBG/225 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/226 [ OK ] NISTTestVector/PRNGTest.HashDRBG/226 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/227 [ OK ] NISTTestVector/PRNGTest.HashDRBG/227 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/228 [ OK ] NISTTestVector/PRNGTest.HashDRBG/228 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/229 [ OK ] NISTTestVector/PRNGTest.HashDRBG/229 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/230 [ OK ] NISTTestVector/PRNGTest.HashDRBG/230 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/231 [ OK ] NISTTestVector/PRNGTest.HashDRBG/231 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/232 [ OK ] NISTTestVector/PRNGTest.HashDRBG/232 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/233 [ OK ] NISTTestVector/PRNGTest.HashDRBG/233 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/234 [ OK ] NISTTestVector/PRNGTest.HashDRBG/234 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/235 [ OK ] NISTTestVector/PRNGTest.HashDRBG/235 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/236 [ OK ] NISTTestVector/PRNGTest.HashDRBG/236 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/237 [ OK ] NISTTestVector/PRNGTest.HashDRBG/237 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/238 [ OK ] NISTTestVector/PRNGTest.HashDRBG/238 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/239 [ OK ] NISTTestVector/PRNGTest.HashDRBG/239 (0 ms) [----------] 240 tests from NISTTestVector/PRNGTest (4 ms total) [----------] Global test environment tear-down [==========] 240 tests from 1 test suite ran. (4 ms total) [ PASSED ] 240 tests. gtests.sh: #2: prng_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/prng_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: certhigh_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/certhigh_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/certhigh_gtest -n dummy -s CN=dummy -t ,, -x -m 2 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #3: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/certhigh_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing certhigh_gtest [==========] Running 1 test from 1 test suite. [----------] Global test environment set-up. [----------] 1 test from CERT_FormatNameUnitTest [ RUN ] CERT_FormatNameUnitTest.Overflow [ OK ] CERT_FormatNameUnitTest.Overflow (0 ms) [----------] 1 test from CERT_FormatNameUnitTest (0 ms total) [----------] Global test environment tear-down [==========] 1 test from 1 test suite ran. (0 ms total) [ PASSED ] 1 test. gtests.sh: #4: certhigh_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/certhigh_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: certdb_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/certdb_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/certdb_gtest -n dummy -s CN=dummy -t ,, -x -m 3 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #5: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/certdb_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing certdb_gtest [==========] Running 21 tests from 5 test suites. [----------] Global test environment set-up. [----------] 2 tests from Alg1485Test [ RUN ] Alg1485Test.ShortOIDTest [ OK ] Alg1485Test.ShortOIDTest (0 ms) [ RUN ] Alg1485Test.BrokenOIDTest [ OK ] Alg1485Test.BrokenOIDTest (0 ms) [----------] 2 tests from Alg1485Test (0 ms total) [----------] 2 tests from CertTest [ RUN ] CertTest.GetCertDer [ OK ] CertTest.GetCertDer (1 ms) [ RUN ] CertTest.GetCertDerBad [ OK ] CertTest.GetCertDerBad (1 ms) [----------] 2 tests from CertTest (2 ms total) [----------] 1 test from DecodeCertsTest [ RUN ] DecodeCertsTest.EmptyCertPackage [ OK ] DecodeCertsTest.EmptyCertPackage (0 ms) [----------] 1 test from DecodeCertsTest (0 ms total) [----------] 11 tests from ParseAVAStrings/Alg1485ParseTest [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/0 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/0 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/1 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/1 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/2 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/2 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/3 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/3 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/4 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/4 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/5 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/5 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/6 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/6 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/7 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/7 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/8 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/8 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/9 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/9 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/10 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/10 (0 ms) [----------] 11 tests from ParseAVAStrings/Alg1485ParseTest (0 ms total) [----------] 5 tests from CompareAVAStrings/Alg1485CompareTest [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/0 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/0 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/1 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/1 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/2 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/2 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/3 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/3 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/4 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/4 (0 ms) [----------] 5 tests from CompareAVAStrings/Alg1485CompareTest (0 ms total) [----------] Global test environment tear-down [==========] 21 tests from 5 test suites ran. (2 ms total) [ PASSED ] 21 tests. gtests.sh: #6: certdb_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/certdb_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: der_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/der_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/der_gtest -n dummy -s CN=dummy -t ,, -x -m 4 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #7: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/der_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing der_gtest [==========] Running 20 tests from 3 test suites. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (1 ms total) [----------] 1 test from PK12ImportTest [ RUN ] PK12ImportTest.ImportPK12With2P7 [ OK ] PK12ImportTest.ImportPK12With2P7 (3 ms) [----------] 1 test from PK12ImportTest (3 ms total) [----------] 6 tests from QuickderTestsInvalidLengths/QuickDERTest [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/0 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/0 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/1 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/1 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/2 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/2 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/3 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/3 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/4 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/4 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/5 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/5 (0 ms) [----------] 6 tests from QuickderTestsInvalidLengths/QuickDERTest (0 ms total) [----------] Global test environment tear-down [==========] 20 tests from 3 test suites ran. (4 ms total) [ PASSED ] 20 tests. gtests.sh: #8: der_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/der_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: pk11_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/pk11_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/pk11_gtest -n dummy -s CN=dummy -t ,, -x -m 5 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #9: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/pk11_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing pk11_gtest [==========] Running 13692 tests from 89 test suites. [----------] Global test environment set-up. [----------] 3 tests from Pkcs11AesCmacTest [ RUN ] Pkcs11AesCmacTest.Aes128NistExample1 [ OK ] Pkcs11AesCmacTest.Aes128NistExample1 (0 ms) [ RUN ] Pkcs11AesCmacTest.General [ OK ] Pkcs11AesCmacTest.General (0 ms) [ RUN ] Pkcs11AesCmacTest.InvalidKeySize [ OK ] Pkcs11AesCmacTest.InvalidKeySize (1 ms) [----------] 3 tests from Pkcs11AesCmacTest (1 ms total) [----------] 11 tests from Pkcs11AesGcmTest [ RUN ] Pkcs11AesGcmTest.ZeroLengthIV [ OK ] Pkcs11AesGcmTest.ZeroLengthIV (0 ms) [ RUN ] Pkcs11AesGcmTest.AllZeroIV [ OK ] Pkcs11AesGcmTest.AllZeroIV (0 ms) [ RUN ] Pkcs11AesGcmTest.TwelveByteZeroIV [ OK ] Pkcs11AesGcmTest.TwelveByteZeroIV (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceBasic [ OK ] Pkcs11AesGcmTest.MessageInterfaceBasic (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceSeparateTags [ OK ] Pkcs11AesGcmTest.MessageInterfaceSeparateTags (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceIVMask [ OK ] Pkcs11AesGcmTest.MessageInterfaceIVMask (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceXorCounter [ OK ] Pkcs11AesGcmTest.MessageInterfaceXorCounter (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceCounterOverflow [ OK ] Pkcs11AesGcmTest.MessageInterfaceCounterOverflow (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceXorCounterOverflow [ OK ] Pkcs11AesGcmTest.MessageInterfaceXorCounterOverflow (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceRandomIV [ OK ] Pkcs11AesGcmTest.MessageInterfaceRandomIV (1 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceRandomOverflow [ OK ] Pkcs11AesGcmTest.MessageInterfaceRandomOverflow (0 ms) [----------] 11 tests from Pkcs11AesGcmTest (1 ms total) [----------] 10 tests from Pkcs11AESKeyWrapPadTest [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapECKey [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapECKey (2 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRsaKey [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRsaKey (17 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_EvenBlock [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_EvenBlock (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock1 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock1 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock2 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock2 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_PaddingTooLong [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_PaddingTooLong (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_NoPadding [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_NoPadding (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding1 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding1 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding2 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding2 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_ShortValidPadding [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_ShortValidPadding (0 ms) [----------] 10 tests from Pkcs11AESKeyWrapPadTest (19 ms total) [----------] 1 test from Pkcs11CbcPadTest [ RUN ] Pkcs11CbcPadTest.FailEncryptShortParam [ OK ] Pkcs11CbcPadTest.FailEncryptShortParam (0 ms) [----------] 1 test from Pkcs11CbcPadTest (0 ms total) [----------] 6 tests from Pkcs11ChaCha20Poly1305Test [ RUN ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt [ OK ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.Xor [ OK ] Pkcs11ChaCha20Poly1305Test.Xor (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.GenerateXor [ OK ] Pkcs11ChaCha20Poly1305Test.GenerateXor (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.XorInvalidParams [ OK ] Pkcs11ChaCha20Poly1305Test.XorInvalidParams (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.ChaCha201305MessageInterfaceBasic [ OK ] Pkcs11ChaCha20Poly1305Test.ChaCha201305MessageInterfaceBasic (1 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.ChaCha20Poly1305MessageInterfaceSeparateTags [ OK ] Pkcs11ChaCha20Poly1305Test.ChaCha20Poly1305MessageInterfaceSeparateTags (0 ms) [----------] 6 tests from Pkcs11ChaCha20Poly1305Test (1 ms total) [----------] 2 tests from Pkcs11CipherOp [ RUN ] Pkcs11CipherOp.SingleCtxMultipleUnalignedCipherOps [ OK ] Pkcs11CipherOp.SingleCtxMultipleUnalignedCipherOps (0 ms) [ RUN ] Pkcs11CipherOp.SingleCtxMultipleUnalignedCipherOpsChaCha20 [ OK ] Pkcs11CipherOp.SingleCtxMultipleUnalignedCipherOpsChaCha20 (0 ms) [----------] 2 tests from Pkcs11CipherOp (0 ms total) [----------] 4 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (2 ms) [ RUN ] DERPrivateKeyImportTest.ImportEcdsaKey [ OK ] DERPrivateKeyImportTest.ImportEcdsaKey (1 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 4 tests from DERPrivateKeyImportTest (3 ms total) [----------] 4 tests from Pkcs11DesTest [ RUN ] Pkcs11DesTest.ZeroLengthIV [ OK ] Pkcs11DesTest.ZeroLengthIV (0 ms) [ RUN ] Pkcs11DesTest.IVTooShort [ OK ] Pkcs11DesTest.IVTooShort (0 ms) [ RUN ] Pkcs11DesTest.WrongLengthIV [ OK ] Pkcs11DesTest.WrongLengthIV (0 ms) [ RUN ] Pkcs11DesTest.AllGood [ OK ] Pkcs11DesTest.AllGood (0 ms) [----------] 4 tests from Pkcs11DesTest (0 ms total) [----------] 10 tests from Pkcs11EcdsaSha256Test [ RUN ] Pkcs11EcdsaSha256Test.ImportNoCurveOIDOrAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportNoCurveOIDOrAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportOnlyAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportOnlyAlgorithmParams (1 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportMatchingCurveOIDAndAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportMatchingCurveOIDAndAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportDissimilarCurveOIDAndAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportDissimilarCurveOIDAndAlgorithmParams (1 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportNoAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportNoAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportInvalidAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportInvalidAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportPointNotOnCurve [ OK ] Pkcs11EcdsaSha256Test.ImportPointNotOnCurve (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportNoPublicKey [ OK ] Pkcs11EcdsaSha256Test.ImportNoPublicKey (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportSpkiNoAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportSpkiNoAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportSpkiPointNotOnCurve [ OK ] Pkcs11EcdsaSha256Test.ImportSpkiPointNotOnCurve (0 ms) [----------] 10 tests from Pkcs11EcdsaSha256Test (2 ms total) [----------] 1 test from PK11FindCertsTestBase [ RUN ] PK11FindCertsTestBase.CertAddListWithData [ OK ] PK11FindCertsTestBase.CertAddListWithData (2 ms) [----------] 1 test from PK11FindCertsTestBase (3 ms total) [----------] 6 tests from PK11FindRawCertsBySubjectTest [ RUN ] PK11FindRawCertsBySubjectTest.TestNoCertsImportedNoCertsFound [ OK ] PK11FindRawCertsBySubjectTest.TestNoCertsImportedNoCertsFound (1 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestOneCertImportedNoCertsFound [ OK ] PK11FindRawCertsBySubjectTest.TestOneCertImportedNoCertsFound (3 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestMultipleMatchingCertsFound [ OK ] PK11FindRawCertsBySubjectTest.TestMultipleMatchingCertsFound (4 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestNoCertsOnInternalSlots [ OK ] PK11FindRawCertsBySubjectTest.TestNoCertsOnInternalSlots (3 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestFindEmptySubject [ OK ] PK11FindRawCertsBySubjectTest.TestFindEmptySubject (2 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestSearchForNullSubject [ OK ] PK11FindRawCertsBySubjectTest.TestSearchForNullSubject (3 ms) [----------] 6 tests from PK11FindRawCertsBySubjectTest (16 ms total) [----------] 4 tests from PK11GetCertsMatchingPrivateKeyTest [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsAtAll [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsAtAll (1 ms) [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsForKey [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsForKey (3 ms) [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestOneCertForKey [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestOneCertForKey (4 ms) [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestTwoCertsForKey [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestTwoCertsForKey (5 ms) [----------] 4 tests from PK11GetCertsMatchingPrivateKeyTest (13 ms total) [----------] 1 test from PK11FindEncodedCertInSlotTest [ RUN ] PK11FindEncodedCertInSlotTest.TestFindEncodedCert [ OK ] PK11FindEncodedCertInSlotTest.TestFindEncodedCert (3 ms) [----------] 1 test from PK11FindEncodedCertInSlotTest (3 ms total) [----------] 3 tests from ModeParameterizedTest [ RUN ] ModeParameterizedTest.BadEncapsulatedPubKey [ OK ] ModeParameterizedTest.BadEncapsulatedPubKey (0 ms) [ RUN ] ModeParameterizedTest.InvalidContextParams [ OK ] ModeParameterizedTest.InvalidContextParams (0 ms) [ RUN ] ModeParameterizedTest.InvalidReceiverKeyType [ OK ] ModeParameterizedTest.InvalidReceiverKeyType (25 ms) [----------] 3 tests from ModeParameterizedTest (25 ms total) [----------] 1 test from Pkcs11KbkdfTest [ RUN ] Pkcs11KbkdfTest.TestAdditionalKey [ OK ] Pkcs11KbkdfTest.TestAdditionalKey (0 ms) [----------] 1 test from Pkcs11KbkdfTest (0 ms total) [----------] 1 test from Pkcs11DhNullKeyTest [ RUN ] Pkcs11DhNullKeyTest.UseNullPublicValue Generate DH pair [ OK ] Pkcs11DhNullKeyTest.UseNullPublicValue (275 ms) [----------] 1 test from Pkcs11DhNullKeyTest (275 ms total) [----------] 3 tests from Pkcs11ModuleTest [ RUN ] Pkcs11ModuleTest.LoadUnload [ OK ] Pkcs11ModuleTest.LoadUnload (1 ms) [ RUN ] Pkcs11ModuleTest.ListSlots loaded slot: NSS User Private Key and Certificate Services loaded slot: NSS Internal Cryptographic Services loaded slot: Test PKCS11 Public Certs Slot loaded slot: Test PKCS11 Slot 二 [ OK ] Pkcs11ModuleTest.ListSlots (0 ms) [ RUN ] Pkcs11ModuleTest.PublicCertificatesToken [ OK ] Pkcs11ModuleTest.PublicCertificatesToken (0 ms) [----------] 3 tests from Pkcs11ModuleTest (1 ms total) [----------] 3 tests from Pkcs11Pbkdf2Test [ RUN ] Pkcs11Pbkdf2Test.DeriveKnown1 [ OK ] Pkcs11Pbkdf2Test.DeriveKnown1 (28 ms) [ RUN ] Pkcs11Pbkdf2Test.DeriveKnown2 [ OK ] Pkcs11Pbkdf2Test.DeriveKnown2 (53 ms) [ RUN ] Pkcs11Pbkdf2Test.KeyLenSizes [ OK ] Pkcs11Pbkdf2Test.KeyLenSizes (1 ms) [----------] 3 tests from Pkcs11Pbkdf2Test (82 ms total) [----------] 5 tests from TlsPrfTest [ RUN ] TlsPrfTest.ExtendedMsParamErr [ OK ] TlsPrfTest.ExtendedMsParamErr (0 ms) [ RUN ] TlsPrfTest.ExtendedMsDhTlsPrf [ OK ] TlsPrfTest.ExtendedMsDhTlsPrf (0 ms) [ RUN ] TlsPrfTest.ExtendedMsRsaTlsPrf [ OK ] TlsPrfTest.ExtendedMsRsaTlsPrf (0 ms) [ RUN ] TlsPrfTest.ExtendedMsDhSha256 [ OK ] TlsPrfTest.ExtendedMsDhSha256 (0 ms) [ RUN ] TlsPrfTest.ExtendedMsRsaSha256 [ OK ] TlsPrfTest.ExtendedMsRsaSha256 (0 ms) [----------] 5 tests from TlsPrfTest (0 ms total) [----------] 1 test from RsaEncryptTest [ RUN ] RsaEncryptTest.MessageLengths [ OK ] RsaEncryptTest.MessageLengths (0 ms) [----------] 1 test from RsaEncryptTest (0 ms total) [----------] 1 test from Pkcs11RsaOaepTest [ RUN ] Pkcs11RsaOaepTest.TestOaepWrapUnwrap [ OK ] Pkcs11RsaOaepTest.TestOaepWrapUnwrap (58 ms) [----------] 1 test from Pkcs11RsaOaepTest (58 ms total) [----------] 2 tests from RsaPkcs1Test [ RUN ] RsaPkcs1Test.Pkcs1MinimumPadding [ OK ] RsaPkcs1Test.Pkcs1MinimumPadding (27 ms) [ RUN ] RsaPkcs1Test.RequireNullParameter [ OK ] RsaPkcs1Test.RequireNullParameter (0 ms) [----------] 2 tests from RsaPkcs1Test (27 ms total) [----------] 2 tests from Pkcs11RsaPssTest [ RUN ] Pkcs11RsaPssTest.GenerateAndSignAndVerify [ OK ] Pkcs11RsaPssTest.GenerateAndSignAndVerify (23 ms) [ RUN ] Pkcs11RsaPssTest.NoLeakWithInvalidExponent [ OK ] Pkcs11RsaPssTest.NoLeakWithInvalidExponent (0 ms) [----------] 2 tests from Pkcs11RsaPssTest (23 ms total) [----------] 4 tests from Pkcs11SeedTest [ RUN ] Pkcs11SeedTest.CBC_ValidArgs [ OK ] Pkcs11SeedTest.CBC_ValidArgs (0 ms) [ RUN ] Pkcs11SeedTest.CBC_InvalidArgs [ OK ] Pkcs11SeedTest.CBC_InvalidArgs (0 ms) [ RUN ] Pkcs11SeedTest.ECB_Singleblock [ OK ] Pkcs11SeedTest.ECB_Singleblock (0 ms) [ RUN ] Pkcs11SeedTest.ECB_Multiblock [ OK ] Pkcs11SeedTest.ECB_Multiblock (0 ms) [----------] 4 tests from Pkcs11SeedTest (0 ms total) [----------] 308 tests from WycheproofTestVector/Pkcs11AesCmacTest [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/98 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/182 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/183 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/184 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/185 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/186 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/187 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/188 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/189 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/190 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/191 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/192 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/193 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/194 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/195 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/196 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/197 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/198 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/199 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/200 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/201 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/202 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/203 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/204 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/205 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/206 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/207 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/208 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/209 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/210 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/211 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/212 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/213 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/214 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/215 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/216 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/217 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/218 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/219 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/220 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/221 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/222 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/223 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/224 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/225 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/226 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/227 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/228 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/229 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/230 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/231 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/232 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/233 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/234 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/235 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/236 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/237 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/238 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/239 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/240 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/241 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/242 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/243 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/244 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/245 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/246 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/247 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/248 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/249 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/250 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/251 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/252 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/253 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/254 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/255 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/256 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/256 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/257 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/257 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/258 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/258 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/259 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/259 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/260 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/260 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/261 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/261 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/262 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/262 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/263 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/263 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/264 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/264 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/265 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/265 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/266 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/266 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/267 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/267 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/268 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/268 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/269 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/269 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/270 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/270 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/271 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/271 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/272 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/272 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/273 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/273 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/274 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/274 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/275 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/275 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/276 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/276 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/277 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/277 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/278 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/278 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/279 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/279 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/280 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/280 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/281 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/281 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/282 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/282 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/283 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/283 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/284 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/284 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/285 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/285 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/286 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/286 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/287 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/287 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/288 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/288 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/289 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/289 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/290 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/290 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/291 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/291 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/292 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/292 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/293 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/293 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/294 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/294 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/295 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/295 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/296 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/296 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/297 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/297 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/298 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/298 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/299 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/299 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/300 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/300 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/301 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/301 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/302 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/302 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/303 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/303 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/304 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/304 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/305 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/305 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/306 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/306 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/307 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/307 (0 ms) [----------] 308 tests from WycheproofTestVector/Pkcs11AesCmacTest (4 ms total) [----------] 19 tests from NISTTestVector/Pkcs11AesGcmTest [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/0 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/0 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/1 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/1 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/2 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/2 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/3 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/3 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/4 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/4 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/5 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/5 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/6 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/6 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/7 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/7 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/8 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/8 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/9 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/9 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/10 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/10 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/11 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/11 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/12 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/12 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/13 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/13 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/14 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/14 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/15 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/15 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/16 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/16 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/17 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/17 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/18 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/18 (0 ms) [----------] 19 tests from NISTTestVector/Pkcs11AesGcmTest (0 ms total) [----------] 256 tests from WycheproofTestVector/Pkcs11AesGcmTest [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/7 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/61 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/112 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/182 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/183 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/184 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/185 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/186 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/187 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/188 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/189 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/190 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/191 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/192 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/193 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/194 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/195 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/196 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/197 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/198 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/199 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/200 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/201 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/202 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/203 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/204 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/205 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/206 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/207 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/208 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/209 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/210 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/211 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/212 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/213 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/214 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/215 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/216 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/217 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/218 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/219 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/220 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/221 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/222 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/223 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/224 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/225 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/226 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/227 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/228 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/229 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/230 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/231 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/232 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/233 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/234 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/235 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/236 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/237 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/238 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/239 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/240 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/241 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/242 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/243 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/244 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/245 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/246 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/247 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/248 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/249 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/250 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/251 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/252 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/253 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/254 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/255 (0 ms) [----------] 256 tests from WycheproofTestVector/Pkcs11AesGcmTest (5 ms total) [----------] 163 tests from Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/0 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/0 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/1 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/1 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/2 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/2 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/3 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/3 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/4 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/4 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/5 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/5 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/6 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/6 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/7 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/7 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/8 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/8 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/9 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/9 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/10 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/10 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/11 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/11 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/12 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/12 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/13 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/13 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/14 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/14 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/15 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/15 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/16 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/16 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/17 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/17 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/18 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/18 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/19 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/19 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/20 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/20 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/21 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/21 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/22 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/22 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/23 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/23 (1 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/24 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/24 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/25 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/25 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/26 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/26 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/27 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/27 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/28 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/28 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/29 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/29 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/30 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/30 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/31 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/31 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/32 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/32 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/33 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/33 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/34 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/34 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/35 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/35 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/36 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/36 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/37 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/37 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/38 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/38 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/39 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/39 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/40 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/40 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/41 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/41 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/42 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/42 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/43 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/43 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/44 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/44 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/45 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/45 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/46 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/46 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/47 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/47 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/48 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/48 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/49 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/49 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/50 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/50 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/51 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/51 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/52 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/52 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/53 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/53 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/54 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/54 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/55 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/55 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/56 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/56 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/57 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/57 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/58 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/58 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/59 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/59 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/60 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/60 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/61 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/61 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/62 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/62 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/63 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/63 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/64 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/64 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/65 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/65 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/66 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/66 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/67 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/67 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/68 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/68 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/69 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/69 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/70 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/70 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/71 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/71 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/72 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/72 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/73 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/73 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/74 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/74 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/75 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/75 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/76 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/76 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/77 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/77 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/78 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/78 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/79 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/79 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/80 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/80 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/81 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/81 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/82 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/82 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/83 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/83 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/84 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/84 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/85 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/85 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/86 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/86 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/87 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/87 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/88 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/88 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/89 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/89 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/90 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/90 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/91 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/91 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/92 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/92 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/93 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/93 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/94 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/94 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/95 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/95 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/96 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/96 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/97 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/97 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/98 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/98 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/99 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/99 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/100 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/100 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/101 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/101 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/102 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/102 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/103 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/103 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/104 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/104 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/105 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/105 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/106 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/106 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/107 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/107 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/108 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/108 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/109 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/109 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/110 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/110 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/111 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/111 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/112 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/112 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/113 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/113 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/114 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/114 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/115 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/115 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/116 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/116 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/117 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/117 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/118 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/118 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/119 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/119 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/120 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/120 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/121 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/121 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/122 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/122 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/123 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/123 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/124 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/124 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/125 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/125 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/126 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/126 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/127 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/127 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/128 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/128 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/129 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/129 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/130 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/130 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/131 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/131 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/132 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/132 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/133 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/133 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/134 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/134 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/135 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/135 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/136 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/136 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/137 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/137 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/138 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/138 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/139 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/139 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/140 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/140 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/141 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/141 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/142 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/142 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/143 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/143 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/144 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/144 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/145 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/145 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/146 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/146 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/147 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/147 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/148 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/148 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/149 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/149 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/150 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/150 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/151 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/151 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/152 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/152 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/153 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/153 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/154 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/154 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/155 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/155 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/156 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/156 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/157 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/157 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/158 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/158 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/159 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/159 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/160 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/160 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/161 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/161 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/162 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/162 (0 ms) [----------] 163 tests from Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest (2 ms total) [----------] 1500 tests from Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/0 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/0 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/2 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/2 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/3 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/3 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/4 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/4 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/5 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/5 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/6 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/6 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/7 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/7 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/8 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/8 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/9 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/9 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/10 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/10 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/11 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/11 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/12 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/12 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/13 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/13 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/14 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/14 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/15 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/15 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/16 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/16 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/17 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/17 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/18 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/18 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/19 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/19 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/20 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/20 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/21 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/21 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/22 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/22 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/23 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/23 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/24 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/24 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/25 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/25 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/26 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/26 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/27 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/27 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/28 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/28 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/29 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/29 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/30 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/30 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/31 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/31 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/32 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/32 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/33 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/33 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/34 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/34 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/35 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/35 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/36 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/36 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/37 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/37 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/38 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/38 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/39 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/39 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/40 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/40 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/41 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/41 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/42 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/42 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/43 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/43 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/44 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/44 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/45 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/45 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/46 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/46 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/47 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/47 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/48 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/48 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/49 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/49 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/50 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/50 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/51 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/51 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/52 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/52 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/53 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/53 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/54 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/54 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/55 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/55 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/56 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/56 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/57 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/57 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/58 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/58 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/59 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/59 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/60 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/60 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/61 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/61 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/62 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/62 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/63 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/63 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/64 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/64 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/65 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/65 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/66 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/66 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/67 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/67 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/68 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/68 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/69 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/69 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/70 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/70 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/71 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/71 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/72 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/72 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/73 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/73 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/74 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/74 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/75 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/75 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/76 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/76 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/77 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/77 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/78 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/78 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/79 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/79 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/80 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/80 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/81 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/81 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/82 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/82 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/83 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/83 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/84 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/84 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/85 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/85 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/86 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/86 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/87 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/87 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/88 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/88 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/89 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/89 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/90 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/90 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/91 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/91 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/92 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/92 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/93 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/93 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/94 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/94 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/95 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/95 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/96 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/96 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/97 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/97 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/98 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/98 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/99 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/99 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/100 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/100 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/101 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/101 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/102 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/102 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/103 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/103 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/104 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/104 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/105 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/105 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/106 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/106 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/107 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/107 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/108 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/108 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/109 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/109 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/110 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/110 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/111 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/111 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/112 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/112 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/113 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/113 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/114 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/114 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/115 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/115 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/116 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/116 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/117 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/117 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/118 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/118 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/119 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/119 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/120 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/120 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/121 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/121 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/122 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/122 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/123 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/123 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/124 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/124 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/125 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/125 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/126 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/126 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/127 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/127 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/128 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/128 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/129 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/129 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/130 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/130 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/131 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/131 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/132 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/132 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/133 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/133 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/134 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/134 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/135 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/135 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/136 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/136 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/137 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/137 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/138 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/138 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/139 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/139 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/140 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/140 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/141 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/141 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/142 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/142 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/143 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/143 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/144 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/144 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/145 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/145 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/146 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/146 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/147 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/147 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/148 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/148 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/149 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/149 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/150 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/150 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/151 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/151 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/152 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/152 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/153 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/153 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/154 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/154 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/155 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/155 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/156 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/156 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/157 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/157 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/158 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/158 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/159 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/159 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/160 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/160 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/161 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/161 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/162 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/162 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/163 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/163 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/164 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/164 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/165 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/165 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/166 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/166 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/167 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/167 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/168 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/168 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/169 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/169 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/170 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/170 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/171 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/171 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/172 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/172 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/173 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/173 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/174 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/174 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/175 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/175 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/176 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/176 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/177 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/177 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/178 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/178 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/179 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/179 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/180 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/180 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/181 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/181 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/182 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/182 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/183 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/183 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/184 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/184 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/185 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/185 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/186 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/186 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/187 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/187 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/188 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/188 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/189 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/189 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/190 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/190 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/191 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/191 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/192 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/192 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/193 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/193 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/194 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/194 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/195 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/195 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/196 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/196 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/197 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/197 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/198 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/198 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/199 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/199 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/200 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/200 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/201 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/201 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/202 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/202 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/203 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/203 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/204 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/204 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/205 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/205 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/206 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/206 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/207 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/207 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/208 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/208 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/209 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/209 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/210 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/210 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/211 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/211 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/212 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/212 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/213 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/213 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/214 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/214 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/215 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/215 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/216 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/216 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/217 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/217 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/218 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/218 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/219 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/219 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/220 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/220 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/221 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/221 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/222 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/222 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/223 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/223 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/224 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/224 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/225 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/225 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/226 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/226 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/227 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/227 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/228 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/228 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/229 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/229 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/230 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/230 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/231 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/231 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/232 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/232 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/233 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/233 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/234 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/234 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/235 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/235 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/236 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/236 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/237 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/237 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/238 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/238 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/239 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/239 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/240 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/240 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/241 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/241 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/242 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/242 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/243 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/243 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/244 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/244 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/245 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/245 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/246 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/246 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/247 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/247 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/248 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/248 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/249 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/249 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/250 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/250 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/251 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/251 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/252 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/252 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/253 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/253 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/254 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/254 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/255 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/255 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/256 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/256 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/257 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/257 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/258 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/258 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/259 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/259 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/260 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/260 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/261 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/261 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/262 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/262 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/263 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/263 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/264 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/264 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/265 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/265 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/266 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/266 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/267 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/267 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/268 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/268 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/269 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/269 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/270 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/270 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/271 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/271 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/272 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/272 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/273 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/273 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/274 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/274 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/275 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/275 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/276 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/276 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/277 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/277 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/278 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/278 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/279 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/279 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/280 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/280 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/281 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/281 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/282 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/282 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/283 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/283 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/284 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/284 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/285 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/285 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/286 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/286 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/287 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/287 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/288 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/288 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/289 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/289 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/290 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/290 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/291 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/291 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/292 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/292 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/293 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/293 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/294 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/294 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/295 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/295 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/296 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/296 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/297 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/297 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/298 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/298 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/299 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/299 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/300 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/300 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/301 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/301 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/302 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/302 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/303 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/303 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/304 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/304 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/305 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/305 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/306 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/306 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/307 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/307 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/308 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/308 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/309 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/309 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/310 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/310 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/311 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/311 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/312 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/312 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/313 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/313 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/314 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/314 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/315 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/315 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/316 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/316 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/317 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/317 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/318 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/318 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/319 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/319 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/320 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/320 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/321 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/321 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/322 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/322 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/323 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/323 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/324 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/324 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/325 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/325 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/326 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/326 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/327 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/327 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/328 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/328 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/329 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/329 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/330 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/330 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/331 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/331 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/332 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/332 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/333 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/333 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/334 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/334 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/335 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/335 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/336 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/336 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/337 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/337 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/338 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/338 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/339 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/339 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/340 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/340 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/341 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/341 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/342 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/342 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/343 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/343 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/344 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/344 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/345 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/345 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/346 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/346 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/347 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/347 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/348 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/348 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/349 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/349 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/350 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/350 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/351 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/351 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/352 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/352 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/353 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/353 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/354 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/354 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/355 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/355 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/356 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/356 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/357 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/357 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/358 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/358 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/359 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/359 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/360 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/360 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/361 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/361 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/362 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/362 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/363 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/363 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/364 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/364 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/365 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/365 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/366 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/366 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/367 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/367 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/368 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/368 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/369 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/369 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/370 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/370 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/371 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/371 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/372 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/372 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/373 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/373 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/374 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/374 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/375 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/375 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/376 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/376 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/377 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/377 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/378 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/378 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/379 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/379 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/380 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/380 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/381 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/381 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/382 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/382 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/383 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/383 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/384 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/384 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/385 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/385 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/386 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/386 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/387 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/387 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/388 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/388 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/389 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/389 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/390 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/390 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/391 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/391 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/392 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/392 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/393 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/393 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/394 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/394 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/395 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/395 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/396 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/396 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/397 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/397 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/398 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/398 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/399 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/399 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/400 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/400 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/401 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/401 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/402 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/402 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/403 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/403 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/404 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/404 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/405 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/405 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/406 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/406 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/407 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/407 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/408 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/408 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/409 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/409 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/410 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/410 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/411 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/411 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/412 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/412 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/413 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/413 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/414 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/414 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/415 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/415 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/416 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/416 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/417 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/417 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/418 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/418 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/419 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/419 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/420 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/420 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/421 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/421 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/422 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/422 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/423 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/423 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/424 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/424 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/425 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/425 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/426 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/426 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/427 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/427 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/428 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/428 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/429 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/429 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/430 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/430 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/431 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/431 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/432 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/432 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/433 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/433 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/434 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/434 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/435 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/435 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/436 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/436 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/437 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/437 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/438 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/438 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/439 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/439 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/440 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/440 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/441 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/441 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/442 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/442 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/443 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/443 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/444 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/444 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/445 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/445 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/446 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/446 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/447 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/447 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/448 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/448 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/449 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/449 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/450 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/450 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/451 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/451 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/452 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/452 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/453 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/453 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/454 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/454 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/455 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/455 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/456 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/456 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/457 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/457 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/458 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/458 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/459 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/459 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/460 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/460 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/461 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/461 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/462 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/462 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/463 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/463 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/464 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/464 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/465 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/465 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/466 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/466 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/467 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/467 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/468 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/468 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/469 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/469 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/470 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/470 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/471 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/471 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/472 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/472 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/473 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/473 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/474 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/474 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/475 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/475 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/476 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/476 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/477 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/477 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/478 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/478 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/479 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/479 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/480 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/480 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/481 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/481 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/482 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/482 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/483 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/483 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/484 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/484 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/485 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/485 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/486 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/486 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/487 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/487 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/488 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/488 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/489 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/489 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/490 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/490 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/491 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/491 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/492 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/492 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/493 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/493 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/494 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/494 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/495 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/495 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/496 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/496 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/497 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/497 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/498 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/498 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/499 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/499 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/500 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/500 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/501 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/501 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/502 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/502 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/503 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/503 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/504 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/504 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/505 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/505 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/506 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/506 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/507 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/507 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/508 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/508 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/509 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/509 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/510 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/510 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/511 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/511 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/512 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/512 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/513 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/513 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/514 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/514 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/515 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/515 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/516 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/516 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/517 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/517 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/518 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/518 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/519 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/519 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/520 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/520 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/521 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/521 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/522 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/522 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/523 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/523 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/524 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/524 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/525 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/525 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/526 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/526 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/527 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/527 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/528 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/528 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/529 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/529 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/530 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/530 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/531 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/531 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/532 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/532 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/533 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/533 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/534 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/534 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/535 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/535 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/536 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/536 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/537 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/537 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/538 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/538 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/539 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/539 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/540 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/540 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/541 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/541 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/542 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/542 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/543 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/543 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/544 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/544 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/545 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/545 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/546 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/546 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/547 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/547 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/548 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/548 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/549 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/549 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/550 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/550 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/551 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/551 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/552 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/552 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/553 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/553 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/554 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/554 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/555 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/555 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/556 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/556 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/557 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/557 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/558 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/558 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/559 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/559 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/560 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/560 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/561 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/561 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/562 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/562 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/563 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/563 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/564 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/564 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/565 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/565 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/566 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/566 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/567 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/567 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/568 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/568 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/569 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/569 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/570 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/570 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/571 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/571 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/572 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/572 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/573 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/573 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/574 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/574 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/575 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/575 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/576 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/576 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/577 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/577 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/578 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/578 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/579 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/579 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/580 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/580 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/581 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/581 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/582 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/582 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/583 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/583 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/584 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/584 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/585 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/585 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/586 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/586 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/587 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/587 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/588 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/588 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/589 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/589 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/590 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/590 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/591 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/591 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/592 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/592 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/593 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/593 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/594 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/594 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/595 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/595 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/596 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/596 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/597 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/597 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/598 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/598 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/599 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/599 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/600 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/600 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/601 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/601 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/602 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/602 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/603 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/603 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/604 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/604 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/605 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/605 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/606 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/606 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/607 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/607 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/608 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/608 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/609 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/609 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/610 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/610 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/611 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/611 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/612 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/612 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/613 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/613 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/614 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/614 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/615 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/615 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/616 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/616 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/617 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/617 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/618 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/618 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/619 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/619 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/620 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/620 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/621 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/621 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/622 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/622 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/623 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/623 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/624 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/624 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/625 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/625 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/626 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/626 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/627 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/627 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/628 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/628 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/629 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/629 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/630 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/630 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/631 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/631 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/632 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/632 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/633 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/633 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/634 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/634 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/635 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/635 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/636 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/636 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/637 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/637 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/638 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/638 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/639 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/639 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/640 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/640 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/641 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/641 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/642 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/642 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/643 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/643 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/644 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/644 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/645 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/645 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/646 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/646 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/647 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/647 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/648 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/648 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/649 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/649 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/650 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/650 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/651 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/651 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/652 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/652 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/653 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/653 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/654 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/654 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/655 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/655 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/656 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/656 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/657 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/657 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/658 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/658 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/659 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/659 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/660 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/660 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/661 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/661 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/662 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/662 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/663 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/663 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/664 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/664 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/665 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/665 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/666 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/666 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/667 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/667 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/668 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/668 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/669 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/669 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/670 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/670 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/671 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/671 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/672 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/672 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/673 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/673 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/674 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/674 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/675 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/675 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/676 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/676 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/677 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/677 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/678 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/678 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/679 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/679 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/680 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/680 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/681 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/681 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/682 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/682 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/683 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/683 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/684 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/684 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/685 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/685 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/686 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/686 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/687 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/687 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/688 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/688 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/689 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/689 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/690 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/690 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/691 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/691 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/692 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/692 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/693 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/693 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/694 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/694 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/695 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/695 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/696 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/696 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/697 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/697 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/698 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/698 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/699 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/699 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/700 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/700 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/701 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/701 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/702 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/702 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/703 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/703 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/704 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/704 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/705 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/705 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/706 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/706 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/707 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/707 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/708 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/708 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/709 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/709 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/710 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/710 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/711 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/711 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/712 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/712 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/713 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/713 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/714 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/714 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/715 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/715 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/716 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/716 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/717 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/717 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/718 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/718 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/719 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/719 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/720 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/720 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/721 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/721 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/722 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/722 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/723 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/723 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/724 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/724 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/725 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/725 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/726 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/726 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/727 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/727 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/728 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/728 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/729 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/729 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/730 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/730 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/731 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/731 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/732 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/732 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/733 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/733 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/734 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/734 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/735 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/735 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/736 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/736 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/737 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/737 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/738 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/738 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/739 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/739 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/740 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/740 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/741 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/741 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/742 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/742 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/743 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/743 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/744 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/744 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/745 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/745 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/746 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/746 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/747 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/747 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/748 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/748 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/749 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/749 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/750 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/750 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/751 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/751 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/752 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/752 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/753 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/753 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/754 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/754 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/755 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/755 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/756 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/756 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/757 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/757 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/758 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/758 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/759 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/759 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/760 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/760 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/761 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/761 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/762 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/762 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/763 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/763 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/764 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/764 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/765 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/765 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/766 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/766 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/767 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/767 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/768 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/768 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/769 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/769 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/770 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/770 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/771 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/771 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/772 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/772 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/773 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/773 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/774 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/774 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/775 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/775 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/776 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/776 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/777 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/777 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/778 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/778 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/779 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/779 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/780 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/780 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/781 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/781 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/782 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/782 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/783 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/783 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/784 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/784 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/785 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/785 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/786 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/786 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/787 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/787 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/788 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/788 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/789 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/789 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/790 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/790 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/791 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/791 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/792 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/792 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/793 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/793 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/794 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/794 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/795 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/795 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/796 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/796 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/797 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/797 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/798 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/798 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/799 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/799 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/800 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/800 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/801 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/801 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/802 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/802 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/803 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/803 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/804 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/804 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/805 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/805 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/806 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/806 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/807 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/807 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/808 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/808 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/809 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/809 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/810 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/810 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/811 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/811 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/812 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/812 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/813 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/813 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/814 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/814 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/815 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/815 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/816 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/816 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/817 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/817 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/818 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/818 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/819 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/819 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/820 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/820 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/821 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/821 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/822 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/822 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/823 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/823 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/824 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/824 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/825 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/825 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/826 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/826 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/827 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/827 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/828 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/828 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/829 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/829 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/830 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/830 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/831 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/831 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/832 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/832 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/833 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/833 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/834 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/834 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/835 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/835 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/836 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/836 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/837 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/837 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/838 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/838 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/839 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/839 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/840 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/840 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/841 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/841 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/842 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/842 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/843 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/843 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/844 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/844 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/845 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/845 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/846 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/846 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/847 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/847 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/848 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/848 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/849 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/849 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/850 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/850 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/851 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/851 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/852 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/852 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/853 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/853 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/854 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/854 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/855 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/855 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/856 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/856 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/857 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/857 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/858 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/858 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/859 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/859 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/860 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/860 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/861 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/861 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/862 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/862 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/863 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/863 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/864 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/864 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/865 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/865 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/866 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/866 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/867 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/867 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/868 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/868 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/869 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/869 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/870 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/870 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/871 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/871 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/872 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/872 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/873 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/873 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/874 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/874 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/875 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/875 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/876 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/876 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/877 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/877 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/878 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/878 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/879 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/879 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/880 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/880 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/881 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/881 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/882 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/882 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/883 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/883 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/884 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/884 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/885 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/885 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/886 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/886 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/887 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/887 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/888 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/888 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/889 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/889 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/890 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/890 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/891 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/891 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/892 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/892 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/893 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/893 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/894 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/894 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/895 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/895 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/896 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/896 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/897 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/897 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/898 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/898 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/899 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/899 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/900 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/900 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/901 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/901 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/902 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/902 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/903 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/903 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/904 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/904 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/905 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/905 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/906 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/906 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/907 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/907 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/908 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/908 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/909 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/909 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/910 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/910 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/911 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/911 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/912 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/912 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/913 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/913 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/914 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/914 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/915 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/915 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/916 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/916 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/917 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/917 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/918 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/918 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/919 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/919 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/920 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/920 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/921 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/921 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/922 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/922 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/923 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/923 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/924 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/924 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/925 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/925 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/926 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/926 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/927 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/927 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/928 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/928 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/929 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/929 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/930 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/930 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/931 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/931 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/932 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/932 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/933 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/933 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/934 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/934 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/935 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/935 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/936 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/936 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/937 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/937 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/938 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/938 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/939 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/939 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/940 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/940 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/941 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/941 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/942 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/942 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/943 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/943 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/944 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/944 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/945 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/945 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/946 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/946 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/947 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/947 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/948 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/948 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/949 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/949 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/950 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/950 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/951 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/951 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/952 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/952 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/953 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/953 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/954 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/954 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/955 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/955 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/956 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/956 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/957 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/957 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/958 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/958 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/959 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/959 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/960 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/960 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/961 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/961 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/962 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/962 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/963 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/963 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/964 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/964 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/965 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/965 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/966 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/966 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/967 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/967 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/968 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/968 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/969 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/969 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/970 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/970 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/971 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/971 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/972 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/972 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/973 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/973 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/974 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/974 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/975 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/975 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/976 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/976 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/977 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/977 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/978 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/978 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/979 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/979 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/980 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/980 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/981 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/981 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/982 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/982 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/983 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/983 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/984 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/984 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/985 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/985 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/986 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/986 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/987 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/987 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/988 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/988 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/989 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/989 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/990 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/990 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/991 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/991 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/992 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/992 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/993 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/993 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/994 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/994 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/995 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/995 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/996 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/996 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/997 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/997 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/998 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/998 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/999 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/999 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1000 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1000 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1001 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1001 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1002 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1002 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1003 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1003 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1004 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1004 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1005 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1005 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1006 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1006 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1007 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1007 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1008 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1008 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1009 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1009 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1010 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1010 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1011 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1011 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1012 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1012 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1013 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1013 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1014 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1014 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1015 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1015 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1016 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1016 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1017 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1017 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1018 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1018 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1019 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1019 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1020 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1020 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1021 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1021 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1022 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1022 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1023 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1023 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1024 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1024 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1025 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1025 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1026 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1026 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1027 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1027 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1028 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1028 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1029 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1029 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1030 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1030 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1031 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1031 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1032 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1032 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1033 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1033 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1034 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1034 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1035 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1035 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1036 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1036 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1037 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1037 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1038 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1038 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1039 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1039 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1040 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1040 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1041 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1041 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1042 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1042 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1043 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1043 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1044 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1044 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1045 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1045 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1046 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1046 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1047 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1047 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1048 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1048 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1049 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1049 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1050 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1050 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1051 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1051 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1052 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1052 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1053 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1053 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1054 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1054 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1055 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1055 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1056 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1056 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1057 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1057 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1058 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1058 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1059 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1059 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1060 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1060 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1061 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1061 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1062 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1062 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1063 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1063 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1064 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1064 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1065 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1065 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1066 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1066 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1067 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1067 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1068 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1068 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1069 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1069 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1070 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1070 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1071 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1071 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1072 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1072 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1073 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1073 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1074 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1074 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1075 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1075 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1076 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1076 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1077 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1077 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1078 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1078 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1079 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1079 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1080 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1080 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1081 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1081 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1082 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1082 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1083 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1083 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1084 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1084 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1085 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1085 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1086 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1086 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1087 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1087 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1088 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1088 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1089 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1089 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1090 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1090 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1091 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1091 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1092 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1092 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1093 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1093 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1094 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1094 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1095 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1095 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1096 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1096 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1097 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1097 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1098 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1098 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1099 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1099 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1100 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1100 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1101 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1101 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1102 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1102 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1103 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1103 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1104 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1104 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1105 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1105 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1106 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1106 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1107 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1107 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1108 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1108 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1109 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1109 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1110 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1110 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1111 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1111 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1112 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1112 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1113 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1113 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1114 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1114 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1115 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1115 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1116 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1116 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1117 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1117 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1118 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1118 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1119 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1119 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1120 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1120 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1121 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1121 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1122 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1122 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1123 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1123 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1124 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1124 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1125 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1125 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1126 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1126 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1127 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1127 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1128 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1128 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1129 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1129 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1130 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1130 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1131 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1131 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1132 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1132 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1133 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1133 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1134 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1134 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1135 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1135 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1136 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1136 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1137 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1137 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1138 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1138 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1139 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1139 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1140 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1140 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1141 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1141 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1142 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1142 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1143 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1143 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1144 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1144 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1145 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1145 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1146 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1146 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1147 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1147 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1148 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1148 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1149 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1149 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1150 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1150 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1151 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1151 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1152 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1152 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1153 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1153 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1154 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1154 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1155 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1155 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1156 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1156 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1157 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1157 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1158 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1158 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1159 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1159 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1160 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1160 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1161 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1161 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1162 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1162 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1163 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1163 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1164 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1164 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1165 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1165 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1166 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1166 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1167 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1167 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1168 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1168 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1169 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1169 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1170 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1170 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1171 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1171 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1172 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1172 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1173 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1173 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1174 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1174 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1175 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1175 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1176 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1176 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1177 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1177 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1178 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1178 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1179 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1179 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1180 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1180 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1181 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1181 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1182 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1182 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1183 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1183 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1184 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1184 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1185 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1185 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1186 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1186 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1187 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1187 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1188 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1188 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1189 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1189 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1190 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1190 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1191 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1191 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1192 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1192 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1193 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1193 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1194 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1194 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1195 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1195 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1196 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1196 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1197 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1197 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1198 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1198 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1199 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1199 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1200 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1200 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1201 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1201 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1202 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1202 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1203 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1203 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1204 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1204 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1205 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1205 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1206 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1206 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1207 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1207 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1208 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1208 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1209 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1209 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1210 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1210 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1211 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1211 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1212 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1212 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1213 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1213 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1214 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1214 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1215 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1215 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1216 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1216 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1217 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1217 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1218 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1218 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1219 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1219 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1220 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1220 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1221 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1221 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1222 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1222 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1223 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1223 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1224 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1224 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1225 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1225 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1226 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1226 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1227 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1227 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1228 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1228 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1229 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1229 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1230 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1230 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1231 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1231 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1232 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1232 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1233 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1233 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1234 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1234 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1235 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1235 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1236 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1236 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1237 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1237 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1238 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1238 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1239 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1239 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1240 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1240 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1241 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1241 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1242 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1242 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1243 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1243 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1244 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1244 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1245 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1245 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1246 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1246 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1247 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1247 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1248 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1248 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1249 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1249 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1250 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1250 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1251 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1251 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1252 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1252 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1253 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1253 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1254 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1254 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1255 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1255 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1256 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1256 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1257 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1257 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1258 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1258 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1259 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1259 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1260 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1260 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1261 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1261 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1262 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1262 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1263 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1263 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1264 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1264 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1265 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1265 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1266 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1266 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1267 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1267 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1268 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1268 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1269 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1269 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1270 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1270 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1271 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1271 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1272 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1272 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1273 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1273 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1274 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1274 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1275 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1275 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1276 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1276 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1277 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1277 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1278 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1278 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1279 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1279 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1280 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1280 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1281 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1281 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1282 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1282 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1283 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1283 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1284 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1284 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1285 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1285 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1286 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1286 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1287 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1287 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1288 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1288 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1289 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1289 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1290 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1290 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1291 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1291 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1292 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1292 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1293 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1293 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1294 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1294 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1295 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1295 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1296 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1296 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1297 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1297 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1298 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1298 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1299 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1299 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1300 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1300 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1301 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1301 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1302 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1302 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1303 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1303 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1304 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1304 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1305 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1305 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1306 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1306 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1307 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1307 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1308 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1308 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1309 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1309 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1310 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1310 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1311 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1311 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1312 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1312 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1313 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1313 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1314 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1314 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1315 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1315 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1316 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1316 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1317 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1317 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1318 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1318 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1319 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1319 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1320 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1320 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1321 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1321 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1322 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1322 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1323 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1323 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1324 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1324 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1325 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1325 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1326 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1326 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1327 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1327 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1328 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1328 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1329 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1329 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1330 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1330 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1331 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1331 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1332 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1332 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1333 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1333 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1334 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1334 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1335 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1335 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1336 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1336 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1337 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1337 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1338 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1338 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1339 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1339 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1340 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1340 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1341 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1341 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1342 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1342 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1343 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1343 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1344 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1344 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1345 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1345 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1346 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1346 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1347 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1347 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1348 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1348 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1349 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1349 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1350 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1350 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1351 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1351 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1352 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1352 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1353 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1353 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1354 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1354 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1355 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1355 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1356 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1356 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1357 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1357 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1358 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1358 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1359 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1359 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1360 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1360 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1361 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1361 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1362 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1362 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1363 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1363 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1364 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1364 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1365 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1365 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1366 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1366 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1367 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1367 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1368 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1368 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1369 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1369 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1370 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1370 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1371 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1371 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1372 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1372 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1373 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1373 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1374 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1374 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1375 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1375 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1376 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1376 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1377 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1377 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1378 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1378 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1379 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1379 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1380 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1380 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1381 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1381 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1382 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1382 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1383 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1383 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1384 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1384 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1385 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1385 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1386 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1386 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1387 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1387 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1388 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1388 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1389 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1389 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1390 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1390 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1391 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1391 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1392 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1392 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1393 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1393 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1394 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1394 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1395 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1395 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1396 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1396 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1397 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1397 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1398 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1398 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1399 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1399 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1400 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1400 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1401 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1401 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1402 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1402 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1403 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1403 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1404 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1404 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1405 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1405 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1406 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1406 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1407 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1407 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1408 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1408 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1409 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1409 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1410 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1410 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1411 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1411 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1412 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1412 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1413 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1413 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1414 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1414 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1415 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1415 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1416 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1416 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1417 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1417 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1418 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1418 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1419 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1419 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1420 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1420 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1421 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1421 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1422 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1422 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1423 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1423 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1424 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1424 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1425 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1425 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1426 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1426 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1427 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1427 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1428 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1428 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1429 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1429 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1430 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1430 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1431 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1431 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1432 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1432 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1433 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1433 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1434 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1434 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1435 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1435 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1436 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1436 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1437 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1437 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1438 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1438 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1439 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1439 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1440 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1440 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1441 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1441 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1442 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1442 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1443 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1443 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1444 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1444 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1445 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1445 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1446 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1446 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1447 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1447 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1448 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1448 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1449 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1449 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1450 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1450 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1451 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1451 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1452 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1452 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1453 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1453 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1454 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1454 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1455 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1455 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1456 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1456 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1457 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1457 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1458 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1458 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1459 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1459 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1460 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1460 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1461 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1461 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1462 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1462 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1463 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1463 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1464 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1464 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1465 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1465 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1466 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1466 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1467 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1467 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1468 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1468 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1469 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1469 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1470 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1470 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1471 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1471 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1472 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1472 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1473 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1473 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1474 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1474 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1475 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1475 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1476 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1476 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1477 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1477 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1478 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1478 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1479 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1479 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1480 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1480 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1481 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1481 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1482 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1482 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1483 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1483 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1484 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1484 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1485 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1485 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1486 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1486 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1487 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1487 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1488 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1488 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1489 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1489 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1490 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1490 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1491 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1491 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1492 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1492 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1493 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1493 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1494 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1494 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1495 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1495 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1496 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1496 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1497 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1497 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1498 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1498 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1499 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1499 (0 ms) [----------] 1500 tests from Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest (28 ms total) [----------] 52 tests from EncryptDecrypt/Pkcs11CbcPadTest [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/3 (0 ms) [----------] 52 tests from EncryptDecrypt/Pkcs11CbcPadTest (0 ms total) [----------] 183 tests from WycheproofTestVector/Pkcs11AesCbcWycheproofTest [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/13 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/85 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/156 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/182 (0 ms) [----------] 183 tests from WycheproofTestVector/Pkcs11AesCbcWycheproofTest (3 ms total) [----------] 2 tests from NSSTestVector/Pkcs11ChaCha20Poly1305Test [ RUN ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 [ OK ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 (0 ms) [ RUN ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 [ OK ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 (0 ms) [----------] 2 tests from NSSTestVector/Pkcs11ChaCha20Poly1305Test (0 ms total) [----------] 300 tests from WycheproofTestVector/Pkcs11ChaCha20Poly1305Test [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/20 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/132 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/169 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/182 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/183 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/184 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/185 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/186 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/187 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/188 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/189 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/190 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/191 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/192 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/193 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/194 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/195 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/196 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/197 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/198 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/199 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/200 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/201 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/202 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/203 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/204 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/205 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/206 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/207 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/208 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/209 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/210 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/211 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/212 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/213 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/214 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/215 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/216 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/217 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/218 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/219 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/220 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/221 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/222 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/223 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/224 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/225 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/226 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/227 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/228 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/229 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/230 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/231 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/232 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/233 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/234 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/235 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/236 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/237 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/238 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/239 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/240 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/241 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/242 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/243 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/244 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/245 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/246 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/247 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/248 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/249 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/250 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/251 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/252 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/253 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/254 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/255 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/256 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/256 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/257 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/257 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/258 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/258 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/259 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/259 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/260 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/260 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/261 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/261 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/262 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/262 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/263 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/263 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/264 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/264 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/265 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/265 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/266 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/266 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/267 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/267 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/268 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/268 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/269 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/269 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/270 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/270 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/271 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/271 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/272 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/272 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/273 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/273 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/274 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/274 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/275 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/275 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/276 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/276 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/277 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/277 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/278 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/278 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/279 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/279 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/280 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/280 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/281 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/281 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/282 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/282 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/283 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/283 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/284 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/284 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/285 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/285 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/286 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/286 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/287 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/287 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/288 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/288 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/289 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/289 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/290 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/290 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/291 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/291 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/292 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/292 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/293 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/293 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/294 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/294 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/295 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/295 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/296 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/296 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/297 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/297 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/298 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/298 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/299 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/299 (0 ms) [----------] 300 tests from WycheproofTestVector/Pkcs11ChaCha20Poly1305Test (8 ms total) [----------] 3 tests from NSSTestVector/Pkcs11Curve25519Test [ RUN ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/0 [ OK ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/0 (2 ms) [ RUN ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/1 [ OK ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/1 (0 ms) [ RUN ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/2 [ OK ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/2 (0 ms) [----------] 3 tests from NSSTestVector/Pkcs11Curve25519Test (2 ms total) [----------] 518 tests from WycheproofTestVector/Pkcs11Curve25519Test [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/0 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/1 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/2 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/3 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/4 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/5 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/6 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/7 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/8 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/9 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/10 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/11 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/12 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/13 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/14 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/15 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/16 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/17 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/18 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/19 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/20 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/21 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/22 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/23 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/24 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/25 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/26 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/27 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/28 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/29 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/30 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/33 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/34 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/35 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/36 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/37 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/38 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/39 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/40 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/41 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/42 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/43 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/44 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/45 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/46 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/47 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/48 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/49 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/50 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/51 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/52 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/53 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/54 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/55 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/56 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/57 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/58 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/59 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/60 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/61 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/79 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/84 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/85 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/86 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/87 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/88 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/89 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/90 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/92 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/93 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/94 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/95 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/96 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/99 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/100 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/101 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/102 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/103 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/104 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/105 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/106 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/107 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/108 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/109 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/110 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/111 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/112 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/113 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/114 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/115 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/118 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/119 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/120 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/121 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/122 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/123 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/124 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/125 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/126 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/127 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/128 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/129 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/130 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/131 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/132 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/133 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/134 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/135 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/136 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/137 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/138 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/139 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/140 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/141 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/142 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/143 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/144 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/145 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/146 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/147 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/148 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/149 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/150 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/151 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/152 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/154 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/155 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/156 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/157 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/158 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/159 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/160 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/161 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/162 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/163 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/166 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/167 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/168 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/169 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/170 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/171 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/172 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/173 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/174 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/175 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/176 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/177 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/178 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/179 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/180 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/181 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/182 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/183 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/184 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/185 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/186 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/187 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/188 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/189 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/190 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/191 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/192 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/193 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/194 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/195 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/196 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/197 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/198 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/199 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/200 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/201 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/202 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/203 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/204 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/205 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/206 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/207 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/208 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/209 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/210 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/211 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/212 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/213 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/214 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/215 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/216 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/217 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/218 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/219 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/220 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/221 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/222 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/223 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/224 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/225 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/226 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/227 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/228 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/229 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/230 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/231 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/232 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/233 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/234 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/235 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/236 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/237 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/238 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/239 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/240 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/241 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/242 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/243 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/244 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/245 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/246 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/247 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/248 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/249 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/250 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/251 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/252 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/253 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/254 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/255 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/256 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/256 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/257 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/257 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/258 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/258 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/259 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/259 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/260 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/260 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/261 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/261 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/262 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/262 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/263 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/263 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/264 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/264 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/265 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/265 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/266 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/266 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/267 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/267 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/268 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/268 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/269 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/269 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/270 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/270 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/271 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/271 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/272 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/272 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/273 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/273 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/274 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/274 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/275 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/275 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/276 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/276 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/277 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/277 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/278 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/278 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/279 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/279 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/280 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/280 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/281 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/281 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/282 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/282 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/283 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/283 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/284 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/284 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/285 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/285 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/286 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/286 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/287 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/287 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/288 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/288 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/289 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/289 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/290 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/290 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/291 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/291 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/292 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/292 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/293 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/293 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/294 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/294 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/295 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/295 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/296 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/296 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/297 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/297 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/298 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/298 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/299 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/299 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/300 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/300 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/301 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/301 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/302 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/302 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/303 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/303 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/304 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/304 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/305 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/305 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/306 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/306 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/307 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/307 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/308 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/308 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/309 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/309 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/310 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/310 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/311 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/311 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/312 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/312 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/313 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/313 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/314 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/314 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/315 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/315 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/316 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/316 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/317 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/317 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/318 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/318 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/319 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/319 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/320 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/320 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/321 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/321 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/322 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/322 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/323 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/323 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/324 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/324 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/325 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/325 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/326 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/326 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/327 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/327 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/328 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/328 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/329 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/329 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/330 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/330 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/331 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/331 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/332 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/332 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/333 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/333 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/334 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/334 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/335 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/335 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/336 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/336 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/337 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/337 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/338 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/338 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/339 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/339 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/340 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/340 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/341 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/341 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/342 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/342 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/343 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/343 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/344 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/344 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/345 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/345 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/346 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/346 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/347 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/347 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/348 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/348 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/349 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/349 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/350 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/350 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/351 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/351 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/352 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/352 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/353 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/353 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/354 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/354 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/355 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/355 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/356 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/356 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/357 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/357 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/358 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/358 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/359 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/359 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/360 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/360 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/361 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/361 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/362 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/362 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/363 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/363 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/364 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/364 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/365 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/365 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/366 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/366 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/367 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/367 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/368 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/368 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/369 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/369 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/370 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/370 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/371 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/371 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/372 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/372 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/373 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/373 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/374 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/374 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/375 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/375 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/376 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/376 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/377 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/377 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/378 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/378 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/379 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/379 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/380 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/380 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/381 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/381 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/382 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/382 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/383 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/383 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/384 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/384 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/385 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/385 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/386 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/386 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/387 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/387 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/388 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/388 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/389 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/389 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/390 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/390 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/391 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/391 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/392 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/392 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/393 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/393 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/394 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/394 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/395 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/395 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/396 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/396 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/397 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/397 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/398 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/398 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/399 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/399 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/400 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/400 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/401 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/401 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/402 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/402 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/403 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/403 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/404 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/404 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/405 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/405 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/406 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/406 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/407 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/407 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/408 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/408 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/409 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/409 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/410 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/410 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/411 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/411 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/412 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/412 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/413 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/413 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/414 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/414 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/415 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/415 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/416 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/416 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/417 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/417 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/418 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/418 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/419 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/419 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/420 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/420 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/421 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/421 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/422 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/422 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/423 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/423 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/424 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/424 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/425 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/425 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/426 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/426 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/427 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/427 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/428 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/428 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/429 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/429 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/430 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/430 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/431 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/431 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/432 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/432 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/433 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/433 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/434 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/434 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/435 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/435 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/436 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/436 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/437 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/437 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/438 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/438 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/439 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/439 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/440 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/440 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/441 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/441 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/442 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/442 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/443 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/443 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/444 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/444 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/445 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/445 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/446 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/446 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/447 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/447 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/448 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/448 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/449 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/449 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/450 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/450 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/451 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/451 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/452 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/452 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/453 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/453 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/454 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/454 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/455 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/455 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/456 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/456 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/457 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/457 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/458 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/458 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/459 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/459 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/460 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/460 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/461 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/461 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/462 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/462 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/463 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/463 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/464 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/464 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/465 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/465 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/466 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/466 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/467 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/467 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/468 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/468 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/469 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/469 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/470 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/470 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/471 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/471 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/472 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/472 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/473 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/473 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/474 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/474 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/475 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/475 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/476 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/476 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/477 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/477 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/478 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/478 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/479 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/479 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/480 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/480 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/481 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/481 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/482 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/482 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/483 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/483 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/484 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/484 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/485 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/485 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/486 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/486 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/487 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/487 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/488 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/488 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/489 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/489 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/490 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/490 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/491 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/491 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/492 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/492 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/493 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/493 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/494 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/494 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/495 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/495 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/496 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/496 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/497 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/497 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/498 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/498 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/499 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/499 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/500 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/500 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/501 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/501 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/502 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/502 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/503 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/503 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/504 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/504 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/505 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/505 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/506 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/506 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/507 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/507 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/508 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/508 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/509 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/509 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/510 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/510 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/511 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/511 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/512 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/512 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/513 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/513 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/514 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/514 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/515 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/515 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/516 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/516 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/517 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/517 (2 ms) [----------] 518 tests from WycheproofTestVector/Pkcs11Curve25519Test (810 ms total) [----------] 906 tests from DsaTest/Pkcs11DsaTest [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/0 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/0 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/1 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/1 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/2 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/2 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/3 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/3 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/4 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/4 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/5 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/5 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/6 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/6 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/7 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/7 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/8 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/8 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/9 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/9 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/10 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/10 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/11 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/11 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/12 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/12 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/13 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/13 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/14 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/14 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/15 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/15 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/16 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/16 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/17 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/17 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/18 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/18 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/19 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/19 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/20 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/20 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/21 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/21 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/22 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/22 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/23 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/23 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/24 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/24 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/25 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/25 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/26 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/26 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/27 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/27 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/28 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/28 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/29 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/29 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/30 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/30 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/31 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/31 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/32 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/32 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/33 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/33 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/34 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/34 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/35 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/35 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/36 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/36 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/37 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/37 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/38 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/38 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/39 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/39 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/40 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/40 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/41 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/41 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/42 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/42 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/43 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/43 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/44 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/44 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/45 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/45 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/46 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/46 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/47 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/47 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/48 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/48 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/49 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/49 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/50 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/50 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/51 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/51 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/52 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/52 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/53 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/53 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/54 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/54 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/55 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/55 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/56 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/56 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/57 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/57 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/58 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/58 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/59 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/59 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/60 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/60 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/61 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/61 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/62 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/62 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/63 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/63 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/64 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/64 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/65 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/65 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/66 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/66 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/67 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/67 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/68 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/68 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/69 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/69 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/70 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/70 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/71 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/71 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/72 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/72 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/73 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/73 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/74 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/74 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/75 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/75 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/76 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/76 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/77 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/77 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/78 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/78 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/79 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/79 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/80 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/80 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/81 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/81 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/82 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/82 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/83 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/83 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/84 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/84 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/85 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/85 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/86 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/86 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/87 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/87 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/88 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/88 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/89 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/89 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/90 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/90 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/91 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/91 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/92 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/92 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/93 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/93 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/94 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/94 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/95 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/95 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/96 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/96 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/97 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/97 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/98 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/98 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/99 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/99 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/100 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/100 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/101 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/101 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/102 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/102 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/103 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/103 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/104 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/104 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/105 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/105 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/106 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/106 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/107 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/107 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/108 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/108 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/109 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/109 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/110 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/110 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/111 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/111 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/112 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/112 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/113 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/113 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/114 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/114 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/115 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/115 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/116 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/116 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/117 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/117 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/118 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/118 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/119 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/119 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/120 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/120 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/121 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/121 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/122 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/122 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/123 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/123 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/124 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/124 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/125 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/125 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/126 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/126 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/127 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/127 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/128 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/128 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/129 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/129 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/130 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/130 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/131 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/131 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/132 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/132 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/133 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/133 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/134 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/134 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/135 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/135 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/136 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/136 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/137 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/137 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/138 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/138 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/139 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/139 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/140 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/140 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/141 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/141 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/142 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/142 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/143 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/143 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/144 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/144 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/145 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/145 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/146 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/146 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/147 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/147 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/148 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/148 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/149 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/149 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/150 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/150 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/151 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/151 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/152 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/152 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/153 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/153 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/154 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/154 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/155 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/155 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/156 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/156 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/157 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/157 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/158 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/158 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/159 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/159 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/160 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/160 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/161 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/161 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/162 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/162 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/163 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/163 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/164 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/164 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/165 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/165 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/166 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/166 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/167 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/167 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/168 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/168 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/169 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/169 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/170 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/170 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/171 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/171 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/172 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/172 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/173 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/173 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/174 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/174 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/175 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/175 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/176 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/176 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/177 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/177 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/178 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/178 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/179 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/179 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/180 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/180 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/181 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/181 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/182 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/182 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/183 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/183 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/184 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/184 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/185 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/185 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/186 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/186 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/187 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/187 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/188 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/188 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/189 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/189 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/190 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/190 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/191 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/191 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/192 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/192 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/193 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/193 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/194 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/194 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/195 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/195 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/196 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/196 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/197 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/197 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/198 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/198 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/199 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/199 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/200 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/200 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/201 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/201 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/202 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/202 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/203 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/203 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/204 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/204 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/205 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/205 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/206 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/206 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/207 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/207 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/208 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/208 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/209 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/209 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/210 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/210 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/211 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/211 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/212 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/212 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/213 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/213 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/214 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/214 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/215 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/215 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/216 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/216 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/217 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/217 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/218 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/218 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/219 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/219 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/220 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/220 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/221 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/221 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/222 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/222 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/223 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/223 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/224 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/224 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/225 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/225 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/226 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/226 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/227 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/227 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/228 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/228 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/229 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/229 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/230 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/230 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/231 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/231 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/232 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/232 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/233 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/233 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/234 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/234 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/235 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/235 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/236 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/236 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/237 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/237 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/238 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/238 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/239 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/239 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/240 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/240 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/241 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/241 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/242 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/242 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/243 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/243 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/244 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/244 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/245 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/245 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/246 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/246 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/247 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/247 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/248 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/248 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/249 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/249 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/250 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/250 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/251 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/251 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/252 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/252 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/253 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/253 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/254 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/254 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/255 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/255 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/256 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/256 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/257 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/257 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/258 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/258 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/259 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/259 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/260 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/260 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/261 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/261 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/262 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/262 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/263 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/263 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/264 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/264 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/265 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/265 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/266 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/266 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/267 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/267 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/268 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/268 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/269 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/269 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/270 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/270 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/271 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/271 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/272 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/272 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/273 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/273 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/274 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/274 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/275 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/275 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/276 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/276 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/277 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/277 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/278 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/278 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/279 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/279 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/280 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/280 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/281 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/281 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/282 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/282 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/283 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/283 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/284 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/284 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/285 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/285 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/286 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/286 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/287 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/287 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/288 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/288 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/289 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/289 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/290 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/290 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/291 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/291 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/292 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/292 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/293 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/293 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/294 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/294 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/295 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/295 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/296 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/296 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/297 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/297 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/298 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/298 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/299 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/299 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/300 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/300 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/301 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/301 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/302 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/302 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/303 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/303 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/304 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/304 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/305 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/305 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/306 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/306 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/307 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/307 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/308 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/308 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/309 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/309 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/310 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/310 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/311 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/311 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/312 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/312 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/313 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/313 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/314 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/314 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/315 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/315 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/316 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/316 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/317 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/317 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/318 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/318 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/319 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/319 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/320 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/320 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/321 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/321 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/322 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/322 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/323 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/323 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/324 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/324 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/325 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/325 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/326 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/326 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/327 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/327 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/328 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/328 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/329 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/329 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/330 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/330 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/331 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/331 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/332 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/332 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/333 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/333 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/334 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/334 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/335 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/335 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/336 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/336 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/337 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/337 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/338 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/338 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/339 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/339 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/340 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/340 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/341 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/341 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/342 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/342 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/343 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/343 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/344 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/344 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/345 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/345 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/346 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/346 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/347 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/347 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/348 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/348 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/349 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/349 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/350 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/350 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/351 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/351 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/352 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/352 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/353 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/353 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/354 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/354 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/355 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/355 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/356 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/356 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/357 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/357 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/358 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/358 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/359 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/359 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/360 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/360 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/361 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/361 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/362 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/362 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/363 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/363 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/364 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/364 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/365 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/365 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/366 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/366 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/367 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/367 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/368 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/368 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/369 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/369 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/370 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/370 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/371 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/371 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/372 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/372 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/373 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/373 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/374 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/374 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/375 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/375 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/376 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/376 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/377 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/377 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/378 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/378 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/379 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/379 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/380 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/380 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/381 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/381 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/382 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/382 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/383 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/383 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/384 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/384 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/385 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/385 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/386 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/386 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/387 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/387 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/388 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/388 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/389 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/389 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/390 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/390 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/391 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/391 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/392 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/392 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/393 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/393 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/394 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/394 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/395 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/395 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/396 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/396 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/397 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/397 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/398 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/398 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/399 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/399 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/400 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/400 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/401 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/401 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/402 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/402 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/403 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/403 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/404 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/404 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/405 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/405 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/406 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/406 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/407 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/407 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/408 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/408 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/409 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/409 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/410 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/410 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/411 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/411 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/412 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/412 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/413 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/413 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/414 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/414 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/415 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/415 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/416 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/416 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/417 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/417 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/418 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/418 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/419 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/419 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/420 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/420 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/421 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/421 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/422 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/422 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/423 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/423 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/424 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/424 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/425 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/425 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/426 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/426 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/427 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/427 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/428 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/428 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/429 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/429 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/430 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/430 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/431 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/431 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/432 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/432 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/433 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/433 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/434 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/434 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/435 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/435 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/436 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/436 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/437 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/437 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/438 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/438 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/439 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/439 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/440 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/440 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/441 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/441 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/442 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/442 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/443 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/443 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/444 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/444 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/445 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/445 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/446 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/446 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/447 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/447 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/448 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/448 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/449 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/449 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/450 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/450 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/451 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/451 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/452 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/452 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/453 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/453 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/454 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/454 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/455 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/455 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/456 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/456 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/457 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/457 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/458 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/458 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/459 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/459 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/460 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/460 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/461 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/461 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/462 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/462 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/463 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/463 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/464 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/464 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/465 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/465 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/466 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/466 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/467 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/467 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/468 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/468 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/469 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/469 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/470 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/470 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/471 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/471 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/472 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/472 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/473 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/473 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/474 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/474 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/475 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/475 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/476 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/476 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/477 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/477 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/478 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/478 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/479 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/479 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/480 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/480 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/481 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/481 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/482 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/482 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/483 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/483 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/484 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/484 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/485 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/485 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/486 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/486 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/487 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/487 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/488 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/488 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/489 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/489 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/490 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/490 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/491 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/491 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/492 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/492 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/493 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/493 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/494 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/494 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/495 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/495 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/496 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/496 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/497 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/497 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/498 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/498 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/499 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/499 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/500 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/500 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/501 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/501 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/502 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/502 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/503 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/503 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/504 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/504 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/505 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/505 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/506 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/506 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/507 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/507 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/508 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/508 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/509 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/509 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/510 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/510 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/511 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/511 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/512 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/512 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/513 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/513 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/514 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/514 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/515 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/515 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/516 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/516 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/517 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/517 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/518 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/518 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/519 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/519 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/520 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/520 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/521 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/521 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/522 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/522 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/523 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/523 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/524 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/524 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/525 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/525 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/526 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/526 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/527 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/527 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/528 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/528 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/529 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/529 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/530 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/530 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/531 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/531 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/532 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/532 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/533 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/533 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/534 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/534 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/535 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/535 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/536 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/536 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/537 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/537 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/538 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/538 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/539 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/539 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/540 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/540 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/541 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/541 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/542 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/542 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/543 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/543 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/544 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/544 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/545 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/545 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/546 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/546 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/547 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/547 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/548 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/548 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/549 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/549 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/550 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/550 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/551 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/551 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/552 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/552 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/553 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/553 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/554 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/554 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/555 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/555 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/556 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/556 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/557 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/557 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/558 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/558 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/559 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/559 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/560 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/560 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/561 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/561 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/562 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/562 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/563 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/563 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/564 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/564 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/565 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/565 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/566 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/566 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/567 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/567 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/568 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/568 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/569 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/569 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/570 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/570 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/571 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/571 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/572 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/572 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/573 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/573 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/574 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/574 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/575 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/575 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/576 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/576 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/577 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/577 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/578 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/578 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/579 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/579 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/580 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/580 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/581 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/581 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/582 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/582 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/583 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/583 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/584 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/584 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/585 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/585 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/586 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/586 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/587 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/587 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/588 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/588 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/589 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/589 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/590 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/590 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/591 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/591 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/592 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/592 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/593 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/593 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/594 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/594 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/595 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/595 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/596 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/596 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/597 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/597 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/598 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/598 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/599 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/599 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/600 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/600 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/601 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/601 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/602 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/602 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/603 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/603 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/604 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/604 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/605 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/605 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/606 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/606 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/607 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/607 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/608 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/608 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/609 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/609 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/610 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/610 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/611 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/611 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/612 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/612 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/613 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/613 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/614 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/614 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/615 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/615 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/616 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/616 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/617 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/617 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/618 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/618 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/619 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/619 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/620 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/620 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/621 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/621 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/622 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/622 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/623 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/623 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/624 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/624 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/625 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/625 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/626 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/626 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/627 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/627 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/628 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/628 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/629 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/629 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/630 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/630 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/631 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/631 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/632 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/632 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/633 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/633 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/634 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/634 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/635 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/635 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/636 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/636 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/637 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/637 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/638 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/638 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/639 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/639 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/640 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/640 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/641 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/641 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/642 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/642 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/643 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/643 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/644 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/644 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/645 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/645 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/646 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/646 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/647 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/647 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/648 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/648 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/649 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/649 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/650 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/650 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/651 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/651 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/652 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/652 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/653 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/653 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/654 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/654 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/655 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/655 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/656 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/656 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/657 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/657 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/658 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/658 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/659 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/659 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/660 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/660 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/661 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/661 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/662 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/662 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/663 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/663 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/664 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/664 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/665 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/665 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/666 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/666 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/667 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/667 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/668 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/668 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/669 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/669 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/670 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/670 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/671 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/671 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/672 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/672 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/673 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/673 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/674 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/674 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/675 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/675 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/676 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/676 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/677 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/677 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/678 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/678 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/679 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/679 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/680 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/680 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/681 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/681 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/682 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/682 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/683 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/683 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/684 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/684 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/685 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/685 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/686 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/686 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/687 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/687 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/688 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/688 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/689 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/689 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/690 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/690 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/691 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/691 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/692 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/692 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/693 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/693 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/694 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/694 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/695 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/695 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/696 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/696 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/697 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/697 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/698 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/698 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/699 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/699 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/700 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/700 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/701 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/701 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/702 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/702 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/703 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/703 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/704 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/704 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/705 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/705 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/706 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/706 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/707 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/707 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/708 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/708 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/709 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/709 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/710 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/710 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/711 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/711 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/712 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/712 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/713 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/713 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/714 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/714 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/715 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/715 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/716 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/716 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/717 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/717 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/718 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/718 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/719 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/719 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/720 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/720 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/721 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/721 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/722 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/722 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/723 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/723 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/724 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/724 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/725 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/725 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/726 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/726 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/727 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/727 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/728 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/728 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/729 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/729 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/730 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/730 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/731 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/731 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/732 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/732 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/733 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/733 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/734 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/734 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/735 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/735 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/736 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/736 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/737 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/737 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/738 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/738 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/739 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/739 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/740 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/740 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/741 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/741 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/742 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/742 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/743 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/743 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/744 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/744 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/745 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/745 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/746 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/746 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/747 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/747 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/748 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/748 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/749 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/749 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/750 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/750 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/751 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/751 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/752 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/752 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/753 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/753 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/754 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/754 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/755 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/755 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/756 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/756 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/757 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/757 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/758 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/758 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/759 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/759 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/760 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/760 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/761 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/761 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/762 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/762 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/763 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/763 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/764 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/764 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/765 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/765 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/766 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/766 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/767 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/767 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/768 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/768 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/769 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/769 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/770 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/770 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/771 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/771 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/772 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/772 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/773 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/773 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/774 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/774 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/775 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/775 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/776 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/776 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/777 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/777 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/778 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/778 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/779 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/779 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/780 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/780 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/781 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/781 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/782 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/782 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/783 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/783 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/784 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/784 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/785 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/785 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/786 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/786 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/787 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/787 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/788 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/788 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/789 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/789 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/790 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/790 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/791 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/791 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/792 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/792 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/793 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/793 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/794 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/794 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/795 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/795 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/796 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/796 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/797 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/797 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/798 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/798 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/799 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/799 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/800 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/800 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/801 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/801 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/802 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/802 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/803 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/803 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/804 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/804 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/805 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/805 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/806 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/806 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/807 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/807 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/808 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/808 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/809 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/809 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/810 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/810 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/811 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/811 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/812 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/812 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/813 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/813 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/814 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/814 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/815 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/815 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/816 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/816 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/817 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/817 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/818 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/818 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/819 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/819 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/820 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/820 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/821 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/821 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/822 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/822 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/823 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/823 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/824 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/824 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/825 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/825 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/826 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/826 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/827 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/827 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/828 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/828 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/829 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/829 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/830 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/830 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/831 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/831 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/832 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/832 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/833 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/833 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/834 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/834 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/835 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/835 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/836 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/836 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/837 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/837 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/838 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/838 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/839 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/839 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/840 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/840 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/841 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/841 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/842 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/842 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/843 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/843 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/844 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/844 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/845 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/845 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/846 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/846 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/847 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/847 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/848 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/848 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/849 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/849 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/850 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/850 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/851 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/851 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/852 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/852 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/853 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/853 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/854 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/854 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/855 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/855 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/856 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/856 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/857 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/857 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/858 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/858 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/859 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/859 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/860 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/860 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/861 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/861 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/862 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/862 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/863 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/863 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/864 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/864 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/865 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/865 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/866 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/866 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/867 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/867 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/868 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/868 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/869 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/869 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/870 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/870 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/871 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/871 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/872 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/872 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/873 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/873 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/874 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/874 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/875 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/875 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/876 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/876 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/877 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/877 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/878 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/878 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/879 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/879 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/880 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/880 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/881 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/881 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/882 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/882 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/883 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/883 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/884 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/884 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/885 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/885 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/886 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/886 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/887 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/887 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/888 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/888 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/889 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/889 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/890 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/890 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/891 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/891 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/892 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/892 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/893 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/893 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/894 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/894 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/895 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/895 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/896 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/896 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/897 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/897 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/898 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/898 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/899 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/899 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/900 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/900 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/901 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/901 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/902 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/902 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/903 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/903 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/904 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/904 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/905 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/905 (3 ms) [----------] 906 tests from DsaTest/Pkcs11DsaTest (301 ms total) [----------] 8 tests from EcdsaSignVerify/Pkcs11EcdsaTest [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/0 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/0 (2 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/1 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/1 (1 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/2 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/2 (5 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/3 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/3 (3 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/0 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/0 (4 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/1 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/1 (5 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/2 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/2 (10 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/3 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/3 (7 ms) [----------] 8 tests from EcdsaSignVerify/Pkcs11EcdsaTest (37 ms total) [----------] 387 tests from WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/0 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/0 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/1 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/1 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/2 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/2 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/3 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/3 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/4 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/4 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/5 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/5 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/6 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/6 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/7 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/7 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/8 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/8 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/9 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/9 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/10 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/10 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/11 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/11 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/12 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/12 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/13 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/13 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/14 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/14 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/15 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/15 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/16 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/16 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/17 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/17 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/18 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/18 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/19 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/19 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/20 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/20 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/21 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/21 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/22 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/22 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/23 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/23 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/24 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/24 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/25 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/25 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/26 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/26 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/27 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/27 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/28 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/28 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/29 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/29 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/30 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/30 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/31 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/31 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/32 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/32 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/33 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/33 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/34 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/34 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/35 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/35 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/36 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/36 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/37 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/37 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/38 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/38 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/39 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/39 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/40 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/40 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/41 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/41 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/42 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/42 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/43 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/43 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/44 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/44 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/45 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/45 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/46 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/46 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/47 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/47 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/48 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/48 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/49 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/49 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/50 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/50 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/51 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/51 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/52 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/52 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/53 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/53 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/54 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/54 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/55 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/55 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/56 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/56 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/57 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/57 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/58 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/58 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/59 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/59 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/60 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/60 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/61 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/61 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/62 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/62 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/63 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/63 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/64 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/64 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/65 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/65 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/66 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/66 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/67 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/67 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/68 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/68 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/69 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/69 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/70 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/70 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/71 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/71 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/72 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/72 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/73 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/73 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/74 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/74 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/75 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/75 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/76 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/76 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/77 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/77 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/78 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/78 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/79 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/79 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/80 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/80 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/81 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/81 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/82 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/82 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/83 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/83 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/84 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/84 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/85 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/85 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/86 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/86 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/87 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/87 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/88 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/88 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/89 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/89 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/90 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/90 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/91 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/91 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/92 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/92 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/93 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/93 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/94 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/94 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/95 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/95 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/96 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/96 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/97 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/97 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/98 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/98 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/99 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/99 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/100 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/100 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/101 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/101 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/102 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/102 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/103 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/103 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/104 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/104 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/105 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/105 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/106 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/106 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/107 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/107 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/108 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/108 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/109 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/109 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/110 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/110 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/111 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/111 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/112 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/112 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/113 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/113 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/114 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/114 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/115 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/115 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/116 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/116 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/117 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/117 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/118 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/118 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/119 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/119 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/120 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/120 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/121 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/121 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/122 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/122 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/123 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/123 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/124 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/124 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/125 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/125 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/126 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/126 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/127 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/127 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/128 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/128 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/129 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/129 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/130 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/130 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/131 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/131 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/132 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/132 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/133 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/133 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/134 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/134 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/135 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/135 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/136 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/136 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/137 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/137 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/138 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/138 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/139 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/139 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/140 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/140 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/141 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/141 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/142 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/142 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/143 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/143 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/144 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/144 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/145 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/145 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/146 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/146 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/147 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/147 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/148 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/148 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/149 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/149 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/150 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/150 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/151 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/151 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/152 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/152 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/153 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/153 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/154 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/154 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/155 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/155 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/156 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/156 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/157 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/157 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/158 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/158 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/159 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/159 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/160 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/160 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/161 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/161 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/162 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/162 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/163 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/163 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/164 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/164 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/165 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/165 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/166 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/166 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/167 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/167 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/168 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/168 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/169 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/169 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/170 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/170 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/171 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/171 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/172 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/172 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/173 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/173 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/174 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/174 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/175 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/175 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/176 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/176 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/177 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/177 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/178 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/178 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/179 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/179 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/180 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/180 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/181 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/181 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/182 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/182 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/183 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/183 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/184 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/184 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/185 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/185 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/186 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/186 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/187 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/187 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/188 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/188 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/189 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/189 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/190 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/190 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/191 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/191 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/192 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/192 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/193 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/193 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/194 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/194 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/195 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/195 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/196 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/196 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/197 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/197 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/198 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/198 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/199 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/199 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/200 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/200 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/201 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/201 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/202 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/202 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/203 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/203 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/204 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/204 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/205 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/205 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/206 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/206 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/207 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/207 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/208 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/208 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/209 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/209 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/210 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/210 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/211 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/211 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/212 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/212 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/213 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/213 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/214 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/214 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/215 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/215 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/216 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/216 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/217 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/217 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/218 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/218 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/219 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/219 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/220 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/220 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/221 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/221 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/222 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/222 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/223 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/223 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/224 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/224 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/225 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/225 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/226 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/226 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/227 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/227 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/228 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/228 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/229 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/229 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/230 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/230 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/231 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/231 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/232 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/232 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/233 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/233 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/234 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/234 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/235 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/235 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/236 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/236 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/237 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/237 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/238 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/238 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/239 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/239 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/240 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/240 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/241 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/241 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/242 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/242 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/243 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/243 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/244 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/244 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/245 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/245 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/246 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/246 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/247 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/247 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/248 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/248 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/249 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/249 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/250 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/250 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/251 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/251 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/252 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/252 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/253 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/253 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/254 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/254 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/255 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/255 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/256 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/256 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/257 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/257 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/258 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/258 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/259 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/259 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/260 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/260 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/261 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/261 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/262 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/262 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/263 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/263 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/264 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/264 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/265 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/265 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/266 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/266 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/267 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/267 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/268 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/268 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/269 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/269 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/270 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/270 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/271 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/271 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/272 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/272 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/273 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/273 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/274 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/274 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/275 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/275 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/276 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/276 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/277 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/277 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/278 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/278 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/279 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/279 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/280 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/280 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/281 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/281 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/282 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/282 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/283 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/283 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/284 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/284 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/285 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/285 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/286 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/286 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/287 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/287 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/288 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/288 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/289 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/289 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/290 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/290 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/291 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/291 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/292 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/292 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/293 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/293 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/294 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/294 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/295 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/295 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/296 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/296 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/297 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/297 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/298 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/298 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/299 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/299 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/300 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/300 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/301 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/301 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/302 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/302 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/303 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/303 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/304 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/304 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/305 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/305 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/306 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/306 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/307 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/307 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/308 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/308 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/309 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/309 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/310 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/310 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/311 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/311 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/312 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/312 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/313 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/313 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/314 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/314 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/315 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/315 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/316 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/316 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/317 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/317 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/318 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/318 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/319 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/319 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/320 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/320 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/321 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/321 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/322 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/322 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/323 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/323 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/324 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/324 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/325 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/325 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/326 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/326 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/327 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/327 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/328 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/328 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/329 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/329 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/330 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/330 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/331 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/331 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/332 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/332 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/333 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/333 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/334 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/334 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/335 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/335 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/336 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/336 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/337 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/337 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/338 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/338 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/339 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/339 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/340 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/340 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/341 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/341 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/342 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/342 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/343 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/343 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/344 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/344 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/345 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/345 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/346 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/346 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/347 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/347 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/348 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/348 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/349 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/349 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/350 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/350 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/351 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/351 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/352 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/352 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/353 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/353 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/354 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/354 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/355 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/355 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/356 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/356 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/357 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/357 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/358 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/358 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/359 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/359 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/360 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/360 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/361 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/361 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/362 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/362 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/363 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/363 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/364 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/364 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/365 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/365 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/366 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/366 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/367 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/367 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/368 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/368 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/369 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/369 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/370 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/370 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/371 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/371 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/372 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/372 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/373 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/373 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/374 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/374 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/375 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/375 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/376 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/376 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/377 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/377 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/378 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/378 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/379 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/379 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/380 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/380 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/381 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/381 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/382 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/382 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/383 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/383 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/384 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/384 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/385 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/385 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/386 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/386 (1 ms) [----------] 387 tests from WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest (235 ms total) [----------] 408 tests from WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/0 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/0 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/1 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/1 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/2 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/2 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/3 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/3 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/4 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/4 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/5 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/5 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/6 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/6 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/7 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/7 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/8 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/8 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/9 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/9 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/10 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/10 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/11 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/11 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/12 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/12 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/13 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/13 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/14 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/14 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/15 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/15 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/16 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/16 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/17 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/17 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/18 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/18 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/19 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/19 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/20 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/20 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/21 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/21 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/22 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/22 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/23 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/23 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/24 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/24 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/25 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/25 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/26 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/26 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/27 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/27 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/28 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/28 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/29 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/29 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/30 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/30 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/31 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/31 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/32 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/32 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/33 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/33 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/34 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/34 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/35 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/35 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/36 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/36 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/37 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/37 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/38 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/38 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/39 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/39 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/40 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/40 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/41 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/41 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/42 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/42 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/43 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/43 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/44 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/44 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/45 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/45 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/46 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/46 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/47 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/47 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/48 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/48 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/49 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/49 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/50 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/50 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/51 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/51 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/52 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/52 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/53 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/53 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/54 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/54 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/55 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/55 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/56 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/56 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/57 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/57 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/58 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/58 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/59 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/59 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/60 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/60 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/61 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/61 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/62 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/62 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/63 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/63 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/64 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/64 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/65 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/65 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/66 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/66 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/67 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/67 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/68 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/68 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/69 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/69 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/70 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/70 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/71 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/71 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/72 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/72 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/73 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/73 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/74 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/74 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/75 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/75 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/76 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/76 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/77 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/77 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/78 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/78 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/79 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/79 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/80 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/80 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/81 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/81 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/82 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/82 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/83 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/83 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/84 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/84 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/85 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/85 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/86 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/86 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/87 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/87 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/88 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/88 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/89 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/89 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/90 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/90 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/91 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/91 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/92 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/92 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/93 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/93 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/94 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/94 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/95 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/95 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/96 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/96 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/97 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/97 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/98 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/98 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/99 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/99 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/100 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/100 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/101 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/101 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/102 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/102 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/103 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/103 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/104 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/104 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/105 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/105 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/106 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/106 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/107 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/107 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/108 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/108 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/109 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/109 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/110 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/110 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/111 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/111 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/112 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/112 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/113 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/113 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/114 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/114 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/115 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/115 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/116 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/116 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/117 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/117 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/118 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/118 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/119 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/119 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/120 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/120 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/121 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/121 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/122 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/122 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/123 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/123 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/124 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/124 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/125 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/125 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/126 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/126 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/127 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/127 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/128 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/128 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/129 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/129 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/130 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/130 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/131 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/131 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/132 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/132 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/133 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/133 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/134 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/134 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/135 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/135 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/136 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/136 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/137 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/137 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/138 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/138 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/139 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/139 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/140 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/140 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/141 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/141 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/142 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/142 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/143 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/143 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/144 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/144 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/145 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/145 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/146 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/146 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/147 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/147 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/148 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/148 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/149 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/149 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/150 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/150 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/151 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/151 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/152 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/152 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/153 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/153 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/154 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/154 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/155 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/155 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/156 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/156 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/157 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/157 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/158 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/158 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/159 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/159 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/160 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/160 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/161 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/161 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/162 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/162 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/163 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/163 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/164 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/164 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/165 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/165 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/166 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/166 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/167 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/167 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/168 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/168 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/169 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/169 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/170 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/170 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/171 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/171 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/172 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/172 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/173 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/173 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/174 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/174 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/175 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/175 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/176 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/176 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/177 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/177 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/178 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/178 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/179 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/179 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/180 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/180 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/181 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/181 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/182 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/182 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/183 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/183 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/184 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/184 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/185 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/185 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/186 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/186 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/187 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/187 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/188 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/188 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/189 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/189 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/190 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/190 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/191 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/191 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/192 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/192 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/193 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/193 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/194 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/194 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/195 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/195 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/196 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/196 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/197 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/197 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/198 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/198 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/199 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/199 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/200 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/200 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/201 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/201 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/202 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/202 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/203 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/203 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/204 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/204 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/205 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/205 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/206 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/206 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/207 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/207 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/208 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/208 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/209 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/209 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/210 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/210 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/211 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/211 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/212 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/212 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/213 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/213 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/214 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/214 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/215 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/215 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/216 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/216 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/217 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/217 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/218 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/218 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/219 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/219 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/220 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/220 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/221 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/221 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/222 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/222 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/223 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/223 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/224 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/224 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/225 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/225 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/226 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/226 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/227 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/227 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/228 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/228 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/229 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/229 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/230 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/230 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/231 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/231 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/232 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/232 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/233 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/233 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/234 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/234 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/235 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/235 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/236 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/236 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/237 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/237 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/238 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/238 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/239 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/239 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/240 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/240 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/241 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/241 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/242 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/242 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/243 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/243 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/244 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/244 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/245 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/245 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/246 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/246 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/247 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/247 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/248 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/248 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/249 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/249 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/250 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/250 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/251 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/251 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/252 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/252 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/253 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/253 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/254 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/254 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/255 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/255 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/256 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/256 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/257 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/257 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/258 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/258 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/259 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/259 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/260 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/260 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/261 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/261 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/262 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/262 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/263 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/263 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/264 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/264 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/265 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/265 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/266 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/266 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/267 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/267 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/268 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/268 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/269 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/269 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/270 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/270 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/271 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/271 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/272 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/272 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/273 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/273 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/274 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/274 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/275 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/275 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/276 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/276 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/277 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/277 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/278 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/278 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/279 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/279 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/280 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/280 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/281 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/281 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/282 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/282 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/283 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/283 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/284 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/284 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/285 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/285 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/286 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/286 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/287 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/287 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/288 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/288 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/289 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/289 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/290 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/290 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/291 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/291 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/292 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/292 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/293 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/293 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/294 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/294 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/295 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/295 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/296 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/296 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/297 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/297 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/298 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/298 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/299 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/299 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/300 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/300 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/301 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/301 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/302 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/302 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/303 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/303 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/304 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/304 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/305 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/305 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/306 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/306 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/307 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/307 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/308 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/308 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/309 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/309 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/310 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/310 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/311 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/311 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/312 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/312 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/313 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/313 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/314 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/314 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/315 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/315 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/316 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/316 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/317 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/317 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/318 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/318 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/319 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/319 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/320 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/320 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/321 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/321 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/322 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/322 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/323 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/323 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/324 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/324 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/325 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/325 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/326 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/326 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/327 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/327 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/328 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/328 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/329 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/329 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/330 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/330 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/331 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/331 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/332 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/332 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/333 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/333 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/334 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/334 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/335 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/335 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/336 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/336 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/337 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/337 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/338 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/338 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/339 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/339 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/340 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/340 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/341 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/341 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/342 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/342 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/343 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/343 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/344 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/344 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/345 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/345 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/346 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/346 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/347 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/347 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/348 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/348 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/349 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/349 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/350 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/350 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/351 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/351 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/352 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/352 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/353 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/353 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/354 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/354 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/355 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/355 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/356 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/356 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/357 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/357 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/358 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/358 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/359 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/359 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/360 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/360 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/361 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/361 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/362 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/362 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/363 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/363 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/364 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/364 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/365 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/365 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/366 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/366 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/367 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/367 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/368 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/368 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/369 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/369 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/370 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/370 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/371 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/371 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/372 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/372 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/373 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/373 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/374 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/374 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/375 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/375 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/376 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/376 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/377 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/377 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/378 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/378 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/379 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/379 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/380 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/380 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/381 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/381 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/382 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/382 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/383 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/383 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/384 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/384 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/385 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/385 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/386 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/386 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/387 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/387 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/388 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/388 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/389 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/389 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/390 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/390 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/391 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/391 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/392 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/392 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/393 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/393 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/394 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/394 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/395 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/395 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/396 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/396 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/397 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/397 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/398 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/398 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/399 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/399 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/400 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/400 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/401 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/401 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/402 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/402 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/403 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/403 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/404 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/404 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/405 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/405 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/406 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/406 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/407 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/407 (3 ms) [----------] 408 tests from WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest (650 ms total) [----------] 447 tests from WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/0 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/0 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/1 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/1 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/2 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/2 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/3 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/3 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/4 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/4 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/5 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/5 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/6 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/6 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/7 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/7 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/8 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/8 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/9 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/9 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/10 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/10 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/11 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/11 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/12 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/12 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/13 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/13 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/14 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/14 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/15 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/15 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/16 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/16 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/17 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/17 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/18 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/18 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/19 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/19 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/20 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/20 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/21 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/21 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/22 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/22 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/23 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/23 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/24 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/24 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/25 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/25 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/26 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/26 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/27 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/27 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/28 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/28 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/29 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/29 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/30 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/30 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/31 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/31 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/32 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/32 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/33 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/33 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/34 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/34 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/35 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/35 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/36 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/36 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/37 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/37 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/38 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/38 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/39 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/39 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/40 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/40 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/41 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/41 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/42 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/42 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/43 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/43 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/44 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/44 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/45 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/45 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/46 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/46 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/47 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/47 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/48 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/48 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/49 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/49 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/50 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/50 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/51 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/51 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/52 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/52 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/53 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/53 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/54 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/54 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/55 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/55 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/56 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/56 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/57 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/57 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/58 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/58 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/59 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/59 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/60 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/60 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/61 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/61 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/62 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/62 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/63 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/63 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/64 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/64 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/65 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/65 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/66 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/66 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/67 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/67 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/68 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/68 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/69 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/69 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/70 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/70 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/71 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/71 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/72 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/72 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/73 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/73 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/74 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/74 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/75 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/75 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/76 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/76 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/77 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/77 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/78 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/78 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/79 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/79 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/80 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/80 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/81 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/81 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/82 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/82 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/83 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/83 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/84 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/84 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/85 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/85 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/86 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/86 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/87 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/87 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/88 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/88 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/89 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/89 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/90 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/90 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/91 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/91 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/92 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/92 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/93 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/93 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/94 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/94 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/95 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/95 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/96 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/96 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/97 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/97 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/98 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/98 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/99 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/99 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/100 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/100 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/101 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/101 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/102 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/102 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/103 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/103 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/104 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/104 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/105 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/105 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/106 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/106 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/107 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/107 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/108 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/108 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/109 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/109 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/110 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/110 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/111 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/111 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/112 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/112 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/113 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/113 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/114 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/114 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/115 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/115 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/116 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/116 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/117 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/117 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/118 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/118 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/119 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/119 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/120 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/120 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/121 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/121 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/122 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/122 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/123 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/123 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/124 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/124 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/125 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/125 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/126 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/126 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/127 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/127 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/128 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/128 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/129 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/129 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/130 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/130 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/131 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/131 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/132 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/132 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/133 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/133 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/134 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/134 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/135 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/135 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/136 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/136 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/137 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/137 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/138 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/138 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/139 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/139 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/140 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/140 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/141 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/141 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/142 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/142 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/143 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/143 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/144 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/144 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/145 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/145 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/146 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/146 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/147 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/147 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/148 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/148 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/149 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/149 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/150 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/150 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/151 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/151 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/152 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/152 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/153 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/153 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/154 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/154 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/155 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/155 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/156 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/156 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/157 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/157 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/158 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/158 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/159 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/159 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/160 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/160 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/161 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/161 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/162 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/162 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/163 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/163 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/164 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/164 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/165 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/165 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/166 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/166 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/167 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/167 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/168 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/168 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/169 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/169 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/170 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/170 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/171 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/171 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/172 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/172 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/173 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/173 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/174 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/174 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/175 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/175 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/176 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/176 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/177 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/177 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/178 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/178 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/179 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/179 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/180 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/180 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/181 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/181 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/182 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/182 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/183 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/183 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/184 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/184 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/185 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/185 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/186 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/186 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/187 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/187 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/188 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/188 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/189 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/189 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/190 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/190 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/191 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/191 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/192 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/192 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/193 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/193 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/194 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/194 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/195 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/195 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/196 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/196 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/197 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/197 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/198 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/198 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/199 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/199 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/200 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/200 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/201 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/201 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/202 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/202 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/203 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/203 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/204 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/204 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/205 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/205 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/206 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/206 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/207 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/207 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/208 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/208 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/209 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/209 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/210 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/210 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/211 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/211 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/212 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/212 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/213 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/213 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/214 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/214 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/215 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/215 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/216 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/216 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/217 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/217 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/218 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/218 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/219 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/219 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/220 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/220 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/221 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/221 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/222 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/222 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/223 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/223 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/224 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/224 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/225 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/225 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/226 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/226 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/227 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/227 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/228 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/228 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/229 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/229 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/230 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/230 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/231 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/231 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/232 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/232 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/233 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/233 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/234 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/234 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/235 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/235 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/236 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/236 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/237 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/237 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/238 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/238 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/239 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/239 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/240 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/240 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/241 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/241 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/242 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/242 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/243 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/243 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/244 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/244 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/245 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/245 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/246 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/246 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/247 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/247 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/248 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/248 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/249 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/249 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/250 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/250 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/251 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/251 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/252 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/252 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/253 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/253 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/254 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/254 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/255 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/255 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/256 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/256 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/257 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/257 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/258 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/258 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/259 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/259 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/260 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/260 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/261 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/261 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/262 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/262 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/263 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/263 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/264 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/264 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/265 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/265 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/266 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/266 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/267 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/267 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/268 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/268 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/269 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/269 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/270 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/270 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/271 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/271 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/272 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/272 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/273 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/273 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/274 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/274 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/275 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/275 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/276 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/276 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/277 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/277 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/278 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/278 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/279 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/279 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/280 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/280 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/281 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/281 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/282 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/282 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/283 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/283 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/284 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/284 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/285 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/285 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/286 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/286 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/287 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/287 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/288 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/288 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/289 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/289 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/290 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/290 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/291 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/291 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/292 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/292 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/293 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/293 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/294 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/294 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/295 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/295 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/296 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/296 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/297 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/297 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/298 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/298 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/299 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/299 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/300 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/300 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/301 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/301 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/302 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/302 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/303 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/303 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/304 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/304 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/305 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/305 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/306 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/306 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/307 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/307 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/308 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/308 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/309 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/309 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/310 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/310 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/311 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/311 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/312 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/312 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/313 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/313 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/314 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/314 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/315 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/315 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/316 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/316 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/317 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/317 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/318 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/318 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/319 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/319 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/320 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/320 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/321 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/321 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/322 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/322 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/323 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/323 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/324 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/324 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/325 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/325 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/326 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/326 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/327 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/327 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/328 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/328 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/329 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/329 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/330 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/330 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/331 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/331 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/332 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/332 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/333 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/333 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/334 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/334 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/335 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/335 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/336 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/336 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/337 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/337 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/338 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/338 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/339 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/339 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/340 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/340 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/341 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/341 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/342 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/342 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/343 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/343 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/344 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/344 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/345 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/345 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/346 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/346 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/347 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/347 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/348 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/348 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/349 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/349 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/350 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/350 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/351 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/351 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/352 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/352 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/353 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/353 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/354 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/354 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/355 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/355 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/356 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/356 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/357 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/357 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/358 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/358 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/359 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/359 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/360 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/360 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/361 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/361 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/362 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/362 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/363 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/363 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/364 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/364 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/365 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/365 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/366 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/366 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/367 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/367 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/368 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/368 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/369 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/369 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/370 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/370 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/371 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/371 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/372 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/372 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/373 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/373 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/374 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/374 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/375 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/375 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/376 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/376 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/377 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/377 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/378 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/378 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/379 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/379 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/380 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/380 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/381 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/381 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/382 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/382 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/383 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/383 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/384 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/384 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/385 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/385 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/386 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/386 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/387 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/387 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/388 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/388 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/389 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/389 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/390 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/390 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/391 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/391 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/392 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/392 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/393 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/393 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/394 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/394 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/395 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/395 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/396 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/396 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/397 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/397 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/398 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/398 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/399 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/399 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/400 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/400 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/401 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/401 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/402 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/402 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/403 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/403 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/404 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/404 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/405 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/405 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/406 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/406 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/407 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/407 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/408 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/408 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/409 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/409 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/410 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/410 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/411 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/411 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/412 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/412 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/413 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/413 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/414 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/414 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/415 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/415 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/416 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/416 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/417 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/417 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/418 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/418 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/419 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/419 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/420 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/420 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/421 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/421 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/422 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/422 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/423 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/423 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/424 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/424 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/425 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/425 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/426 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/426 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/427 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/427 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/428 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/428 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/429 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/429 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/430 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/430 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/431 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/431 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/432 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/432 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/433 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/433 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/434 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/434 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/435 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/435 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/436 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/436 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/437 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/437 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/438 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/438 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/439 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/439 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/440 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/440 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/441 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/441 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/442 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/442 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/443 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/443 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/444 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/444 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/445 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/445 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/446 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/446 (2 ms) [----------] 447 tests from WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest (519 ms total) [----------] 460 tests from WycheproofP256EcdhTest/Pkcs11EcdhTest [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/0 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/0 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/1 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/1 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/2 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/2 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/3 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/3 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/4 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/4 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/5 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/5 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/6 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/6 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/7 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/7 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/8 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/8 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/9 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/9 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/10 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/10 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/11 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/11 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/12 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/12 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/13 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/13 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/14 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/14 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/15 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/15 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/16 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/16 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/17 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/17 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/18 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/18 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/19 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/19 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/20 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/20 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/21 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/21 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/22 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/22 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/23 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/23 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/24 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/24 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/25 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/25 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/26 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/26 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/27 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/27 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/28 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/28 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/29 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/29 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/30 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/30 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/31 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/31 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/32 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/32 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/33 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/33 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/34 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/34 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/35 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/35 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/36 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/36 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/37 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/37 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/38 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/38 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/39 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/39 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/40 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/40 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/41 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/41 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/42 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/42 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/43 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/43 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/44 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/44 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/45 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/45 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/46 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/46 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/47 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/47 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/48 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/48 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/49 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/49 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/50 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/50 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/51 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/51 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/52 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/52 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/53 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/53 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/54 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/54 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/55 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/55 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/56 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/56 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/57 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/57 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/58 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/58 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/59 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/59 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/60 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/60 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/61 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/61 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/62 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/62 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/63 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/63 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/64 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/64 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/65 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/65 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/66 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/66 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/67 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/67 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/68 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/68 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/69 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/69 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/70 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/70 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/71 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/71 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/72 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/72 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/73 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/73 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/74 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/74 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/75 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/75 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/76 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/76 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/77 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/77 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/78 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/78 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/79 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/79 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/80 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/80 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/81 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/81 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/82 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/82 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/83 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/83 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/84 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/84 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/85 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/85 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/86 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/86 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/87 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/87 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/88 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/88 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/89 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/89 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/90 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/90 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/91 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/91 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/92 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/92 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/93 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/93 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/94 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/94 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/95 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/95 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/96 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/96 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/97 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/97 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/98 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/98 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/99 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/99 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/100 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/100 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/101 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/101 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/102 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/102 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/103 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/103 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/104 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/104 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/105 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/105 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/106 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/106 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/107 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/107 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/108 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/108 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/109 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/109 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/110 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/110 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/111 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/111 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/112 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/112 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/113 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/113 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/114 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/114 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/115 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/115 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/116 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/116 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/117 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/117 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/118 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/118 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/119 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/119 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/120 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/120 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/121 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/121 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/122 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/122 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/123 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/123 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/124 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/124 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/125 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/125 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/126 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/126 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/127 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/127 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/128 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/128 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/129 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/129 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/130 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/130 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/131 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/131 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/132 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/132 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/133 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/133 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/134 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/134 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/135 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/135 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/136 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/136 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/137 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/137 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/138 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/138 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/139 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/139 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/140 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/140 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/141 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/141 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/142 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/142 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/143 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/143 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/144 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/144 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/145 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/145 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/146 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/146 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/147 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/147 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/148 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/148 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/149 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/149 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/150 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/150 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/151 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/151 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/152 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/152 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/153 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/153 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/154 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/154 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/155 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/155 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/156 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/156 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/157 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/157 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/158 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/158 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/159 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/159 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/160 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/160 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/161 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/161 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/162 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/162 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/163 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/163 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/164 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/164 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/165 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/165 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/166 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/166 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/167 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/167 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/168 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/168 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/169 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/169 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/170 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/170 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/171 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/171 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/172 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/172 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/173 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/173 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/174 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/174 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/175 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/175 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/176 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/176 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/177 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/177 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/178 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/178 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/179 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/179 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/180 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/180 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/181 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/181 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/182 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/182 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/183 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/183 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/184 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/184 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/185 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/185 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/186 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/186 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/187 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/187 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/188 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/188 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/189 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/189 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/190 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/190 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/191 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/191 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/192 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/192 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/193 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/193 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/194 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/194 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/195 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/195 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/196 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/196 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/197 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/197 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/198 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/198 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/199 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/199 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/200 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/200 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/201 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/201 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/202 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/202 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/203 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/203 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/204 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/204 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/205 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/205 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/206 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/206 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/207 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/207 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/208 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/208 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/209 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/209 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/210 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/210 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/211 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/211 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/212 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/212 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/213 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/213 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/214 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/214 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/215 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/215 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/216 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/216 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/217 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/217 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/218 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/218 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/219 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/219 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/220 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/220 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/221 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/221 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/222 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/222 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/223 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/223 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/224 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/224 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/225 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/225 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/226 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/226 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/227 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/227 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/228 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/228 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/229 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/229 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/230 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/230 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/231 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/231 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/232 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/232 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/233 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/233 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/234 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/234 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/235 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/235 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/236 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/236 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/237 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/237 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/238 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/238 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/239 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/239 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/240 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/240 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/241 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/241 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/242 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/242 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/243 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/243 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/244 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/244 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/245 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/245 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/246 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/246 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/247 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/247 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/248 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/248 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/249 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/249 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/250 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/250 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/251 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/251 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/252 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/252 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/253 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/253 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/254 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/254 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/255 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/255 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/256 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/256 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/257 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/257 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/258 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/258 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/259 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/259 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/260 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/260 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/261 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/261 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/262 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/262 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/263 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/263 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/264 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/264 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/265 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/265 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/266 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/266 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/267 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/267 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/268 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/268 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/269 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/269 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/270 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/270 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/271 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/271 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/272 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/272 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/273 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/273 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/274 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/274 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/275 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/275 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/276 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/276 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/277 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/277 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/278 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/278 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/279 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/279 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/280 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/280 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/281 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/281 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/282 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/282 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/283 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/283 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/284 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/284 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/285 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/285 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/286 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/286 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/287 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/287 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/288 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/288 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/289 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/289 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/290 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/290 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/291 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/291 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/292 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/292 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/293 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/293 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/294 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/294 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/295 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/295 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/296 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/296 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/297 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/297 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/298 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/298 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/299 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/299 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/300 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/300 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/301 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/301 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/302 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/302 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/303 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/303 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/304 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/304 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/305 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/305 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/306 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/306 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/307 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/307 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/308 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/308 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/309 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/309 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/310 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/310 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/311 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/311 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/312 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/312 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/313 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/313 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/314 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/314 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/315 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/315 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/316 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/316 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/317 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/317 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/318 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/318 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/319 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/319 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/320 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/320 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/321 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/321 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/322 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/322 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/323 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/323 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/324 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/324 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/325 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/325 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/326 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/326 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/327 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/327 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/328 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/328 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/329 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/329 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/330 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/330 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/331 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/331 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/332 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/332 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/333 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/333 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/334 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/334 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/335 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/335 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/336 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/336 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/337 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/337 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/338 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/338 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/339 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/339 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/340 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/340 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/341 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/341 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/342 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/342 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/343 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/343 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/344 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/344 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/345 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/345 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/346 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/346 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/347 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/347 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/348 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/348 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/349 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/349 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/350 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/350 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/351 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/351 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/352 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/352 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/353 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/353 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/354 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/354 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/355 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/355 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/356 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/356 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/357 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/357 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/358 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/358 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/359 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/359 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/360 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/360 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/361 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/361 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/362 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/362 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/363 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/363 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/364 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/364 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/365 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/365 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/366 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/366 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/367 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/367 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/368 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/368 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/369 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/369 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/370 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/370 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/371 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/371 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/372 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/372 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/373 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/373 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/374 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/374 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/375 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/375 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/376 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/376 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/377 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/377 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/378 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/378 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/379 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/379 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/380 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/380 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/381 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/381 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/382 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/382 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/383 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/383 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/384 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/384 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/385 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/385 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/386 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/386 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/387 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/387 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/388 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/388 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/389 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/389 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/390 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/390 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/391 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/391 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/392 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/392 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/393 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/393 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/394 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/394 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/395 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/395 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/396 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/396 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/397 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/397 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/398 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/398 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/399 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/399 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/400 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/400 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/401 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/401 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/402 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/402 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/403 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/403 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/404 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/404 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/405 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/405 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/406 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/406 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/407 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/407 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/408 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/408 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/409 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/409 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/410 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/410 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/411 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/411 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/412 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/412 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/413 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/413 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/414 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/414 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/415 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/415 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/416 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/416 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/417 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/417 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/418 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/418 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/419 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/419 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/420 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/420 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/421 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/421 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/422 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/422 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/423 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/423 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/424 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/424 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/425 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/425 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/426 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/426 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/427 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/427 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/428 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/428 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/429 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/429 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/430 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/430 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/431 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/431 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/432 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/432 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/433 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/433 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/434 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/434 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/435 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/435 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/436 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/436 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/437 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/437 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/438 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/438 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/439 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/439 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/440 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/440 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/441 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/441 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/442 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/442 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/443 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/443 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/444 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/444 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/445 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/445 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/446 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/446 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/447 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/447 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/448 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/448 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/449 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/449 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/450 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/450 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/451 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/451 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/452 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/452 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/453 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/453 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/454 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/454 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/455 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/455 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/456 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/456 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/457 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/457 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/458 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/458 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/459 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/459 (0 ms) [----------] 460 tests from WycheproofP256EcdhTest/Pkcs11EcdhTest (196 ms total) [----------] 427 tests from WycheproofP384EcdhTest/Pkcs11EcdhTest [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/0 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/0 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/1 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/1 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/2 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/2 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/3 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/3 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/4 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/4 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/5 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/5 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/6 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/6 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/7 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/7 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/8 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/8 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/9 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/9 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/10 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/10 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/11 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/11 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/12 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/12 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/13 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/13 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/14 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/14 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/15 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/15 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/16 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/16 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/17 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/17 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/18 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/18 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/19 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/19 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/20 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/20 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/21 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/21 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/22 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/22 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/23 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/23 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/24 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/24 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/25 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/25 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/26 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/26 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/27 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/27 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/28 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/28 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/29 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/29 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/30 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/30 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/31 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/31 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/32 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/32 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/33 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/33 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/34 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/34 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/35 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/35 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/36 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/36 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/37 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/37 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/38 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/38 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/39 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/39 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/40 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/40 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/41 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/41 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/42 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/42 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/43 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/43 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/44 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/44 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/45 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/45 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/46 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/46 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/47 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/47 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/48 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/48 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/49 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/49 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/50 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/50 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/51 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/51 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/52 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/52 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/53 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/53 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/54 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/54 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/55 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/55 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/56 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/56 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/57 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/57 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/58 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/58 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/59 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/59 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/60 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/60 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/61 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/61 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/62 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/62 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/63 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/63 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/64 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/64 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/65 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/65 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/66 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/66 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/67 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/67 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/68 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/68 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/69 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/69 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/70 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/70 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/71 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/71 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/72 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/72 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/73 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/73 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/74 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/74 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/75 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/75 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/76 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/76 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/77 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/77 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/78 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/78 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/79 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/79 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/80 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/80 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/81 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/81 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/82 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/82 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/83 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/83 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/84 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/84 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/85 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/85 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/86 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/86 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/87 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/87 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/88 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/88 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/89 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/89 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/90 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/90 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/91 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/91 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/92 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/92 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/93 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/93 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/94 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/94 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/95 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/95 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/96 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/96 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/97 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/97 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/98 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/98 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/99 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/99 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/100 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/100 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/101 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/101 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/102 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/102 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/103 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/103 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/104 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/104 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/105 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/105 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/106 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/106 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/107 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/107 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/108 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/108 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/109 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/109 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/110 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/110 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/111 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/111 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/112 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/112 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/113 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/113 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/114 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/114 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/115 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/115 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/116 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/116 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/117 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/117 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/118 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/118 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/119 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/119 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/120 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/120 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/121 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/121 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/122 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/122 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/123 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/123 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/124 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/124 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/125 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/125 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/126 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/126 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/127 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/127 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/128 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/128 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/129 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/129 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/130 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/130 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/131 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/131 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/132 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/132 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/133 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/133 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/134 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/134 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/135 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/135 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/136 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/136 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/137 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/137 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/138 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/138 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/139 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/139 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/140 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/140 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/141 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/141 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/142 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/142 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/143 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/143 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/144 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/144 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/145 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/145 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/146 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/146 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/147 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/147 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/148 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/148 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/149 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/149 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/150 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/150 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/151 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/151 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/152 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/152 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/153 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/153 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/154 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/154 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/155 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/155 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/156 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/156 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/157 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/157 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/158 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/158 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/159 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/159 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/160 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/160 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/161 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/161 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/162 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/162 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/163 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/163 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/164 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/164 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/165 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/165 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/166 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/166 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/167 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/167 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/168 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/168 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/169 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/169 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/170 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/170 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/171 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/171 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/172 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/172 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/173 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/173 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/174 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/174 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/175 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/175 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/176 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/176 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/177 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/177 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/178 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/178 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/179 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/179 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/180 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/180 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/181 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/181 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/182 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/182 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/183 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/183 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/184 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/184 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/185 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/185 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/186 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/186 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/187 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/187 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/188 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/188 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/189 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/189 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/190 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/190 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/191 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/191 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/192 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/192 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/193 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/193 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/194 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/194 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/195 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/195 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/196 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/196 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/197 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/197 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/198 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/198 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/199 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/199 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/200 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/200 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/201 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/201 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/202 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/202 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/203 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/203 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/204 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/204 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/205 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/205 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/206 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/206 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/207 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/207 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/208 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/208 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/209 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/209 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/210 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/210 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/211 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/211 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/212 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/212 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/213 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/213 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/214 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/214 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/215 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/215 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/216 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/216 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/217 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/217 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/218 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/218 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/219 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/219 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/220 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/220 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/221 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/221 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/222 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/222 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/223 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/223 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/224 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/224 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/225 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/225 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/226 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/226 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/227 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/227 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/228 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/228 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/229 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/229 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/230 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/230 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/231 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/231 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/232 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/232 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/233 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/233 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/234 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/234 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/235 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/235 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/236 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/236 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/237 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/237 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/238 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/238 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/239 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/239 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/240 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/240 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/241 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/241 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/242 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/242 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/243 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/243 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/244 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/244 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/245 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/245 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/246 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/246 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/247 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/247 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/248 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/248 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/249 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/249 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/250 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/250 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/251 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/251 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/252 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/252 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/253 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/253 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/254 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/254 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/255 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/255 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/256 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/256 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/257 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/257 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/258 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/258 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/259 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/259 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/260 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/260 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/261 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/261 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/262 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/262 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/263 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/263 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/264 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/264 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/265 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/265 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/266 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/266 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/267 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/267 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/268 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/268 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/269 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/269 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/270 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/270 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/271 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/271 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/272 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/272 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/273 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/273 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/274 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/274 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/275 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/275 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/276 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/276 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/277 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/277 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/278 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/278 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/279 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/279 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/280 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/280 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/281 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/281 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/282 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/282 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/283 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/283 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/284 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/284 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/285 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/285 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/286 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/286 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/287 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/287 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/288 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/288 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/289 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/289 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/290 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/290 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/291 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/291 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/292 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/292 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/293 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/293 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/294 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/294 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/295 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/295 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/296 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/296 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/297 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/297 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/298 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/298 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/299 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/299 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/300 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/300 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/301 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/301 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/302 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/302 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/303 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/303 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/304 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/304 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/305 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/305 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/306 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/306 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/307 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/307 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/308 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/308 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/309 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/309 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/310 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/310 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/311 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/311 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/312 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/312 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/313 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/313 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/314 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/314 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/315 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/315 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/316 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/316 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/317 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/317 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/318 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/318 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/319 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/319 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/320 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/320 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/321 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/321 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/322 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/322 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/323 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/323 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/324 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/324 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/325 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/325 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/326 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/326 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/327 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/327 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/328 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/328 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/329 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/329 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/330 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/330 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/331 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/331 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/332 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/332 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/333 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/333 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/334 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/334 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/335 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/335 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/336 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/336 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/337 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/337 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/338 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/338 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/339 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/339 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/340 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/340 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/341 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/341 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/342 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/342 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/343 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/343 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/344 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/344 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/345 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/345 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/346 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/346 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/347 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/347 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/348 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/348 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/349 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/349 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/350 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/350 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/351 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/351 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/352 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/352 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/353 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/353 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/354 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/354 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/355 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/355 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/356 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/356 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/357 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/357 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/358 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/358 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/359 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/359 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/360 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/360 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/361 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/361 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/362 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/362 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/363 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/363 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/364 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/364 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/365 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/365 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/366 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/366 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/367 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/367 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/368 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/368 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/369 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/369 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/370 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/370 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/371 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/371 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/372 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/372 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/373 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/373 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/374 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/374 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/375 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/375 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/376 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/376 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/377 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/377 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/378 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/378 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/379 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/379 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/380 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/380 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/381 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/381 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/382 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/382 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/383 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/383 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/384 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/384 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/385 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/385 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/386 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/386 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/387 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/387 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/388 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/388 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/389 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/389 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/390 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/390 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/391 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/391 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/392 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/392 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/393 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/393 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/394 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/394 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/395 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/395 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/396 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/396 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/397 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/397 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/398 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/398 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/399 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/399 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/400 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/400 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/401 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/401 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/402 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/402 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/403 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/403 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/404 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/404 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/405 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/405 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/406 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/406 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/407 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/407 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/408 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/408 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/409 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/409 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/410 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/410 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/411 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/411 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/412 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/412 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/413 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/413 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/414 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/414 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/415 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/415 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/416 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/416 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/417 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/417 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/418 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/418 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/419 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/419 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/420 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/420 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/421 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/421 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/422 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/422 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/423 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/423 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/424 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/424 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/425 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/425 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/426 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/426 (0 ms) [----------] 427 tests from WycheproofP384EcdhTest/Pkcs11EcdhTest (482 ms total) [----------] 480 tests from WycheproofP521EcdhTest/Pkcs11EcdhTest [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/0 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/0 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/1 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/1 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/2 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/2 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/3 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/3 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/4 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/4 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/5 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/5 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/6 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/6 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/7 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/7 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/8 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/8 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/9 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/9 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/10 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/10 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/11 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/11 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/12 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/12 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/13 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/13 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/14 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/14 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/15 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/15 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/16 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/16 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/17 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/17 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/18 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/18 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/19 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/19 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/20 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/20 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/21 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/21 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/22 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/22 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/23 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/23 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/24 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/24 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/25 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/25 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/26 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/26 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/27 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/27 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/28 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/28 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/29 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/29 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/30 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/30 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/31 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/31 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/32 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/32 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/33 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/33 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/34 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/34 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/35 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/35 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/36 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/36 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/37 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/37 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/38 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/38 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/39 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/39 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/40 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/40 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/41 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/41 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/42 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/42 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/43 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/43 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/44 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/44 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/45 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/45 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/46 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/46 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/47 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/47 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/48 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/48 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/49 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/49 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/50 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/50 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/51 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/51 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/52 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/52 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/53 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/53 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/54 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/54 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/55 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/55 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/56 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/56 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/57 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/57 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/58 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/58 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/59 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/59 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/60 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/60 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/61 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/61 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/62 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/62 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/63 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/63 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/64 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/64 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/65 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/65 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/66 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/66 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/67 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/67 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/68 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/68 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/69 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/69 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/70 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/70 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/71 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/71 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/72 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/72 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/73 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/73 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/74 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/74 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/75 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/75 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/76 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/76 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/77 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/77 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/78 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/78 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/79 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/79 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/80 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/80 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/81 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/81 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/82 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/82 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/83 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/83 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/84 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/84 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/85 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/85 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/86 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/86 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/87 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/87 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/88 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/88 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/89 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/89 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/90 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/90 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/91 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/91 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/92 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/92 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/93 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/93 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/94 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/94 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/95 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/95 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/96 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/96 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/97 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/97 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/98 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/98 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/99 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/99 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/100 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/100 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/101 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/101 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/102 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/102 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/103 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/103 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/104 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/104 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/105 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/105 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/106 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/106 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/107 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/107 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/108 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/108 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/109 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/109 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/110 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/110 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/111 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/111 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/112 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/112 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/113 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/113 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/114 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/114 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/115 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/115 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/116 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/116 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/117 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/117 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/118 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/118 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/119 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/119 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/120 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/120 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/121 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/121 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/122 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/122 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/123 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/123 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/124 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/124 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/125 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/125 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/126 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/126 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/127 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/127 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/128 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/128 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/129 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/129 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/130 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/130 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/131 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/131 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/132 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/132 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/133 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/133 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/134 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/134 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/135 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/135 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/136 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/136 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/137 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/137 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/138 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/138 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/139 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/139 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/140 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/140 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/141 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/141 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/142 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/142 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/143 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/143 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/144 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/144 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/145 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/145 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/146 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/146 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/147 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/147 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/148 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/148 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/149 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/149 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/150 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/150 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/151 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/151 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/152 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/152 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/153 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/153 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/154 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/154 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/155 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/155 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/156 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/156 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/157 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/157 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/158 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/158 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/159 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/159 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/160 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/160 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/161 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/161 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/162 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/162 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/163 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/163 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/164 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/164 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/165 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/165 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/166 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/166 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/167 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/167 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/168 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/168 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/169 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/169 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/170 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/170 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/171 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/171 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/172 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/172 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/173 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/173 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/174 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/174 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/175 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/175 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/176 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/176 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/177 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/177 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/178 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/178 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/179 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/179 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/180 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/180 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/181 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/181 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/182 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/182 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/183 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/183 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/184 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/184 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/185 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/185 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/186 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/186 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/187 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/187 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/188 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/188 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/189 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/189 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/190 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/190 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/191 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/191 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/192 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/192 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/193 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/193 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/194 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/194 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/195 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/195 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/196 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/196 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/197 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/197 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/198 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/198 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/199 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/199 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/200 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/200 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/201 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/201 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/202 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/202 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/203 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/203 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/204 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/204 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/205 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/205 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/206 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/206 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/207 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/207 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/208 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/208 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/209 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/209 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/210 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/210 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/211 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/211 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/212 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/212 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/213 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/213 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/214 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/214 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/215 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/215 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/216 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/216 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/217 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/217 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/218 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/218 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/219 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/219 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/220 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/220 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/221 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/221 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/222 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/222 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/223 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/223 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/224 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/224 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/225 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/225 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/226 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/226 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/227 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/227 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/228 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/228 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/229 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/229 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/230 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/230 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/231 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/231 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/232 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/232 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/233 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/233 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/234 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/234 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/235 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/235 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/236 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/236 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/237 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/237 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/238 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/238 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/239 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/239 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/240 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/240 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/241 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/241 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/242 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/242 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/243 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/243 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/244 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/244 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/245 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/245 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/246 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/246 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/247 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/247 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/248 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/248 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/249 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/249 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/250 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/250 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/251 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/251 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/252 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/252 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/253 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/253 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/254 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/254 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/255 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/255 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/256 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/256 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/257 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/257 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/258 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/258 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/259 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/259 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/260 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/260 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/261 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/261 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/262 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/262 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/263 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/263 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/264 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/264 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/265 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/265 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/266 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/266 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/267 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/267 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/268 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/268 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/269 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/269 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/270 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/270 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/271 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/271 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/272 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/272 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/273 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/273 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/274 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/274 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/275 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/275 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/276 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/276 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/277 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/277 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/278 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/278 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/279 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/279 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/280 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/280 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/281 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/281 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/282 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/282 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/283 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/283 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/284 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/284 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/285 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/285 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/286 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/286 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/287 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/287 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/288 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/288 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/289 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/289 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/290 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/290 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/291 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/291 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/292 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/292 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/293 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/293 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/294 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/294 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/295 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/295 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/296 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/296 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/297 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/297 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/298 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/298 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/299 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/299 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/300 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/300 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/301 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/301 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/302 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/302 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/303 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/303 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/304 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/304 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/305 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/305 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/306 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/306 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/307 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/307 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/308 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/308 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/309 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/309 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/310 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/310 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/311 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/311 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/312 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/312 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/313 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/313 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/314 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/314 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/315 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/315 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/316 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/316 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/317 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/317 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/318 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/318 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/319 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/319 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/320 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/320 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/321 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/321 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/322 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/322 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/323 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/323 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/324 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/324 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/325 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/325 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/326 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/326 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/327 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/327 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/328 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/328 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/329 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/329 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/330 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/330 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/331 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/331 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/332 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/332 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/333 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/333 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/334 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/334 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/335 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/335 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/336 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/336 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/337 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/337 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/338 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/338 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/339 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/339 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/340 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/340 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/341 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/341 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/342 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/342 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/343 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/343 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/344 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/344 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/345 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/345 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/346 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/346 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/347 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/347 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/348 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/348 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/349 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/349 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/350 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/350 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/351 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/351 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/352 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/352 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/353 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/353 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/354 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/354 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/355 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/355 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/356 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/356 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/357 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/357 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/358 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/358 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/359 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/359 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/360 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/360 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/361 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/361 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/362 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/362 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/363 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/363 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/364 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/364 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/365 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/365 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/366 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/366 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/367 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/367 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/368 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/368 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/369 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/369 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/370 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/370 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/371 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/371 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/372 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/372 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/373 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/373 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/374 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/374 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/375 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/375 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/376 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/376 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/377 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/377 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/378 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/378 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/379 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/379 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/380 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/380 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/381 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/381 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/382 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/382 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/383 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/383 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/384 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/384 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/385 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/385 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/386 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/386 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/387 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/387 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/388 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/388 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/389 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/389 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/390 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/390 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/391 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/391 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/392 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/392 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/393 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/393 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/394 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/394 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/395 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/395 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/396 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/396 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/397 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/397 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/398 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/398 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/399 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/399 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/400 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/400 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/401 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/401 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/402 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/402 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/403 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/403 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/404 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/404 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/405 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/405 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/406 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/406 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/407 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/407 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/408 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/408 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/409 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/409 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/410 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/410 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/411 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/411 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/412 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/412 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/413 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/413 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/414 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/414 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/415 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/415 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/416 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/416 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/417 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/417 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/418 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/418 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/419 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/419 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/420 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/420 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/421 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/421 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/422 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/422 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/423 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/423 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/424 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/424 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/425 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/425 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/426 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/426 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/427 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/427 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/428 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/428 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/429 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/429 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/430 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/430 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/431 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/431 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/432 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/432 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/433 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/433 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/434 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/434 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/435 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/435 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/436 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/436 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/437 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/437 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/438 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/438 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/439 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/439 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/440 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/440 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/441 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/441 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/442 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/442 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/443 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/443 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/444 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/444 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/445 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/445 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/446 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/446 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/447 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/447 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/448 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/448 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/449 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/449 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/450 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/450 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/451 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/451 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/452 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/452 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/453 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/453 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/454 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/454 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/455 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/455 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/456 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/456 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/457 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/457 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/458 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/458 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/459 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/459 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/460 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/460 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/461 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/461 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/462 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/462 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/463 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/463 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/464 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/464 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/465 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/465 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/466 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/466 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/467 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/467 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/468 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/468 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/469 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/469 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/470 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/470 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/471 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/471 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/472 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/472 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/473 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/473 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/474 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/474 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/475 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/475 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/476 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/476 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/477 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/477 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/478 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/478 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/479 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/479 (0 ms) [----------] 480 tests from WycheproofP521EcdhTest/Pkcs11EcdhTest (377 ms total) [----------] 9 tests from EncryptDeriveTests/EncryptDeriveTest [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/0 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/0 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/1 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/1 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/2 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/2 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/3 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/3 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/4 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/4 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/5 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/5 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/6 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/6 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/7 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/7 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/8 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/8 (0 ms) [----------] 9 tests from EncryptDeriveTests/EncryptDeriveTest (0 ms total) [----------] 2 tests from Encrypt3DeriveTests/EncryptDerive3Test [ RUN ] Encrypt3DeriveTests/EncryptDerive3Test.Test/0 [ OK ] Encrypt3DeriveTests/EncryptDerive3Test.Test/0 (0 ms) [ RUN ] Encrypt3DeriveTests/EncryptDerive3Test.Test/1 [ OK ] Encrypt3DeriveTests/EncryptDerive3Test.Test/1 (0 ms) [----------] 2 tests from Encrypt3DeriveTests/EncryptDerive3Test (0 ms total) [----------] 636 tests from HkdfSha1/Pkcs11HkdfTest [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/13 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/63 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/110 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/120 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/121 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/122 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/123 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/124 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/125 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/144 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/147 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/265 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/312 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/318 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/319 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/320 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/321 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/322 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/323 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/346 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/357 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/362 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/367 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/417 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/466 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/513 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/516 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/517 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/518 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/519 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/520 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/521 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/558 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/561 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/570 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/612 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/612 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/613 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/613 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/614 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/614 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/615 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/615 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/616 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/616 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/617 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/617 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/618 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/618 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/619 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/619 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/620 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/620 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/621 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/621 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/622 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/622 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/623 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/623 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/624 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/624 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/625 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/625 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/626 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/626 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/627 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/627 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/628 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/628 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/629 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/629 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/630 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/630 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/631 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/631 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/632 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/632 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/633 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/633 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/634 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/634 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/635 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/635 (0 ms) [----------] 636 tests from HkdfSha1/Pkcs11HkdfTest (19 ms total) [----------] 630 tests from HkdfSha256/Pkcs11HkdfTest [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/25 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/71 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/116 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/120 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/121 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/122 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/123 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/124 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/125 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/138 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/140 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/142 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/145 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/193 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/240 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/285 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/318 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/319 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/320 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/321 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/322 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/323 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/328 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/337 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/339 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/340 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/346 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/361 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/453 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/497 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/516 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/517 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/518 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/519 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/520 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/521 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/539 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/553 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/554 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/556 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/570 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/612 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/612 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/613 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/613 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/614 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/614 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/615 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/615 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/616 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/616 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/617 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/617 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/618 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/618 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/619 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/619 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/620 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/620 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/621 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/621 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/622 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/622 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/623 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/623 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/624 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/624 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/625 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/625 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/626 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/626 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/627 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/627 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/628 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/628 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/629 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/629 (0 ms) [----------] 630 tests from HkdfSha256/Pkcs11HkdfTest (24 ms total) [----------] 612 tests from HkdfSha384/Pkcs11HkdfTest [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/30 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/73 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/115 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/120 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/121 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/122 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/123 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/124 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/125 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/166 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/210 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/254 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/296 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/318 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/319 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/320 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/321 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/322 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/323 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/346 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/389 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/432 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/475 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/516 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/517 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/518 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/519 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/520 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/521 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/522 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/567 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/570 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/607 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [----------] 612 tests from HkdfSha384/Pkcs11HkdfTest (29 ms total) [----------] 612 tests from HkdfSha512/Pkcs11HkdfTest [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/37 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/82 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/120 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/121 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/122 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/123 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/124 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/125 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/148 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/191 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/236 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/280 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/318 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/319 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/320 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/321 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/322 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/323 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/346 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/389 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/433 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/516 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/517 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/518 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/519 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/520 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/521 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/570 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/583 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [----------] 612 tests from HkdfSha512/Pkcs11HkdfTest (30 ms total) [----------] 174 tests from HmacSha256/Pkcs11HmacTest [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/11 (1 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/83 (1 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/157 (1 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha256/Pkcs11HmacTest (3 ms total) [----------] 174 tests from HmacSha384/Pkcs11HmacTest [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/49 (1 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha384/Pkcs11HmacTest (2 ms total) [----------] 174 tests from HmacSha512/Pkcs11HmacTest [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/9 (1 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/136 (1 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha512/Pkcs11HmacTest (3 ms total) [----------] 12 tests from Pk11Hpke/TestVectors [ RUN ] Pk11Hpke/TestVectors.TestVectors/0 [ OK ] Pk11Hpke/TestVectors.TestVectors/0 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/1 [ OK ] Pk11Hpke/TestVectors.TestVectors/1 (1 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/2 [ OK ] Pk11Hpke/TestVectors.TestVectors/2 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/3 [ OK ] Pk11Hpke/TestVectors.TestVectors/3 (1 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/4 [ OK ] Pk11Hpke/TestVectors.TestVectors/4 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/5 [ OK ] Pk11Hpke/TestVectors.TestVectors/5 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/6 [ OK ] Pk11Hpke/TestVectors.TestVectors/6 (1 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/7 [ OK ] Pk11Hpke/TestVectors.TestVectors/7 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/8 [ OK ] Pk11Hpke/TestVectors.TestVectors/8 (1 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/9 [ OK ] Pk11Hpke/TestVectors.TestVectors/9 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/10 [ OK ] Pk11Hpke/TestVectors.TestVectors/10 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/11 [ OK ] Pk11Hpke/TestVectors.TestVectors/11 (2 ms) [----------] 12 tests from Pk11Hpke/TestVectors (20 ms total) [----------] 72 tests from Pk11Hpke/ModeParameterizedTest [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/1 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/4 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/7 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/10 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/2 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/5 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/9 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/0 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/4 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/7 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/11 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/2 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/5 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/8 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/11 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/2 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/5 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/8 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/0 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/0 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/1 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/2 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/3 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/3 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/4 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/5 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/6 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/6 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/7 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/8 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/9 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/9 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/10 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/11 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/11 (1 ms) [----------] 72 tests from Pk11Hpke/ModeParameterizedTest (50 ms total) [----------] 16 tests from IkeSha1/Pkcs11IkeTest [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha1/Pkcs11IkeTest (0 ms total) [----------] 16 tests from IkeSha256/Pkcs11IkeTest [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha256/Pkcs11IkeTest (0 ms total) [----------] 16 tests from IkeSha384/Pkcs11IkeTest [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/2 (1 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha384/Pkcs11IkeTest (1 ms total) [----------] 16 tests from IkeSha512/Pkcs11IkeTest [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha512/Pkcs11IkeTest (0 ms total) [----------] 16 tests from IkeAESXCBC/Pkcs11IkeTest [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/13 (1 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeAESXCBC/Pkcs11IkeTest (1 ms total) [----------] 3 tests from Pk11KeyImportTest/Pk11KeyImportTest [ RUN ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/0 Generate RSA pair [ OK ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/0 (22 ms) [ RUN ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/1 Generate DSA pair [ OK ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/1 (625 ms) [ RUN ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/2 Generate DH pair [ OK ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/2 (173 ms) [----------] 3 tests from Pk11KeyImportTest/Pk11KeyImportTest (820 ms total) [----------] 4 tests from Pk11KeyImportTestEC/Pk11KeyImportTestEC [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/0 Generate EC pair on 208 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/0 (5 ms) [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/1 Generate EC pair on 220 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/1 (10 ms) [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/2 Generate EC pair on 221 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/2 (8 ms) [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/3 Generate EC pair on 355 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/3 (2 ms) [----------] 4 tests from Pk11KeyImportTestEC/Pk11KeyImportTestEC (25 ms total) [----------] 4 tests from Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/0 Generate EC pair on 208 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/0 (3 ms) [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/1 Generate EC pair on 220 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/1 (6 ms) [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/2 Generate EC pair on 221 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/2 (4 ms) [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/3 Generate EC pair on 355 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/3 (1 ms) [----------] 4 tests from Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest (14 ms total) [----------] 89 tests from WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 (1 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 (0 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 (1 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 (0 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/65 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/65 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/66 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/66 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/67 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/67 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/68 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/68 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/69 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/69 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/70 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/70 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/71 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/71 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/72 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/72 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/73 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/73 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/74 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/74 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/75 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/75 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/76 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/76 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/77 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/77 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/78 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/78 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/79 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/79 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/80 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/80 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/81 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/81 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/82 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/82 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/83 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/83 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/84 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/84 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/85 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/85 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/86 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/86 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/87 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/87 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/88 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/88 (3 ms) [----------] 89 tests from WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest (342 ms total) [----------] 79 tests from WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 (9 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 (6 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 (2 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 (1 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 (1 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 (1 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 (13 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 (15 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 (13 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/65 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/65 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/66 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/66 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/67 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/67 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/68 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/68 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/69 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/69 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/70 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/70 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/71 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/71 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/72 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/72 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/73 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/73 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/74 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/74 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/75 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/75 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/76 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/76 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/77 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/77 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/78 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/78 (8 ms) [----------] 79 tests from WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest (799 ms total) [----------] 65 tests from WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 (11 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 (2 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 (2 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 (1 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 (2 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 (26 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 (24 ms) [----------] 65 tests from WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest (1234 ms total) [----------] 34 tests from WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/0 (6 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/4 (2 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/15 (2 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/26 (0 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/29 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/29 (1 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/30 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/30 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/31 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/31 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/32 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/32 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/33 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/33 (3 ms) [----------] 34 tests from WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest (90 ms total) [----------] 29 tests from WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 (5 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 (0 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [----------] 29 tests from WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest (76 ms total) [----------] 35 tests from WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/0 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/7 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/17 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/26 (0 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/29 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/29 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/30 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/30 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/31 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/31 (5 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/32 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/32 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/33 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/33 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/34 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/34 (3 ms) [----------] 35 tests from WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest (92 ms total) [----------] 29 tests from WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 (6 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 (0 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 (1 ms) [----------] 29 tests from WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest (78 ms total) [----------] 32 tests from WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/0 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/1 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/13 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/25 (0 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/26 (1 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/29 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/29 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/30 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/30 (6 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/31 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/31 (3 ms) [----------] 32 tests from WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest (86 ms total) [----------] 29 tests from WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 (5 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 (0 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 (1 ms) [----------] 29 tests from WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest (77 ms total) [----------] 31 tests from WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/0 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/3 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/14 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/25 (0 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/26 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/29 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/29 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/30 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/30 (3 ms) [----------] 31 tests from WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest (78 ms total) [----------] 241 tests from Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/240 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/240 (0 ms) [----------] 241 tests from Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest (32 ms total) [----------] 240 tests from Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (0 ms) [----------] 240 tests from Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest (32 ms total) [----------] 240 tests from Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (0 ms) [----------] 240 tests from Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest (32 ms total) [----------] 239 tests from Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [----------] 239 tests from Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest (60 ms total) [----------] 239 tests from Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (1 ms) [----------] 239 tests from Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest (63 ms total) [----------] 240 tests from Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (0 ms) [----------] 240 tests from Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest (63 ms total) [----------] 239 tests from Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [----------] 239 tests from Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest (97 ms total) [----------] 239 tests from Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (1 ms) [----------] 239 tests from Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest (101 ms total) [----------] 377 tests from WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/240 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/240 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/241 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/241 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/242 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/242 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/243 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/243 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/244 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/244 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/245 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/245 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/246 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/246 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/247 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/247 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/248 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/248 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/249 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/249 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/250 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/250 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/251 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/251 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/252 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/252 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/253 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/253 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/254 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/254 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/255 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/255 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/256 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/256 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/257 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/257 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/258 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/258 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/259 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/259 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/260 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/260 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/261 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/261 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/262 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/262 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/263 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/263 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/264 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/264 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/265 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/265 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/266 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/266 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/267 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/267 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/268 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/268 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/269 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/269 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/270 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/270 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/271 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/271 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/272 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/272 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/273 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/273 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/274 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/274 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/275 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/275 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/276 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/276 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/277 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/277 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/278 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/278 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/279 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/279 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/280 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/280 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/281 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/281 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/282 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/282 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/283 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/283 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/284 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/284 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/285 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/285 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/286 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/286 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/287 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/287 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/288 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/288 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/289 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/289 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/290 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/290 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/291 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/291 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/292 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/292 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/293 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/293 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/294 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/294 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/295 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/295 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/296 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/296 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/297 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/297 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/298 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/298 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/299 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/299 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/300 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/300 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/301 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/301 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/302 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/302 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/303 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/303 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/304 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/304 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/305 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/305 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/306 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/306 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/307 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/307 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/308 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/308 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/309 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/309 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/310 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/310 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/311 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/311 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/312 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/312 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/313 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/313 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/314 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/314 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/315 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/315 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/316 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/316 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/317 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/317 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/318 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/318 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/319 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/319 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/320 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/320 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/321 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/321 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/322 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/322 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/323 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/323 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/324 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/324 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/325 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/325 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/326 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/326 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/327 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/327 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/328 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/328 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/329 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/329 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/330 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/330 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/331 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/331 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/332 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/332 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/333 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/333 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/334 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/334 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/335 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/335 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/336 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/336 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/337 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/337 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/338 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/338 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/339 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/339 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/340 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/340 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/341 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/341 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/342 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/342 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/343 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/343 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/344 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/344 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/345 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/345 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/346 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/346 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/347 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/347 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/348 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/348 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/349 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/349 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/350 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/350 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/351 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/351 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/352 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/352 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/353 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/353 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/354 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/354 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/355 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/355 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/356 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/356 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/357 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/357 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/358 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/358 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/359 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/359 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/360 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/360 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/361 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/361 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/362 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/362 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/363 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/363 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/364 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/364 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/365 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/365 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/366 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/366 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/367 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/367 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/368 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/368 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/369 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/369 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/370 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/370 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/371 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/371 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/372 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/372 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/373 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/373 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/374 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/374 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/375 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/375 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/376 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/376 (0 ms) [----------] 377 tests from WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest (57 ms total) [----------] 20 tests from RsaPssSignVerify/Pkcs11RsaPssVectorTest [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/0 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/0 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/1 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/1 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/2 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/2 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/3 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/3 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/4 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/4 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/5 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/5 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/6 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/6 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/7 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/7 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/8 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/8 (1 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/9 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/9 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/0 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/0 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/1 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/1 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/2 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/2 (3 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/3 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/3 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/4 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/4 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/5 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/5 (3 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/6 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/6 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/7 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/7 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/8 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/8 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/9 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/9 (8 ms) [----------] 20 tests from RsaPssSignVerify/Pkcs11RsaPssVectorTest (32 ms total) [----------] 82 tests from Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/1 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/9 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/16 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/24 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/31 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/39 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/46 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/54 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/69 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [----------] 82 tests from Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof (10 ms total) [----------] 103 tests from Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 (0 ms) [----------] 103 tests from Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof (14 ms total) [----------] 100 tests from Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/6 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/9 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/13 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/20 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/28 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/31 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/35 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/43 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/46 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/50 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/58 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/65 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/72 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/80 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/82 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/83 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/87 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/88 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/90 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/92 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/94 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/99 (0 ms) [----------] 100 tests from Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof (12 ms total) [----------] 103 tests from Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 (0 ms) [----------] 103 tests from Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof (26 ms total) [----------] 103 tests from Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 (1 ms) [----------] 103 tests from Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof (43 ms total) [----------] 171 tests from Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/0 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/1 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/3 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/6 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/8 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/9 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/10 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/13 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/15 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/16 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/17 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/20 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/22 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/24 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/27 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/29 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/31 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/34 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/36 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/38 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/40 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/43 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/45 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/46 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/47 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/50 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/52 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/54 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/55 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/57 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/59 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/61 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/64 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/66 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/67 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/68 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/70 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/73 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/74 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/75 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/77 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/80 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/82 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/83 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/84 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/85 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/87 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/88 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/89 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/90 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/91 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/92 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/94 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/96 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/98 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/99 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/101 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/102 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/103 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/103 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/104 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/104 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/105 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/105 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/106 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/106 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/107 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/107 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/108 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/108 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/109 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/109 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/110 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/110 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/111 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/111 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/112 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/112 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/113 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/113 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/114 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/114 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/115 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/115 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/116 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/116 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/117 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/117 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/118 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/118 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/119 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/119 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/120 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/120 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/121 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/121 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/122 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/122 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/123 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/123 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/124 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/124 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/125 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/125 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/126 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/126 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/127 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/127 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/128 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/128 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/129 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/129 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/130 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/130 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/131 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/131 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/132 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/132 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/133 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/133 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/134 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/134 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/135 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/135 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/136 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/136 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/137 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/137 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/138 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/138 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/139 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/139 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/140 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/140 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/141 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/141 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/142 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/142 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/143 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/143 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/144 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/144 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/145 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/145 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/146 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/146 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/147 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/147 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/148 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/148 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/149 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/149 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/150 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/150 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/151 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/151 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/152 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/152 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/153 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/153 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/154 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/154 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/155 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/155 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/156 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/156 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/157 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/157 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/158 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/158 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/159 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/159 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/160 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/160 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/161 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/161 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/162 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/162 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/163 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/163 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/164 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/164 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/165 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/165 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/166 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/166 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/167 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/167 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/168 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/168 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/169 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/169 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/170 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/170 (0 ms) [----------] 171 tests from Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof (71 ms total) [----------] 150 tests from WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/0 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/1 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/9 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/15 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/16 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/23 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/31 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/38 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/45 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/46 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/52 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/55 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/60 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/67 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/74 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/82 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/83 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/85 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/87 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/88 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/89 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/90 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/92 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/94 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/96 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/99 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/101 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/102 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/103 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/103 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/104 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/104 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/105 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/105 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/106 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/106 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/107 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/107 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/108 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/108 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/109 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/109 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/110 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/110 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/111 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/111 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/112 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/112 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/113 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/113 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/114 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/114 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/115 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/115 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/116 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/116 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/117 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/117 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/118 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/118 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/119 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/119 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/120 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/120 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/121 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/121 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/122 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/122 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/123 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/123 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/124 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/124 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/125 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/125 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/126 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/126 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/127 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/127 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/128 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/128 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/129 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/129 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/130 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/130 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/131 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/131 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/132 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/132 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/133 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/133 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/134 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/134 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/135 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/135 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/136 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/136 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/137 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/137 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/138 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/138 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/139 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/139 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/140 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/140 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/141 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/141 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/142 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/142 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/143 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/143 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/144 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/144 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/145 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/145 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/146 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/146 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/147 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/147 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/148 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/148 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/149 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/149 (0 ms) [----------] 150 tests from WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof (21 ms total) [----------] Global test environment tear-down [==========] 13692 tests from 89 test suites ran. (8971 ms total) [ PASSED ] 13692 tests. gtests.sh: #10: pk11_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/pk11_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: util_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/util_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/util_gtest -n dummy -s CN=dummy -t ,, -x -m 6 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #11: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/util_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing util_gtest [==========] Running 1960 tests from 13 test suites. [----------] Global test environment set-up. [----------] 4 tests from B64EncodeDecodeTest [ RUN ] B64EncodeDecodeTest.DecEncTest [ OK ] B64EncodeDecodeTest.DecEncTest (0 ms) [ RUN ] B64EncodeDecodeTest.EncDecTest [ OK ] B64EncodeDecodeTest.EncDecTest (0 ms) [ RUN ] B64EncodeDecodeTest.FakeDecTest [ OK ] B64EncodeDecodeTest.FakeDecTest (0 ms) [ RUN ] B64EncodeDecodeTest.FakeEncDecTest [ OK ] B64EncodeDecodeTest.FakeEncDecTest (0 ms) [----------] 4 tests from B64EncodeDecodeTest (0 ms total) [----------] 4 tests from MemcmpZeroTest [ RUN ] MemcmpZeroTest.TestMemcmpZeroTrue [ OK ] MemcmpZeroTest.TestMemcmpZeroTrue (0 ms) [ RUN ] MemcmpZeroTest.TestMemcmpZeroFalse5 [ OK ] MemcmpZeroTest.TestMemcmpZeroFalse5 (0 ms) [ RUN ] MemcmpZeroTest.TestMemcmpZeroFalse37 [ OK ] MemcmpZeroTest.TestMemcmpZeroFalse37 (0 ms) [ RUN ] MemcmpZeroTest.TestMemcmpZeroFalse0 [ OK ] MemcmpZeroTest.TestMemcmpZeroFalse0 (0 ms) [----------] 4 tests from MemcmpZeroTest (0 ms total) [----------] 6 tests from PK11URITest [ RUN ] PK11URITest.CreateTest [ OK ] PK11URITest.CreateTest (0 ms) [ RUN ] PK11URITest.CreateRetrieveTest [ OK ] PK11URITest.CreateRetrieveTest (0 ms) [ RUN ] PK11URITest.CreateFormatTest [ OK ] PK11URITest.CreateFormatTest (0 ms) [ RUN ] PK11URITest.ParseTest [ OK ] PK11URITest.ParseTest (0 ms) [ RUN ] PK11URITest.ParseRetrieveTest [ OK ] PK11URITest.ParseRetrieveTest (0 ms) [ RUN ] PK11URITest.ParseFormatTest [ OK ] PK11URITest.ParseFormatTest (0 ms) [----------] 6 tests from PK11URITest (0 ms total) [----------] 4 tests from Utf8Zeroes [ RUN ] Utf8Zeroes.From32To8 [ OK ] Utf8Zeroes.From32To8 (0 ms) [ RUN ] Utf8Zeroes.From16To8 [ OK ] Utf8Zeroes.From16To8 (0 ms) [ RUN ] Utf8Zeroes.From8To32 [ OK ] Utf8Zeroes.From8To32 (0 ms) [ RUN ] Utf8Zeroes.From8To16 [ OK ] Utf8Zeroes.From8To16 (0 ms) [----------] 4 tests from Utf8Zeroes (0 ms total) [----------] 14 tests from AllAligned/AlignedMallocTest [ RUN ] AllAligned/AlignedMallocTest.TestNew/0 [ OK ] AllAligned/AlignedMallocTest.TestNew/0 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/1 [ OK ] AllAligned/AlignedMallocTest.TestNew/1 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/2 [ OK ] AllAligned/AlignedMallocTest.TestNew/2 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/3 [ OK ] AllAligned/AlignedMallocTest.TestNew/3 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/4 [ OK ] AllAligned/AlignedMallocTest.TestNew/4 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/5 [ OK ] AllAligned/AlignedMallocTest.TestNew/5 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/6 [ OK ] AllAligned/AlignedMallocTest.TestNew/6 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/0 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/0 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/1 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/1 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/2 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/2 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/3 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/3 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/4 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/4 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/5 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/5 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/6 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/6 (0 ms) [----------] 14 tests from AllAligned/AlignedMallocTest (0 ms total) [----------] 10 tests from AllAlignedBadSize/AlignedMallocTestBadSize [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/0 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/0 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/1 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/1 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/2 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/2 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/3 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/3 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/4 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/4 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/0 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/0 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/1 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/1 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/2 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/2 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/3 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/3 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/4 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/4 (0 ms) [----------] 10 tests from AllAlignedBadSize/AlignedMallocTestBadSize (0 ms total) [----------] 678 tests from Ucs4TestCases/Ucs4Test [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/0 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/0 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/1 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/1 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/2 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/2 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/3 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/3 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/4 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/4 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/5 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/5 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/6 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/6 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/7 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/7 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/8 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/8 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/9 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/9 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/10 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/10 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/11 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/11 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/12 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/12 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/13 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/13 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/14 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/14 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/15 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/15 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/16 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/16 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/17 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/17 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/18 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/18 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/19 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/19 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/20 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/20 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/21 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/21 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/22 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/22 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/23 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/23 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/24 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/24 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/25 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/25 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/26 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/26 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/27 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/27 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/28 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/28 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/29 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/29 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/30 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/30 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/31 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/31 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/32 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/32 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/33 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/33 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/34 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/34 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/35 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/35 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/36 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/36 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/37 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/37 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/38 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/38 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/39 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/39 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/40 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/40 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/41 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/41 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/42 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/42 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/43 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/43 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/44 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/44 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/45 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/45 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/46 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/46 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/47 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/47 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/48 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/48 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/49 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/49 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/50 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/50 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/51 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/51 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/52 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/52 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/53 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/53 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/54 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/54 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/55 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/55 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/56 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/56 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/57 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/57 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/58 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/58 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/59 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/59 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/60 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/60 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/61 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/61 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/62 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/62 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/63 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/63 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/64 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/64 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/65 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/65 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/66 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/66 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/67 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/67 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/68 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/68 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/69 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/69 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/70 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/70 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/71 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/71 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/72 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/72 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/73 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/73 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/74 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/74 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/75 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/75 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/76 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/76 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/77 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/77 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/78 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/78 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/79 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/79 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/80 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/80 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/81 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/81 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/82 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/82 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/83 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/83 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/84 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/84 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/85 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/85 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/86 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/86 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/87 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/87 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/88 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/88 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/89 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/89 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/90 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/90 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/91 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/91 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/92 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/92 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/93 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/93 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/94 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/94 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/95 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/95 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/96 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/96 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/97 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/97 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/98 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/98 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/99 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/99 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/100 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/100 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/101 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/101 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/102 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/102 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/103 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/103 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/104 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/104 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/105 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/105 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/106 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/106 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/107 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/107 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/108 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/108 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/109 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/109 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/110 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/110 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/111 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/111 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/112 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/112 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/113 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/113 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/114 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/114 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/115 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/115 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/116 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/116 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/117 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/117 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/118 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/118 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/119 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/119 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/120 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/120 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/121 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/121 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/122 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/122 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/123 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/123 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/124 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/124 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/125 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/125 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/126 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/126 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/127 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/127 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/128 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/128 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/129 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/129 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/130 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/130 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/131 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/131 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/132 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/132 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/133 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/133 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/134 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/134 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/135 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/135 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/136 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/136 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/137 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/137 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/138 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/138 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/139 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/139 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/140 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/140 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/141 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/141 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/142 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/142 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/143 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/143 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/144 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/144 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/145 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/145 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/146 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/146 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/147 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/147 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/148 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/148 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/149 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/149 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/150 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/150 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/151 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/151 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/152 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/152 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/153 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/153 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/154 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/154 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/155 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/155 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/156 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/156 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/157 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/157 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/158 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/158 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/159 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/159 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/160 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/160 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/161 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/161 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/162 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/162 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/163 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/163 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/164 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/164 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/165 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/165 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/166 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/166 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/167 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/167 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/168 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/168 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/169 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/169 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/170 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/170 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/171 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/171 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/172 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/172 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/173 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/173 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/174 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/174 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/175 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/175 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/176 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/176 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/177 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/177 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/178 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/178 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/179 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/179 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/180 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/180 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/181 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/181 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/182 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/182 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/183 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/183 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/184 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/184 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/185 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/185 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/186 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/186 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/187 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/187 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/188 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/188 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/189 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/189 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/190 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/190 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/191 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/191 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/192 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/192 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/193 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/193 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/194 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/194 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/195 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/195 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/196 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/196 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/197 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/197 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/198 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/198 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/199 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/199 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/200 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/200 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/201 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/201 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/202 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/202 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/203 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/203 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/204 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/204 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/205 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/205 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/206 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/206 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/207 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/207 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/208 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/208 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/209 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/209 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/210 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/210 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/211 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/211 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/212 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/212 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/213 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/213 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/214 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/214 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/215 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/215 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/216 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/216 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/217 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/217 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/218 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/218 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/219 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/219 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/220 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/220 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/221 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/221 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/222 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/222 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/223 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/223 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/224 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/224 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/225 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/225 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/0 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/0 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/1 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/1 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/2 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/2 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/3 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/3 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/4 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/4 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/5 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/5 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/6 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/6 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/7 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/7 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/8 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/8 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/9 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/9 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/10 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/10 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/11 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/11 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/12 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/12 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/13 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/13 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/14 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/14 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/15 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/15 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/16 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/16 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/17 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/17 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/18 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/18 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/19 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/19 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/20 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/20 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/21 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/21 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/22 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/22 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/23 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/23 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/24 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/24 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/25 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/25 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/26 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/26 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/27 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/27 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/28 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/28 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/29 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/29 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/30 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/30 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/31 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/31 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/32 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/32 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/33 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/33 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/34 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/34 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/35 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/35 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/36 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/36 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/37 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/37 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/38 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/38 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/39 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/39 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/40 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/40 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/41 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/41 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/42 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/42 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/43 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/43 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/44 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/44 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/45 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/45 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/46 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/46 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/47 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/47 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/48 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/48 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/49 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/49 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/50 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/50 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/51 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/51 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/52 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/52 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/53 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/53 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/54 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/54 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/55 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/55 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/56 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/56 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/57 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/57 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/58 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/58 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/59 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/59 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/60 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/60 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/61 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/61 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/62 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/62 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/63 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/63 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/64 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/64 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/65 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/65 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/66 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/66 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/67 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/67 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/68 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/68 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/69 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/69 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/70 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/70 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/71 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/71 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/72 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/72 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/73 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/73 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/74 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/74 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/75 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/75 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/76 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/76 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/77 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/77 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/78 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/78 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/79 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/79 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/80 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/80 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/81 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/81 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/82 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/82 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/83 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/83 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/84 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/84 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/85 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/85 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/86 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/86 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/87 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/87 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/88 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/88 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/89 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/89 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/90 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/90 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/91 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/91 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/92 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/92 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/93 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/93 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/94 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/94 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/95 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/95 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/96 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/96 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/97 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/97 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/98 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/98 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/99 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/99 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/100 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/100 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/101 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/101 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/102 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/102 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/103 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/103 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/104 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/104 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/105 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/105 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/106 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/106 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/107 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/107 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/108 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/108 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/109 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/109 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/110 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/110 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/111 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/111 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/112 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/112 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/113 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/113 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/114 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/114 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/115 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/115 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/116 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/116 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/117 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/117 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/118 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/118 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/119 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/119 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/120 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/120 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/121 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/121 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/122 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/122 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/123 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/123 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/124 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/124 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/125 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/125 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/126 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/126 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/127 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/127 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/128 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/128 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/129 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/129 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/130 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/130 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/131 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/131 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/132 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/132 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/133 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/133 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/134 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/134 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/135 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/135 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/136 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/136 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/137 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/137 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/138 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/138 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/139 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/139 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/140 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/140 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/141 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/141 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/142 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/142 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/143 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/143 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/144 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/144 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/145 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/145 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/146 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/146 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/147 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/147 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/148 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/148 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/149 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/149 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/150 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/150 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/151 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/151 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/152 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/152 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/153 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/153 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/154 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/154 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/155 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/155 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/156 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/156 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/157 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/157 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/158 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/158 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/159 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/159 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/160 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/160 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/161 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/161 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/162 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/162 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/163 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/163 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/164 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/164 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/165 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/165 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/166 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/166 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/167 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/167 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/168 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/168 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/169 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/169 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/170 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/170 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/171 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/171 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/172 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/172 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/173 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/173 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/174 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/174 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/175 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/175 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/176 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/176 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/177 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/177 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/178 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/178 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/179 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/179 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/180 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/180 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/181 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/181 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/182 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/182 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/183 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/183 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/184 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/184 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/185 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/185 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/186 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/186 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/187 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/187 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/188 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/188 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/189 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/189 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/190 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/190 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/191 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/191 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/192 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/192 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/193 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/193 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/194 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/194 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/195 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/195 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/196 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/196 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/197 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/197 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/198 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/198 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/199 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/199 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/200 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/200 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/201 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/201 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/202 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/202 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/203 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/203 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/204 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/204 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/205 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/205 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/206 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/206 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/207 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/207 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/208 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/208 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/209 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/209 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/210 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/210 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/211 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/211 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/212 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/212 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/213 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/213 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/214 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/214 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/215 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/215 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/216 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/216 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/217 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/217 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/218 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/218 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/219 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/219 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/220 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/220 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/221 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/221 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/222 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/222 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/223 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/223 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/224 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/224 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/225 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/225 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/0 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/0 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/1 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/1 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/2 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/2 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/3 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/3 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/4 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/4 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/5 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/5 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/6 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/6 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/7 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/7 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/8 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/8 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/9 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/9 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/10 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/10 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/11 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/11 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/12 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/12 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/13 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/13 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/14 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/14 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/15 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/15 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/16 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/16 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/17 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/17 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/18 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/18 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/19 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/19 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/20 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/20 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/21 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/21 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/22 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/22 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/23 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/23 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/24 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/24 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/25 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/25 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/26 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/26 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/27 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/27 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/28 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/28 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/29 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/29 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/30 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/30 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/31 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/31 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/32 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/32 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/33 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/33 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/34 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/34 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/35 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/35 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/36 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/36 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/37 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/37 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/38 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/38 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/39 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/39 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/40 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/40 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/41 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/41 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/42 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/42 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/43 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/43 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/44 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/44 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/45 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/45 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/46 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/46 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/47 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/47 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/48 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/48 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/49 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/49 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/50 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/50 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/51 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/51 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/52 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/52 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/53 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/53 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/54 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/54 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/55 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/55 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/56 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/56 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/57 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/57 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/58 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/58 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/59 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/59 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/60 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/60 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/61 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/61 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/62 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/62 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/63 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/63 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/64 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/64 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/65 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/65 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/66 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/66 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/67 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/67 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/68 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/68 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/69 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/69 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/70 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/70 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/71 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/71 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/72 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/72 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/73 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/73 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/74 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/74 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/75 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/75 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/76 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/76 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/77 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/77 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/78 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/78 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/79 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/79 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/80 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/80 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/81 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/81 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/82 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/82 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/83 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/83 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/84 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/84 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/85 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/85 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/86 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/86 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/87 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/87 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/88 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/88 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/89 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/89 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/90 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/90 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/91 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/91 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/92 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/92 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/93 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/93 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/94 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/94 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/95 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/95 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/96 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/96 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/97 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/97 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/98 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/98 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/99 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/99 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/100 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/100 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/101 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/101 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/102 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/102 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/103 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/103 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/104 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/104 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/105 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/105 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/106 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/106 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/107 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/107 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/108 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/108 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/109 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/109 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/110 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/110 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/111 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/111 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/112 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/112 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/113 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/113 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/114 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/114 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/115 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/115 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/116 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/116 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/117 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/117 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/118 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/118 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/119 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/119 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/120 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/120 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/121 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/121 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/122 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/122 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/123 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/123 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/124 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/124 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/125 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/125 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/126 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/126 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/127 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/127 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/128 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/128 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/129 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/129 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/130 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/130 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/131 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/131 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/132 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/132 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/133 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/133 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/134 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/134 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/135 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/135 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/136 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/136 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/137 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/137 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/138 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/138 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/139 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/139 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/140 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/140 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/141 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/141 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/142 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/142 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/143 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/143 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/144 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/144 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/145 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/145 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/146 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/146 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/147 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/147 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/148 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/148 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/149 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/149 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/150 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/150 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/151 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/151 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/152 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/152 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/153 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/153 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/154 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/154 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/155 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/155 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/156 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/156 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/157 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/157 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/158 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/158 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/159 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/159 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/160 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/160 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/161 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/161 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/162 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/162 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/163 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/163 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/164 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/164 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/165 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/165 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/166 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/166 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/167 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/167 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/168 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/168 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/169 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/169 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/170 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/170 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/171 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/171 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/172 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/172 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/173 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/173 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/174 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/174 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/175 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/175 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/176 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/176 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/177 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/177 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/178 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/178 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/179 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/179 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/180 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/180 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/181 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/181 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/182 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/182 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/183 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/183 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/184 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/184 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/185 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/185 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/186 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/186 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/187 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/187 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/188 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/188 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/189 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/189 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/190 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/190 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/191 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/191 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/192 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/192 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/193 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/193 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/194 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/194 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/195 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/195 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/196 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/196 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/197 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/197 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/198 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/198 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/199 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/199 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/200 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/200 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/201 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/201 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/202 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/202 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/203 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/203 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/204 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/204 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/205 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/205 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/206 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/206 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/207 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/207 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/208 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/208 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/209 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/209 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/210 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/210 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/211 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/211 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/212 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/212 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/213 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/213 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/214 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/214 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/215 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/215 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/216 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/216 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/217 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/217 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/218 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/218 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/219 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/219 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/220 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/220 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/221 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/221 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/222 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/222 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/223 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/223 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/224 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/224 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/225 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/225 (0 ms) [----------] 678 tests from Ucs4TestCases/Ucs4Test (2 ms total) [----------] 66 tests from Iso88591TestCases/Ucs2Test [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/0 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/0 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/1 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/1 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/2 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/2 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/3 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/3 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/4 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/4 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/5 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/5 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/6 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/6 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/7 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/7 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/8 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/8 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/9 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/9 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/10 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/10 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/11 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/11 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/12 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/12 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/13 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/13 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/14 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/14 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/15 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/15 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/16 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/16 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/17 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/17 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/18 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/18 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/19 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/19 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/20 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/20 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/21 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/21 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/0 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/0 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/1 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/1 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/2 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/2 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/3 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/3 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/4 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/4 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/5 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/5 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/6 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/6 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/7 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/7 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/8 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/8 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/9 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/9 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/10 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/10 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/11 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/11 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/12 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/12 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/13 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/13 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/14 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/14 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/15 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/15 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/16 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/16 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/17 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/17 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/18 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/18 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/19 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/19 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/20 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/20 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/21 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/21 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/0 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/0 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/1 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/1 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/2 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/2 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/3 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/3 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/4 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/4 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/5 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/5 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/6 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/6 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/7 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/7 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/8 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/8 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/9 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/9 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/10 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/10 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/11 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/11 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/12 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/12 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/13 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/13 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/14 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/14 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/15 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/15 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/16 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/16 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/17 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/17 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/18 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/18 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/19 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/19 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/20 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/20 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/21 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/21 (0 ms) [----------] 66 tests from Iso88591TestCases/Ucs2Test (0 ms total) [----------] 327 tests from Ucs2TestCases/Ucs2Test [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/0 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/0 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/1 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/1 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/2 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/2 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/3 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/3 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/4 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/4 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/5 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/5 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/6 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/6 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/7 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/7 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/8 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/8 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/9 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/9 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/10 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/10 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/11 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/11 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/12 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/12 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/13 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/13 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/14 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/14 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/15 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/15 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/16 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/16 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/17 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/17 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/18 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/18 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/19 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/19 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/20 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/20 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/21 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/21 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/22 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/22 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/23 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/23 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/24 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/24 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/25 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/25 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/26 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/26 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/27 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/27 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/28 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/28 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/29 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/29 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/30 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/30 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/31 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/31 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/32 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/32 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/33 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/33 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/34 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/34 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/35 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/35 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/36 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/36 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/37 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/37 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/38 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/38 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/39 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/39 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/40 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/40 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/41 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/41 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/42 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/42 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/43 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/43 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/44 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/44 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/45 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/45 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/46 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/46 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/47 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/47 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/48 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/48 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/49 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/49 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/50 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/50 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/51 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/51 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/52 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/52 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/53 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/53 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/54 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/54 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/55 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/55 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/56 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/56 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/57 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/57 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/58 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/58 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/59 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/59 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/60 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/60 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/61 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/61 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/62 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/62 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/63 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/63 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/64 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/64 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/65 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/65 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/66 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/66 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/67 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/67 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/68 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/68 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/69 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/69 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/70 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/70 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/71 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/71 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/72 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/72 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/73 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/73 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/74 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/74 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/75 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/75 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/76 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/76 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/77 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/77 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/78 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/78 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/79 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/79 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/80 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/80 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/81 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/81 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/82 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/82 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/83 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/83 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/84 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/84 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/85 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/85 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/86 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/86 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/87 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/87 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/88 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/88 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/89 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/89 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/90 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/90 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/91 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/91 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/92 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/92 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/93 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/93 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/94 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/94 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/95 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/95 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/96 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/96 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/97 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/97 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/98 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/98 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/99 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/99 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/100 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/100 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/101 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/101 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/102 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/102 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/103 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/103 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/104 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/104 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/105 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/105 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/106 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/106 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/107 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/107 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/108 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/108 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/0 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/0 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/1 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/1 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/2 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/2 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/3 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/3 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/4 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/4 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/5 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/5 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/6 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/6 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/7 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/7 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/8 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/8 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/9 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/9 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/10 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/10 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/11 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/11 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/12 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/12 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/13 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/13 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/14 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/14 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/15 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/15 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/16 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/16 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/17 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/17 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/18 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/18 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/19 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/19 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/20 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/20 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/21 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/21 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/22 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/22 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/23 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/23 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/24 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/24 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/25 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/25 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/26 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/26 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/27 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/27 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/28 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/28 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/29 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/29 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/30 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/30 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/31 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/31 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/32 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/32 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/33 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/33 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/34 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/34 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/35 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/35 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/36 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/36 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/37 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/37 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/38 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/38 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/39 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/39 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/40 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/40 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/41 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/41 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/42 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/42 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/43 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/43 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/44 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/44 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/45 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/45 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/46 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/46 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/47 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/47 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/48 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/48 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/49 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/49 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/50 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/50 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/51 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/51 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/52 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/52 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/53 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/53 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/54 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/54 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/55 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/55 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/56 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/56 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/57 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/57 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/58 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/58 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/59 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/59 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/60 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/60 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/61 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/61 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/62 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/62 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/63 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/63 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/64 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/64 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/65 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/65 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/66 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/66 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/67 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/67 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/68 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/68 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/69 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/69 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/70 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/70 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/71 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/71 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/72 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/72 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/73 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/73 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/74 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/74 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/75 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/75 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/76 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/76 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/77 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/77 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/78 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/78 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/79 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/79 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/80 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/80 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/81 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/81 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/82 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/82 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/83 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/83 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/84 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/84 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/85 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/85 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/86 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/86 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/87 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/87 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/88 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/88 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/89 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/89 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/90 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/90 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/91 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/91 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/92 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/92 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/93 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/93 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/94 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/94 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/95 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/95 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/96 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/96 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/97 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/97 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/98 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/98 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/99 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/99 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/100 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/100 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/101 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/101 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/102 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/102 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/103 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/103 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/104 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/104 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/105 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/105 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/106 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/106 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/107 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/107 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/108 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/108 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/0 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/0 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/1 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/1 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/2 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/2 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/3 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/3 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/4 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/4 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/5 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/5 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/6 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/6 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/7 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/7 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/8 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/8 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/9 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/9 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/10 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/10 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/11 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/11 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/12 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/12 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/13 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/13 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/14 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/14 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/15 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/15 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/16 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/16 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/17 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/17 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/18 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/18 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/19 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/19 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/20 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/20 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/21 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/21 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/22 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/22 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/23 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/23 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/24 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/24 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/25 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/25 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/26 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/26 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/27 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/27 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/28 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/28 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/29 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/29 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/30 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/30 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/31 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/31 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/32 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/32 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/33 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/33 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/34 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/34 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/35 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/35 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/36 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/36 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/37 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/37 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/38 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/38 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/39 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/39 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/40 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/40 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/41 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/41 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/42 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/42 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/43 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/43 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/44 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/44 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/45 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/45 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/46 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/46 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/47 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/47 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/48 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/48 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/49 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/49 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/50 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/50 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/51 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/51 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/52 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/52 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/53 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/53 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/54 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/54 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/55 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/55 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/56 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/56 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/57 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/57 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/58 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/58 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/59 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/59 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/60 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/60 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/61 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/61 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/62 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/62 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/63 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/63 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/64 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/64 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/65 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/65 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/66 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/66 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/67 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/67 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/68 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/68 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/69 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/69 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/70 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/70 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/71 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/71 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/72 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/72 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/73 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/73 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/74 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/74 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/75 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/75 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/76 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/76 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/77 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/77 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/78 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/78 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/79 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/79 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/80 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/80 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/81 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/81 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/82 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/82 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/83 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/83 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/84 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/84 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/85 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/85 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/86 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/86 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/87 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/87 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/88 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/88 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/89 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/89 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/90 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/90 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/91 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/91 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/92 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/92 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/93 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/93 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/94 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/94 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/95 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/95 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/96 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/96 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/97 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/97 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/98 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/98 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/99 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/99 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/100 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/100 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/101 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/101 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/102 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/102 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/103 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/103 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/104 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/104 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/105 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/105 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/106 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/106 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/107 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/107 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/108 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/108 (0 ms) [----------] 327 tests from Ucs2TestCases/Ucs2Test (1 ms total) [----------] 738 tests from Utf16TestCases/Utf16Test [ RUN ] Utf16TestCases/Utf16Test.From16To32/0 [ OK ] Utf16TestCases/Utf16Test.From16To32/0 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/1 [ OK ] Utf16TestCases/Utf16Test.From16To32/1 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/2 [ OK ] Utf16TestCases/Utf16Test.From16To32/2 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/3 [ OK ] Utf16TestCases/Utf16Test.From16To32/3 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/4 [ OK ] Utf16TestCases/Utf16Test.From16To32/4 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/5 [ OK ] Utf16TestCases/Utf16Test.From16To32/5 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/6 [ OK ] Utf16TestCases/Utf16Test.From16To32/6 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/7 [ OK ] Utf16TestCases/Utf16Test.From16To32/7 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/8 [ OK ] Utf16TestCases/Utf16Test.From16To32/8 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/9 [ OK ] Utf16TestCases/Utf16Test.From16To32/9 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/10 [ OK ] Utf16TestCases/Utf16Test.From16To32/10 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/11 [ OK ] Utf16TestCases/Utf16Test.From16To32/11 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/12 [ OK ] Utf16TestCases/Utf16Test.From16To32/12 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/13 [ OK ] Utf16TestCases/Utf16Test.From16To32/13 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/14 [ OK ] Utf16TestCases/Utf16Test.From16To32/14 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/15 [ OK ] Utf16TestCases/Utf16Test.From16To32/15 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/16 [ OK ] Utf16TestCases/Utf16Test.From16To32/16 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/17 [ OK ] Utf16TestCases/Utf16Test.From16To32/17 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/18 [ OK ] Utf16TestCases/Utf16Test.From16To32/18 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/19 [ OK ] Utf16TestCases/Utf16Test.From16To32/19 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/20 [ OK ] Utf16TestCases/Utf16Test.From16To32/20 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/21 [ OK ] Utf16TestCases/Utf16Test.From16To32/21 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/22 [ OK ] Utf16TestCases/Utf16Test.From16To32/22 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/23 [ OK ] Utf16TestCases/Utf16Test.From16To32/23 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/24 [ OK ] Utf16TestCases/Utf16Test.From16To32/24 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/25 [ OK ] Utf16TestCases/Utf16Test.From16To32/25 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/26 [ OK ] Utf16TestCases/Utf16Test.From16To32/26 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/27 [ OK ] Utf16TestCases/Utf16Test.From16To32/27 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/28 [ OK ] Utf16TestCases/Utf16Test.From16To32/28 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/29 [ OK ] Utf16TestCases/Utf16Test.From16To32/29 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/30 [ OK ] Utf16TestCases/Utf16Test.From16To32/30 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/31 [ OK ] Utf16TestCases/Utf16Test.From16To32/31 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/32 [ OK ] Utf16TestCases/Utf16Test.From16To32/32 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/33 [ OK ] Utf16TestCases/Utf16Test.From16To32/33 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/34 [ OK ] Utf16TestCases/Utf16Test.From16To32/34 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/35 [ OK ] Utf16TestCases/Utf16Test.From16To32/35 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/36 [ OK ] Utf16TestCases/Utf16Test.From16To32/36 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/37 [ OK ] Utf16TestCases/Utf16Test.From16To32/37 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/38 [ OK ] Utf16TestCases/Utf16Test.From16To32/38 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/39 [ OK ] Utf16TestCases/Utf16Test.From16To32/39 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/40 [ OK ] Utf16TestCases/Utf16Test.From16To32/40 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/41 [ OK ] Utf16TestCases/Utf16Test.From16To32/41 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/42 [ OK ] Utf16TestCases/Utf16Test.From16To32/42 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/43 [ OK ] Utf16TestCases/Utf16Test.From16To32/43 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/44 [ OK ] Utf16TestCases/Utf16Test.From16To32/44 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/45 [ OK ] Utf16TestCases/Utf16Test.From16To32/45 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/46 [ OK ] Utf16TestCases/Utf16Test.From16To32/46 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/47 [ OK ] Utf16TestCases/Utf16Test.From16To32/47 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/48 [ OK ] Utf16TestCases/Utf16Test.From16To32/48 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/49 [ OK ] Utf16TestCases/Utf16Test.From16To32/49 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/50 [ OK ] Utf16TestCases/Utf16Test.From16To32/50 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/51 [ OK ] Utf16TestCases/Utf16Test.From16To32/51 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/52 [ OK ] Utf16TestCases/Utf16Test.From16To32/52 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/53 [ OK ] Utf16TestCases/Utf16Test.From16To32/53 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/54 [ OK ] Utf16TestCases/Utf16Test.From16To32/54 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/55 [ OK ] Utf16TestCases/Utf16Test.From16To32/55 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/56 [ OK ] Utf16TestCases/Utf16Test.From16To32/56 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/57 [ OK ] Utf16TestCases/Utf16Test.From16To32/57 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/58 [ OK ] Utf16TestCases/Utf16Test.From16To32/58 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/59 [ OK ] Utf16TestCases/Utf16Test.From16To32/59 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/60 [ OK ] Utf16TestCases/Utf16Test.From16To32/60 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/61 [ OK ] Utf16TestCases/Utf16Test.From16To32/61 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/62 [ OK ] Utf16TestCases/Utf16Test.From16To32/62 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/63 [ OK ] Utf16TestCases/Utf16Test.From16To32/63 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/64 [ OK ] Utf16TestCases/Utf16Test.From16To32/64 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/65 [ OK ] Utf16TestCases/Utf16Test.From16To32/65 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/66 [ OK ] Utf16TestCases/Utf16Test.From16To32/66 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/67 [ OK ] Utf16TestCases/Utf16Test.From16To32/67 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/68 [ OK ] Utf16TestCases/Utf16Test.From16To32/68 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/69 [ OK ] Utf16TestCases/Utf16Test.From16To32/69 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/70 [ OK ] Utf16TestCases/Utf16Test.From16To32/70 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/71 [ OK ] Utf16TestCases/Utf16Test.From16To32/71 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/72 [ OK ] Utf16TestCases/Utf16Test.From16To32/72 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/73 [ OK ] Utf16TestCases/Utf16Test.From16To32/73 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/74 [ OK ] Utf16TestCases/Utf16Test.From16To32/74 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/75 [ OK ] Utf16TestCases/Utf16Test.From16To32/75 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/76 [ OK ] Utf16TestCases/Utf16Test.From16To32/76 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/77 [ OK ] Utf16TestCases/Utf16Test.From16To32/77 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/78 [ OK ] Utf16TestCases/Utf16Test.From16To32/78 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/79 [ OK ] Utf16TestCases/Utf16Test.From16To32/79 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/80 [ OK ] Utf16TestCases/Utf16Test.From16To32/80 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/81 [ OK ] Utf16TestCases/Utf16Test.From16To32/81 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/82 [ OK ] Utf16TestCases/Utf16Test.From16To32/82 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/83 [ OK ] Utf16TestCases/Utf16Test.From16To32/83 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/84 [ OK ] Utf16TestCases/Utf16Test.From16To32/84 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/85 [ OK ] Utf16TestCases/Utf16Test.From16To32/85 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/86 [ OK ] Utf16TestCases/Utf16Test.From16To32/86 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/87 [ OK ] Utf16TestCases/Utf16Test.From16To32/87 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/88 [ OK ] Utf16TestCases/Utf16Test.From16To32/88 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/89 [ OK ] Utf16TestCases/Utf16Test.From16To32/89 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/90 [ OK ] Utf16TestCases/Utf16Test.From16To32/90 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/91 [ OK ] Utf16TestCases/Utf16Test.From16To32/91 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/92 [ OK ] Utf16TestCases/Utf16Test.From16To32/92 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/93 [ OK ] Utf16TestCases/Utf16Test.From16To32/93 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/94 [ OK ] Utf16TestCases/Utf16Test.From16To32/94 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/95 [ OK ] Utf16TestCases/Utf16Test.From16To32/95 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/96 [ OK ] Utf16TestCases/Utf16Test.From16To32/96 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/97 [ OK ] Utf16TestCases/Utf16Test.From16To32/97 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/98 [ OK ] Utf16TestCases/Utf16Test.From16To32/98 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/99 [ OK ] Utf16TestCases/Utf16Test.From16To32/99 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/100 [ OK ] Utf16TestCases/Utf16Test.From16To32/100 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/101 [ OK ] Utf16TestCases/Utf16Test.From16To32/101 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/102 [ OK ] Utf16TestCases/Utf16Test.From16To32/102 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/103 [ OK ] Utf16TestCases/Utf16Test.From16To32/103 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/104 [ OK ] Utf16TestCases/Utf16Test.From16To32/104 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/105 [ OK ] Utf16TestCases/Utf16Test.From16To32/105 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/106 [ OK ] Utf16TestCases/Utf16Test.From16To32/106 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/107 [ OK ] Utf16TestCases/Utf16Test.From16To32/107 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/108 [ OK ] Utf16TestCases/Utf16Test.From16To32/108 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/109 [ OK ] Utf16TestCases/Utf16Test.From16To32/109 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/110 [ OK ] Utf16TestCases/Utf16Test.From16To32/110 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/111 [ OK ] Utf16TestCases/Utf16Test.From16To32/111 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/112 [ OK ] Utf16TestCases/Utf16Test.From16To32/112 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/113 [ OK ] Utf16TestCases/Utf16Test.From16To32/113 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/114 [ OK ] Utf16TestCases/Utf16Test.From16To32/114 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/115 [ OK ] Utf16TestCases/Utf16Test.From16To32/115 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/116 [ OK ] Utf16TestCases/Utf16Test.From16To32/116 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/117 [ OK ] Utf16TestCases/Utf16Test.From16To32/117 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/118 [ OK ] Utf16TestCases/Utf16Test.From16To32/118 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/119 [ OK ] Utf16TestCases/Utf16Test.From16To32/119 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/120 [ OK ] Utf16TestCases/Utf16Test.From16To32/120 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/121 [ OK ] Utf16TestCases/Utf16Test.From16To32/121 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/122 [ OK ] Utf16TestCases/Utf16Test.From16To32/122 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/123 [ OK ] Utf16TestCases/Utf16Test.From16To32/123 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/124 [ OK ] Utf16TestCases/Utf16Test.From16To32/124 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/125 [ OK ] Utf16TestCases/Utf16Test.From16To32/125 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/126 [ OK ] Utf16TestCases/Utf16Test.From16To32/126 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/127 [ OK ] Utf16TestCases/Utf16Test.From16To32/127 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/128 [ OK ] Utf16TestCases/Utf16Test.From16To32/128 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/129 [ OK ] Utf16TestCases/Utf16Test.From16To32/129 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/130 [ OK ] Utf16TestCases/Utf16Test.From16To32/130 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/131 [ OK ] Utf16TestCases/Utf16Test.From16To32/131 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/132 [ OK ] Utf16TestCases/Utf16Test.From16To32/132 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/133 [ OK ] Utf16TestCases/Utf16Test.From16To32/133 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/134 [ OK ] Utf16TestCases/Utf16Test.From16To32/134 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/135 [ OK ] Utf16TestCases/Utf16Test.From16To32/135 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/136 [ OK ] Utf16TestCases/Utf16Test.From16To32/136 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/137 [ OK ] Utf16TestCases/Utf16Test.From16To32/137 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/138 [ OK ] Utf16TestCases/Utf16Test.From16To32/138 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/139 [ OK ] Utf16TestCases/Utf16Test.From16To32/139 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/140 [ OK ] Utf16TestCases/Utf16Test.From16To32/140 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/141 [ OK ] Utf16TestCases/Utf16Test.From16To32/141 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/142 [ OK ] Utf16TestCases/Utf16Test.From16To32/142 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/143 [ OK ] Utf16TestCases/Utf16Test.From16To32/143 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/144 [ OK ] Utf16TestCases/Utf16Test.From16To32/144 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/145 [ OK ] Utf16TestCases/Utf16Test.From16To32/145 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/146 [ OK ] Utf16TestCases/Utf16Test.From16To32/146 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/147 [ OK ] Utf16TestCases/Utf16Test.From16To32/147 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/148 [ OK ] Utf16TestCases/Utf16Test.From16To32/148 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/149 [ OK ] Utf16TestCases/Utf16Test.From16To32/149 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/150 [ OK ] Utf16TestCases/Utf16Test.From16To32/150 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/151 [ OK ] Utf16TestCases/Utf16Test.From16To32/151 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/152 [ OK ] Utf16TestCases/Utf16Test.From16To32/152 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/153 [ OK ] Utf16TestCases/Utf16Test.From16To32/153 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/154 [ OK ] Utf16TestCases/Utf16Test.From16To32/154 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/155 [ OK ] Utf16TestCases/Utf16Test.From16To32/155 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/156 [ OK ] Utf16TestCases/Utf16Test.From16To32/156 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/157 [ OK ] Utf16TestCases/Utf16Test.From16To32/157 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/158 [ OK ] Utf16TestCases/Utf16Test.From16To32/158 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/159 [ OK ] Utf16TestCases/Utf16Test.From16To32/159 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/160 [ OK ] Utf16TestCases/Utf16Test.From16To32/160 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/161 [ OK ] Utf16TestCases/Utf16Test.From16To32/161 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/162 [ OK ] Utf16TestCases/Utf16Test.From16To32/162 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/163 [ OK ] Utf16TestCases/Utf16Test.From16To32/163 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/164 [ OK ] Utf16TestCases/Utf16Test.From16To32/164 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/165 [ OK ] Utf16TestCases/Utf16Test.From16To32/165 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/166 [ OK ] Utf16TestCases/Utf16Test.From16To32/166 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/167 [ OK ] Utf16TestCases/Utf16Test.From16To32/167 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/168 [ OK ] Utf16TestCases/Utf16Test.From16To32/168 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/169 [ OK ] Utf16TestCases/Utf16Test.From16To32/169 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/170 [ OK ] Utf16TestCases/Utf16Test.From16To32/170 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/171 [ OK ] Utf16TestCases/Utf16Test.From16To32/171 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/172 [ OK ] Utf16TestCases/Utf16Test.From16To32/172 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/173 [ OK ] Utf16TestCases/Utf16Test.From16To32/173 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/174 [ OK ] Utf16TestCases/Utf16Test.From16To32/174 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/175 [ OK ] Utf16TestCases/Utf16Test.From16To32/175 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/176 [ OK ] Utf16TestCases/Utf16Test.From16To32/176 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/177 [ OK ] Utf16TestCases/Utf16Test.From16To32/177 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/178 [ OK ] Utf16TestCases/Utf16Test.From16To32/178 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/179 [ OK ] Utf16TestCases/Utf16Test.From16To32/179 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/180 [ OK ] Utf16TestCases/Utf16Test.From16To32/180 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/181 [ OK ] Utf16TestCases/Utf16Test.From16To32/181 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/182 [ OK ] Utf16TestCases/Utf16Test.From16To32/182 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/183 [ OK ] Utf16TestCases/Utf16Test.From16To32/183 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/184 [ OK ] Utf16TestCases/Utf16Test.From16To32/184 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/185 [ OK ] Utf16TestCases/Utf16Test.From16To32/185 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/186 [ OK ] Utf16TestCases/Utf16Test.From16To32/186 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/187 [ OK ] Utf16TestCases/Utf16Test.From16To32/187 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/188 [ OK ] Utf16TestCases/Utf16Test.From16To32/188 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/189 [ OK ] Utf16TestCases/Utf16Test.From16To32/189 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/190 [ OK ] Utf16TestCases/Utf16Test.From16To32/190 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/191 [ OK ] Utf16TestCases/Utf16Test.From16To32/191 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/192 [ OK ] Utf16TestCases/Utf16Test.From16To32/192 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/193 [ OK ] Utf16TestCases/Utf16Test.From16To32/193 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/194 [ OK ] Utf16TestCases/Utf16Test.From16To32/194 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/195 [ OK ] Utf16TestCases/Utf16Test.From16To32/195 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/196 [ OK ] Utf16TestCases/Utf16Test.From16To32/196 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/197 [ OK ] Utf16TestCases/Utf16Test.From16To32/197 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/198 [ OK ] Utf16TestCases/Utf16Test.From16To32/198 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/199 [ OK ] Utf16TestCases/Utf16Test.From16To32/199 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/200 [ OK ] Utf16TestCases/Utf16Test.From16To32/200 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/201 [ OK ] Utf16TestCases/Utf16Test.From16To32/201 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/202 [ OK ] Utf16TestCases/Utf16Test.From16To32/202 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/203 [ OK ] Utf16TestCases/Utf16Test.From16To32/203 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/204 [ OK ] Utf16TestCases/Utf16Test.From16To32/204 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/205 [ OK ] Utf16TestCases/Utf16Test.From16To32/205 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/206 [ OK ] Utf16TestCases/Utf16Test.From16To32/206 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/207 [ OK ] Utf16TestCases/Utf16Test.From16To32/207 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/208 [ OK ] Utf16TestCases/Utf16Test.From16To32/208 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/209 [ OK ] Utf16TestCases/Utf16Test.From16To32/209 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/210 [ OK ] Utf16TestCases/Utf16Test.From16To32/210 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/211 [ OK ] Utf16TestCases/Utf16Test.From16To32/211 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/212 [ OK ] Utf16TestCases/Utf16Test.From16To32/212 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/213 [ OK ] Utf16TestCases/Utf16Test.From16To32/213 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/214 [ OK ] Utf16TestCases/Utf16Test.From16To32/214 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/215 [ OK ] Utf16TestCases/Utf16Test.From16To32/215 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/216 [ OK ] Utf16TestCases/Utf16Test.From16To32/216 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/217 [ OK ] Utf16TestCases/Utf16Test.From16To32/217 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/218 [ OK ] Utf16TestCases/Utf16Test.From16To32/218 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/219 [ OK ] Utf16TestCases/Utf16Test.From16To32/219 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/220 [ OK ] Utf16TestCases/Utf16Test.From16To32/220 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/221 [ OK ] Utf16TestCases/Utf16Test.From16To32/221 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/222 [ OK ] Utf16TestCases/Utf16Test.From16To32/222 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/223 [ OK ] Utf16TestCases/Utf16Test.From16To32/223 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/224 [ OK ] Utf16TestCases/Utf16Test.From16To32/224 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/225 [ OK ] Utf16TestCases/Utf16Test.From16To32/225 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/226 [ OK ] Utf16TestCases/Utf16Test.From16To32/226 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/227 [ OK ] Utf16TestCases/Utf16Test.From16To32/227 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/228 [ OK ] Utf16TestCases/Utf16Test.From16To32/228 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/229 [ OK ] Utf16TestCases/Utf16Test.From16To32/229 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/230 [ OK ] Utf16TestCases/Utf16Test.From16To32/230 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/231 [ OK ] Utf16TestCases/Utf16Test.From16To32/231 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/232 [ OK ] Utf16TestCases/Utf16Test.From16To32/232 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/233 [ OK ] Utf16TestCases/Utf16Test.From16To32/233 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/234 [ OK ] Utf16TestCases/Utf16Test.From16To32/234 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/235 [ OK ] Utf16TestCases/Utf16Test.From16To32/235 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/236 [ OK ] Utf16TestCases/Utf16Test.From16To32/236 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/237 [ OK ] Utf16TestCases/Utf16Test.From16To32/237 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/238 [ OK ] Utf16TestCases/Utf16Test.From16To32/238 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/239 [ OK ] Utf16TestCases/Utf16Test.From16To32/239 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/240 [ OK ] Utf16TestCases/Utf16Test.From16To32/240 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/241 [ OK ] Utf16TestCases/Utf16Test.From16To32/241 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/242 [ OK ] Utf16TestCases/Utf16Test.From16To32/242 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/243 [ OK ] Utf16TestCases/Utf16Test.From16To32/243 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/244 [ OK ] Utf16TestCases/Utf16Test.From16To32/244 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/245 [ OK ] Utf16TestCases/Utf16Test.From16To32/245 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/0 [ OK ] Utf16TestCases/Utf16Test.From32To16/0 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/1 [ OK ] Utf16TestCases/Utf16Test.From32To16/1 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/2 [ OK ] Utf16TestCases/Utf16Test.From32To16/2 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/3 [ OK ] Utf16TestCases/Utf16Test.From32To16/3 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/4 [ OK ] Utf16TestCases/Utf16Test.From32To16/4 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/5 [ OK ] Utf16TestCases/Utf16Test.From32To16/5 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/6 [ OK ] Utf16TestCases/Utf16Test.From32To16/6 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/7 [ OK ] Utf16TestCases/Utf16Test.From32To16/7 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/8 [ OK ] Utf16TestCases/Utf16Test.From32To16/8 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/9 [ OK ] Utf16TestCases/Utf16Test.From32To16/9 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/10 [ OK ] Utf16TestCases/Utf16Test.From32To16/10 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/11 [ OK ] Utf16TestCases/Utf16Test.From32To16/11 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/12 [ OK ] Utf16TestCases/Utf16Test.From32To16/12 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/13 [ OK ] Utf16TestCases/Utf16Test.From32To16/13 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/14 [ OK ] Utf16TestCases/Utf16Test.From32To16/14 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/15 [ OK ] Utf16TestCases/Utf16Test.From32To16/15 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/16 [ OK ] Utf16TestCases/Utf16Test.From32To16/16 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/17 [ OK ] Utf16TestCases/Utf16Test.From32To16/17 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/18 [ OK ] Utf16TestCases/Utf16Test.From32To16/18 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/19 [ OK ] Utf16TestCases/Utf16Test.From32To16/19 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/20 [ OK ] Utf16TestCases/Utf16Test.From32To16/20 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/21 [ OK ] Utf16TestCases/Utf16Test.From32To16/21 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/22 [ OK ] Utf16TestCases/Utf16Test.From32To16/22 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/23 [ OK ] Utf16TestCases/Utf16Test.From32To16/23 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/24 [ OK ] Utf16TestCases/Utf16Test.From32To16/24 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/25 [ OK ] Utf16TestCases/Utf16Test.From32To16/25 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/26 [ OK ] Utf16TestCases/Utf16Test.From32To16/26 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/27 [ OK ] Utf16TestCases/Utf16Test.From32To16/27 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/28 [ OK ] Utf16TestCases/Utf16Test.From32To16/28 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/29 [ OK ] Utf16TestCases/Utf16Test.From32To16/29 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/30 [ OK ] Utf16TestCases/Utf16Test.From32To16/30 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/31 [ OK ] Utf16TestCases/Utf16Test.From32To16/31 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/32 [ OK ] Utf16TestCases/Utf16Test.From32To16/32 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/33 [ OK ] Utf16TestCases/Utf16Test.From32To16/33 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/34 [ OK ] Utf16TestCases/Utf16Test.From32To16/34 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/35 [ OK ] Utf16TestCases/Utf16Test.From32To16/35 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/36 [ OK ] Utf16TestCases/Utf16Test.From32To16/36 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/37 [ OK ] Utf16TestCases/Utf16Test.From32To16/37 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/38 [ OK ] Utf16TestCases/Utf16Test.From32To16/38 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/39 [ OK ] Utf16TestCases/Utf16Test.From32To16/39 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/40 [ OK ] Utf16TestCases/Utf16Test.From32To16/40 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/41 [ OK ] Utf16TestCases/Utf16Test.From32To16/41 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/42 [ OK ] Utf16TestCases/Utf16Test.From32To16/42 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/43 [ OK ] Utf16TestCases/Utf16Test.From32To16/43 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/44 [ OK ] Utf16TestCases/Utf16Test.From32To16/44 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/45 [ OK ] Utf16TestCases/Utf16Test.From32To16/45 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/46 [ OK ] Utf16TestCases/Utf16Test.From32To16/46 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/47 [ OK ] Utf16TestCases/Utf16Test.From32To16/47 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/48 [ OK ] Utf16TestCases/Utf16Test.From32To16/48 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/49 [ OK ] Utf16TestCases/Utf16Test.From32To16/49 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/50 [ OK ] Utf16TestCases/Utf16Test.From32To16/50 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/51 [ OK ] Utf16TestCases/Utf16Test.From32To16/51 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/52 [ OK ] Utf16TestCases/Utf16Test.From32To16/52 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/53 [ OK ] Utf16TestCases/Utf16Test.From32To16/53 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/54 [ OK ] Utf16TestCases/Utf16Test.From32To16/54 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/55 [ OK ] Utf16TestCases/Utf16Test.From32To16/55 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/56 [ OK ] Utf16TestCases/Utf16Test.From32To16/56 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/57 [ OK ] Utf16TestCases/Utf16Test.From32To16/57 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/58 [ OK ] Utf16TestCases/Utf16Test.From32To16/58 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/59 [ OK ] Utf16TestCases/Utf16Test.From32To16/59 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/60 [ OK ] Utf16TestCases/Utf16Test.From32To16/60 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/61 [ OK ] Utf16TestCases/Utf16Test.From32To16/61 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/62 [ OK ] Utf16TestCases/Utf16Test.From32To16/62 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/63 [ OK ] Utf16TestCases/Utf16Test.From32To16/63 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/64 [ OK ] Utf16TestCases/Utf16Test.From32To16/64 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/65 [ OK ] Utf16TestCases/Utf16Test.From32To16/65 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/66 [ OK ] Utf16TestCases/Utf16Test.From32To16/66 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/67 [ OK ] Utf16TestCases/Utf16Test.From32To16/67 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/68 [ OK ] Utf16TestCases/Utf16Test.From32To16/68 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/69 [ OK ] Utf16TestCases/Utf16Test.From32To16/69 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/70 [ OK ] Utf16TestCases/Utf16Test.From32To16/70 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/71 [ OK ] Utf16TestCases/Utf16Test.From32To16/71 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/72 [ OK ] Utf16TestCases/Utf16Test.From32To16/72 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/73 [ OK ] Utf16TestCases/Utf16Test.From32To16/73 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/74 [ OK ] Utf16TestCases/Utf16Test.From32To16/74 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/75 [ OK ] Utf16TestCases/Utf16Test.From32To16/75 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/76 [ OK ] Utf16TestCases/Utf16Test.From32To16/76 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/77 [ OK ] Utf16TestCases/Utf16Test.From32To16/77 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/78 [ OK ] Utf16TestCases/Utf16Test.From32To16/78 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/79 [ OK ] Utf16TestCases/Utf16Test.From32To16/79 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/80 [ OK ] Utf16TestCases/Utf16Test.From32To16/80 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/81 [ OK ] Utf16TestCases/Utf16Test.From32To16/81 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/82 [ OK ] Utf16TestCases/Utf16Test.From32To16/82 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/83 [ OK ] Utf16TestCases/Utf16Test.From32To16/83 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/84 [ OK ] Utf16TestCases/Utf16Test.From32To16/84 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/85 [ OK ] Utf16TestCases/Utf16Test.From32To16/85 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/86 [ OK ] Utf16TestCases/Utf16Test.From32To16/86 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/87 [ OK ] Utf16TestCases/Utf16Test.From32To16/87 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/88 [ OK ] Utf16TestCases/Utf16Test.From32To16/88 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/89 [ OK ] Utf16TestCases/Utf16Test.From32To16/89 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/90 [ OK ] Utf16TestCases/Utf16Test.From32To16/90 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/91 [ OK ] Utf16TestCases/Utf16Test.From32To16/91 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/92 [ OK ] Utf16TestCases/Utf16Test.From32To16/92 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/93 [ OK ] Utf16TestCases/Utf16Test.From32To16/93 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/94 [ OK ] Utf16TestCases/Utf16Test.From32To16/94 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/95 [ OK ] Utf16TestCases/Utf16Test.From32To16/95 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/96 [ OK ] Utf16TestCases/Utf16Test.From32To16/96 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/97 [ OK ] Utf16TestCases/Utf16Test.From32To16/97 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/98 [ OK ] Utf16TestCases/Utf16Test.From32To16/98 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/99 [ OK ] Utf16TestCases/Utf16Test.From32To16/99 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/100 [ OK ] Utf16TestCases/Utf16Test.From32To16/100 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/101 [ OK ] Utf16TestCases/Utf16Test.From32To16/101 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/102 [ OK ] Utf16TestCases/Utf16Test.From32To16/102 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/103 [ OK ] Utf16TestCases/Utf16Test.From32To16/103 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/104 [ OK ] Utf16TestCases/Utf16Test.From32To16/104 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/105 [ OK ] Utf16TestCases/Utf16Test.From32To16/105 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/106 [ OK ] Utf16TestCases/Utf16Test.From32To16/106 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/107 [ OK ] Utf16TestCases/Utf16Test.From32To16/107 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/108 [ OK ] Utf16TestCases/Utf16Test.From32To16/108 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/109 [ OK ] Utf16TestCases/Utf16Test.From32To16/109 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/110 [ OK ] Utf16TestCases/Utf16Test.From32To16/110 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/111 [ OK ] Utf16TestCases/Utf16Test.From32To16/111 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/112 [ OK ] Utf16TestCases/Utf16Test.From32To16/112 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/113 [ OK ] Utf16TestCases/Utf16Test.From32To16/113 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/114 [ OK ] Utf16TestCases/Utf16Test.From32To16/114 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/115 [ OK ] Utf16TestCases/Utf16Test.From32To16/115 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/116 [ OK ] Utf16TestCases/Utf16Test.From32To16/116 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/117 [ OK ] Utf16TestCases/Utf16Test.From32To16/117 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/118 [ OK ] Utf16TestCases/Utf16Test.From32To16/118 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/119 [ OK ] Utf16TestCases/Utf16Test.From32To16/119 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/120 [ OK ] Utf16TestCases/Utf16Test.From32To16/120 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/121 [ OK ] Utf16TestCases/Utf16Test.From32To16/121 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/122 [ OK ] Utf16TestCases/Utf16Test.From32To16/122 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/123 [ OK ] Utf16TestCases/Utf16Test.From32To16/123 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/124 [ OK ] Utf16TestCases/Utf16Test.From32To16/124 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/125 [ OK ] Utf16TestCases/Utf16Test.From32To16/125 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/126 [ OK ] Utf16TestCases/Utf16Test.From32To16/126 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/127 [ OK ] Utf16TestCases/Utf16Test.From32To16/127 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/128 [ OK ] Utf16TestCases/Utf16Test.From32To16/128 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/129 [ OK ] Utf16TestCases/Utf16Test.From32To16/129 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/130 [ OK ] Utf16TestCases/Utf16Test.From32To16/130 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/131 [ OK ] Utf16TestCases/Utf16Test.From32To16/131 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/132 [ OK ] Utf16TestCases/Utf16Test.From32To16/132 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/133 [ OK ] Utf16TestCases/Utf16Test.From32To16/133 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/134 [ OK ] Utf16TestCases/Utf16Test.From32To16/134 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/135 [ OK ] Utf16TestCases/Utf16Test.From32To16/135 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/136 [ OK ] Utf16TestCases/Utf16Test.From32To16/136 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/137 [ OK ] Utf16TestCases/Utf16Test.From32To16/137 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/138 [ OK ] Utf16TestCases/Utf16Test.From32To16/138 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/139 [ OK ] Utf16TestCases/Utf16Test.From32To16/139 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/140 [ OK ] Utf16TestCases/Utf16Test.From32To16/140 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/141 [ OK ] Utf16TestCases/Utf16Test.From32To16/141 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/142 [ OK ] Utf16TestCases/Utf16Test.From32To16/142 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/143 [ OK ] Utf16TestCases/Utf16Test.From32To16/143 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/144 [ OK ] Utf16TestCases/Utf16Test.From32To16/144 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/145 [ OK ] Utf16TestCases/Utf16Test.From32To16/145 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/146 [ OK ] Utf16TestCases/Utf16Test.From32To16/146 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/147 [ OK ] Utf16TestCases/Utf16Test.From32To16/147 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/148 [ OK ] Utf16TestCases/Utf16Test.From32To16/148 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/149 [ OK ] Utf16TestCases/Utf16Test.From32To16/149 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/150 [ OK ] Utf16TestCases/Utf16Test.From32To16/150 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/151 [ OK ] Utf16TestCases/Utf16Test.From32To16/151 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/152 [ OK ] Utf16TestCases/Utf16Test.From32To16/152 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/153 [ OK ] Utf16TestCases/Utf16Test.From32To16/153 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/154 [ OK ] Utf16TestCases/Utf16Test.From32To16/154 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/155 [ OK ] Utf16TestCases/Utf16Test.From32To16/155 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/156 [ OK ] Utf16TestCases/Utf16Test.From32To16/156 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/157 [ OK ] Utf16TestCases/Utf16Test.From32To16/157 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/158 [ OK ] Utf16TestCases/Utf16Test.From32To16/158 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/159 [ OK ] Utf16TestCases/Utf16Test.From32To16/159 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/160 [ OK ] Utf16TestCases/Utf16Test.From32To16/160 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/161 [ OK ] Utf16TestCases/Utf16Test.From32To16/161 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/162 [ OK ] Utf16TestCases/Utf16Test.From32To16/162 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/163 [ OK ] Utf16TestCases/Utf16Test.From32To16/163 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/164 [ OK ] Utf16TestCases/Utf16Test.From32To16/164 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/165 [ OK ] Utf16TestCases/Utf16Test.From32To16/165 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/166 [ OK ] Utf16TestCases/Utf16Test.From32To16/166 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/167 [ OK ] Utf16TestCases/Utf16Test.From32To16/167 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/168 [ OK ] Utf16TestCases/Utf16Test.From32To16/168 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/169 [ OK ] Utf16TestCases/Utf16Test.From32To16/169 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/170 [ OK ] Utf16TestCases/Utf16Test.From32To16/170 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/171 [ OK ] Utf16TestCases/Utf16Test.From32To16/171 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/172 [ OK ] Utf16TestCases/Utf16Test.From32To16/172 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/173 [ OK ] Utf16TestCases/Utf16Test.From32To16/173 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/174 [ OK ] Utf16TestCases/Utf16Test.From32To16/174 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/175 [ OK ] Utf16TestCases/Utf16Test.From32To16/175 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/176 [ OK ] Utf16TestCases/Utf16Test.From32To16/176 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/177 [ OK ] Utf16TestCases/Utf16Test.From32To16/177 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/178 [ OK ] Utf16TestCases/Utf16Test.From32To16/178 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/179 [ OK ] Utf16TestCases/Utf16Test.From32To16/179 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/180 [ OK ] Utf16TestCases/Utf16Test.From32To16/180 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/181 [ OK ] Utf16TestCases/Utf16Test.From32To16/181 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/182 [ OK ] Utf16TestCases/Utf16Test.From32To16/182 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/183 [ OK ] Utf16TestCases/Utf16Test.From32To16/183 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/184 [ OK ] Utf16TestCases/Utf16Test.From32To16/184 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/185 [ OK ] Utf16TestCases/Utf16Test.From32To16/185 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/186 [ OK ] Utf16TestCases/Utf16Test.From32To16/186 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/187 [ OK ] Utf16TestCases/Utf16Test.From32To16/187 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/188 [ OK ] Utf16TestCases/Utf16Test.From32To16/188 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/189 [ OK ] Utf16TestCases/Utf16Test.From32To16/189 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/190 [ OK ] Utf16TestCases/Utf16Test.From32To16/190 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/191 [ OK ] Utf16TestCases/Utf16Test.From32To16/191 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/192 [ OK ] Utf16TestCases/Utf16Test.From32To16/192 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/193 [ OK ] Utf16TestCases/Utf16Test.From32To16/193 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/194 [ OK ] Utf16TestCases/Utf16Test.From32To16/194 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/195 [ OK ] Utf16TestCases/Utf16Test.From32To16/195 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/196 [ OK ] Utf16TestCases/Utf16Test.From32To16/196 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/197 [ OK ] Utf16TestCases/Utf16Test.From32To16/197 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/198 [ OK ] Utf16TestCases/Utf16Test.From32To16/198 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/199 [ OK ] Utf16TestCases/Utf16Test.From32To16/199 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/200 [ OK ] Utf16TestCases/Utf16Test.From32To16/200 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/201 [ OK ] Utf16TestCases/Utf16Test.From32To16/201 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/202 [ OK ] Utf16TestCases/Utf16Test.From32To16/202 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/203 [ OK ] Utf16TestCases/Utf16Test.From32To16/203 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/204 [ OK ] Utf16TestCases/Utf16Test.From32To16/204 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/205 [ OK ] Utf16TestCases/Utf16Test.From32To16/205 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/206 [ OK ] Utf16TestCases/Utf16Test.From32To16/206 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/207 [ OK ] Utf16TestCases/Utf16Test.From32To16/207 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/208 [ OK ] Utf16TestCases/Utf16Test.From32To16/208 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/209 [ OK ] Utf16TestCases/Utf16Test.From32To16/209 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/210 [ OK ] Utf16TestCases/Utf16Test.From32To16/210 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/211 [ OK ] Utf16TestCases/Utf16Test.From32To16/211 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/212 [ OK ] Utf16TestCases/Utf16Test.From32To16/212 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/213 [ OK ] Utf16TestCases/Utf16Test.From32To16/213 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/214 [ OK ] Utf16TestCases/Utf16Test.From32To16/214 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/215 [ OK ] Utf16TestCases/Utf16Test.From32To16/215 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/216 [ OK ] Utf16TestCases/Utf16Test.From32To16/216 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/217 [ OK ] Utf16TestCases/Utf16Test.From32To16/217 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/218 [ OK ] Utf16TestCases/Utf16Test.From32To16/218 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/219 [ OK ] Utf16TestCases/Utf16Test.From32To16/219 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/220 [ OK ] Utf16TestCases/Utf16Test.From32To16/220 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/221 [ OK ] Utf16TestCases/Utf16Test.From32To16/221 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/222 [ OK ] Utf16TestCases/Utf16Test.From32To16/222 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/223 [ OK ] Utf16TestCases/Utf16Test.From32To16/223 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/224 [ OK ] Utf16TestCases/Utf16Test.From32To16/224 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/225 [ OK ] Utf16TestCases/Utf16Test.From32To16/225 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/226 [ OK ] Utf16TestCases/Utf16Test.From32To16/226 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/227 [ OK ] Utf16TestCases/Utf16Test.From32To16/227 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/228 [ OK ] Utf16TestCases/Utf16Test.From32To16/228 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/229 [ OK ] Utf16TestCases/Utf16Test.From32To16/229 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/230 [ OK ] Utf16TestCases/Utf16Test.From32To16/230 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/231 [ OK ] Utf16TestCases/Utf16Test.From32To16/231 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/232 [ OK ] Utf16TestCases/Utf16Test.From32To16/232 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/233 [ OK ] Utf16TestCases/Utf16Test.From32To16/233 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/234 [ OK ] Utf16TestCases/Utf16Test.From32To16/234 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/235 [ OK ] Utf16TestCases/Utf16Test.From32To16/235 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/236 [ OK ] Utf16TestCases/Utf16Test.From32To16/236 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/237 [ OK ] Utf16TestCases/Utf16Test.From32To16/237 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/238 [ OK ] Utf16TestCases/Utf16Test.From32To16/238 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/239 [ OK ] Utf16TestCases/Utf16Test.From32To16/239 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/240 [ OK ] Utf16TestCases/Utf16Test.From32To16/240 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/241 [ OK ] Utf16TestCases/Utf16Test.From32To16/241 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/242 [ OK ] Utf16TestCases/Utf16Test.From32To16/242 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/243 [ OK ] Utf16TestCases/Utf16Test.From32To16/243 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/244 [ OK ] Utf16TestCases/Utf16Test.From32To16/244 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/245 [ OK ] Utf16TestCases/Utf16Test.From32To16/245 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/0 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/0 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/1 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/1 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/2 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/2 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/3 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/3 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/4 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/4 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/5 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/5 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/6 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/6 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/7 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/7 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/8 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/8 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/9 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/9 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/10 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/10 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/11 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/11 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/12 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/12 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/13 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/13 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/14 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/14 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/15 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/15 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/16 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/16 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/17 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/17 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/18 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/18 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/19 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/19 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/20 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/20 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/21 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/21 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/22 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/22 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/23 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/23 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/24 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/24 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/25 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/25 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/26 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/26 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/27 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/27 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/28 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/28 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/29 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/29 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/30 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/30 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/31 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/31 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/32 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/32 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/33 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/33 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/34 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/34 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/35 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/35 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/36 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/36 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/37 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/37 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/38 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/38 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/39 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/39 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/40 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/40 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/41 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/41 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/42 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/42 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/43 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/43 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/44 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/44 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/45 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/45 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/46 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/46 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/47 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/47 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/48 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/48 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/49 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/49 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/50 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/50 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/51 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/51 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/52 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/52 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/53 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/53 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/54 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/54 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/55 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/55 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/56 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/56 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/57 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/57 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/58 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/58 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/59 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/59 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/60 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/60 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/61 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/61 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/62 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/62 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/63 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/63 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/64 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/64 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/65 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/65 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/66 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/66 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/67 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/67 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/68 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/68 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/69 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/69 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/70 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/70 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/71 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/71 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/72 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/72 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/73 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/73 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/74 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/74 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/75 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/75 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/76 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/76 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/77 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/77 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/78 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/78 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/79 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/79 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/80 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/80 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/81 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/81 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/82 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/82 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/83 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/83 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/84 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/84 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/85 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/85 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/86 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/86 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/87 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/87 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/88 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/88 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/89 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/89 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/90 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/90 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/91 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/91 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/92 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/92 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/93 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/93 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/94 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/94 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/95 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/95 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/96 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/96 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/97 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/97 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/98 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/98 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/99 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/99 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/100 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/100 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/101 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/101 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/102 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/102 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/103 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/103 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/104 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/104 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/105 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/105 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/106 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/106 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/107 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/107 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/108 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/108 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/109 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/109 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/110 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/110 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/111 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/111 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/112 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/112 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/113 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/113 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/114 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/114 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/115 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/115 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/116 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/116 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/117 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/117 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/118 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/118 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/119 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/119 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/120 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/120 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/121 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/121 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/122 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/122 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/123 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/123 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/124 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/124 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/125 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/125 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/126 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/126 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/127 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/127 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/128 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/128 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/129 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/129 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/130 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/130 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/131 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/131 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/132 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/132 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/133 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/133 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/134 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/134 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/135 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/135 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/136 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/136 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/137 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/137 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/138 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/138 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/139 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/139 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/140 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/140 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/141 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/141 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/142 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/142 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/143 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/143 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/144 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/144 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/145 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/145 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/146 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/146 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/147 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/147 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/148 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/148 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/149 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/149 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/150 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/150 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/151 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/151 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/152 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/152 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/153 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/153 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/154 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/154 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/155 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/155 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/156 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/156 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/157 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/157 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/158 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/158 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/159 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/159 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/160 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/160 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/161 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/161 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/162 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/162 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/163 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/163 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/164 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/164 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/165 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/165 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/166 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/166 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/167 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/167 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/168 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/168 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/169 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/169 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/170 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/170 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/171 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/171 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/172 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/172 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/173 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/173 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/174 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/174 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/175 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/175 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/176 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/176 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/177 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/177 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/178 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/178 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/179 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/179 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/180 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/180 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/181 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/181 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/182 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/182 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/183 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/183 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/184 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/184 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/185 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/185 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/186 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/186 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/187 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/187 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/188 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/188 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/189 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/189 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/190 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/190 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/191 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/191 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/192 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/192 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/193 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/193 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/194 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/194 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/195 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/195 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/196 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/196 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/197 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/197 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/198 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/198 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/199 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/199 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/200 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/200 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/201 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/201 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/202 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/202 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/203 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/203 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/204 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/204 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/205 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/205 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/206 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/206 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/207 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/207 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/208 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/208 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/209 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/209 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/210 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/210 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/211 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/211 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/212 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/212 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/213 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/213 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/214 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/214 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/215 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/215 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/216 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/216 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/217 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/217 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/218 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/218 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/219 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/219 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/220 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/220 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/221 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/221 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/222 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/222 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/223 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/223 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/224 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/224 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/225 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/225 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/226 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/226 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/227 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/227 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/228 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/228 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/229 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/229 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/230 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/230 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/231 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/231 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/232 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/232 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/233 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/233 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/234 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/234 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/235 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/235 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/236 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/236 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/237 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/237 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/238 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/238 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/239 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/239 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/240 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/240 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/241 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/241 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/242 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/242 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/243 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/243 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/244 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/244 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/245 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/245 (0 ms) [----------] 738 tests from Utf16TestCases/Utf16Test (2 ms total) [----------] 78 tests from BadUtf8TestCases/BadUtf8Test [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38 (0 ms) [----------] 78 tests from BadUtf8TestCases/BadUtf8Test (0 ms total) [----------] 9 tests from BadUtf16TestCases/BadUtf16Test [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/7 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/7 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/8 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/8 (0 ms) [----------] 9 tests from BadUtf16TestCases/BadUtf16Test (0 ms total) [----------] 22 tests from Iso88591TestCases/Iso88591Test [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/0 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/0 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/1 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/1 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/2 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/2 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/3 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/3 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/4 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/4 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/5 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/5 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/6 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/6 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/7 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/7 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/8 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/8 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/9 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/9 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/10 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/10 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/11 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/11 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/12 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/12 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/13 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/13 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/14 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/14 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/15 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/15 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/16 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/16 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/17 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/17 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/18 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/18 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/19 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/19 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/20 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/20 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/21 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/21 (0 ms) [----------] 22 tests from Iso88591TestCases/Iso88591Test (1 ms total) [----------] Global test environment tear-down [==========] 1960 tests from 13 test suites ran. (6 ms total) [ PASSED ] 1960 tests. YOU HAVE 3 DISABLED TESTS gtests.sh: #12: util_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/util_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: freebl_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/freebl_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/freebl_gtest -n dummy -s CN=dummy -t ,, -x -m 7 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #13: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/freebl_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing freebl_gtest [==========] Running 68 tests from 6 test suites. [----------] Global test environment set-up. [----------] 14 tests from MPITest [ RUN ] MPITest.MpiCmp01Test [ OK ] MPITest.MpiCmp01Test (0 ms) [ RUN ] MPITest.MpiCmp10Test [ OK ] MPITest.MpiCmp10Test (0 ms) [ RUN ] MPITest.MpiCmp00Test [ OK ] MPITest.MpiCmp00Test (0 ms) [ RUN ] MPITest.MpiCmp11Test [ OK ] MPITest.MpiCmp11Test (0 ms) [ RUN ] MPITest.MpiDiv32ErrorTest [ OK ] MPITest.MpiDiv32ErrorTest (0 ms) [ RUN ] MPITest.MpiCmpUnalignedTest [ OK ] MPITest.MpiCmpUnalignedTest (0 ms) [ RUN ] MPITest.MpiSetUlong [ OK ] MPITest.MpiSetUlong (0 ms) [ RUN ] MPITest.MpiSetInt [ OK ] MPITest.MpiSetInt (0 ms) [ RUN ] MPITest.MpiFixlenOctetsZero value: [1] 00 output: [1] 00 value: [1] 00 output: [2] 0000 value: [1] 00 output: [8] 0000000000000000 value: [1] 00 output: [9] 000000000000000000 [ OK ] MPITest.MpiFixlenOctetsZero (0 ms) [ RUN ] MPITest.MpiRadixSizeNeg [ OK ] MPITest.MpiRadixSizeNeg (1 ms) [ RUN ] MPITest.MpiFixlenOctetsVarlen value: [1] a4 output: [1] a4 value: [1] a4 output: [2] 00a4 value: [1] a4 output: [9] 0000000000000000a4 value: [2] a4a4 output: [2] a4a4 value: [2] a4a4 output: [3] 00a4a4 value: [2] a4a4 output: [10] 0000000000000000a4a4 value: [3] a4a4a4 output: [3] a4a4a4 value: [3] a4a4a4 output: [4] 00a4a4a4 value: [3] a4a4a4 output: [11] 0000000000000000a4a4a4 value: [4] a4a4a4a4 output: [4] a4a4a4a4 value: [4] a4a4a4a4 output: [5] 00a4a4a4a4 value: [4] a4a4a4a4 output: [12] 0000000000000000a4a4a4a4 value: [5] a4a4a4a4a4 output: [5] a4a4a4a4a4 value: [5] a4a4a4a4a4 output: [6] 00a4a4a4a4a4 value: [5] a4a4a4a4a4 output: [13] 0000000000000000a4a4a4a4a4 value: [6] a4a4a4a4a4a4 output: [6] a4a4a4a4a4a4 value: [6] a4a4a4a4a4a4 output: [7] 00a4a4a4a4a4a4 value: [6] a4a4a4a4a4a4 output: [14] 0000000000000000a4a4a4a4a4a4 value: [7] a4a4a4a4a4a4a4 output: [7] a4a4a4a4a4a4a4 value: [7] a4a4a4a4a4a4a4 output: [8] 00a4a4a4a4a4a4a4 value: [7] a4a4a4a4a4a4a4 output: [15] 0000000000000000a4a4a4a4a4a4a4 value: [8] a4a4a4a4a4a4a4a4 output: [8] a4a4a4a4a4a4a4a4 value: [8] a4a4a4a4a4a4a4a4 output: [9] 00a4a4a4a4a4a4a4a4 value: [8] a4a4a4a4a4a4a4a4 output: [16] 0000000000000000a4a4a4a4a4a4a4a4 value: [9] a4a4a4a4a4a4a4a4a4 output: [9] a4a4a4a4a4a4a4a4a4 value: [9] a4a4a4a4a4a4a4a4a4 output: [10] 00a4a4a4a4a4a4a4a4a4 value: [9] a4a4a4a4a4a4a4a4a4 output: [17] 0000000000000000a4a4a4a4a4a4a4a4a4 value: [10] a4a4a4a4a4a4a4a4a4a4 output: [10] a4a4a4a4a4a4a4a4a4a4 value: [10] a4a4a4a4a4a4a4a4a4a4 output: [11] 00a4a4a4a4a4a4a4a4a4a4 value: [10] a4a4a4a4a4a4a4a4a4a4 output: [18] 0000000000000000a4a4a4a4a4a4a4a4a4a4 value: [11] a4a4a4a4a4a4a4a4a4a4a4 output: [11] a4a4a4a4a4a4a4a4a4a4a4 value: [11] a4a4a4a4a4a4a4a4a4a4a4 output: [12] 00a4a4a4a4a4a4a4a4a4a4a4 value: [11] a4a4a4a4a4a4a4a4a4a4a4 output: [19] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4 value: [12] a4a4a4a4a4a4a4a4a4a4a4a4 output: [12] a4a4a4a4a4a4a4a4a4a4a4a4 value: [12] a4a4a4a4a4a4a4a4a4a4a4a4 output: [13] 00a4a4a4a4a4a4a4a4a4a4a4a4 value: [12] a4a4a4a4a4a4a4a4a4a4a4a4 output: [20] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4 value: [13] a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [13] a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [13] a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [14] 00a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [13] a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [21] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [14] a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [14] a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [14] a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [15] 00a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [14] a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [22] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [15] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [15] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [15] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [16] 00a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [15] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [23] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [16] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [16] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [16] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [17] 00a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [16] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [24] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 [ OK ] MPITest.MpiFixlenOctetsVarlen (0 ms) [ RUN ] MPITest.MpiFixlenOctetsTooSmall ref: [1] 03 ref: [2] 0303 ref: [3] 030303 ref: [4] 03030303 ref: [5] 0303030303 ref: [6] 030303030303 ref: [7] 03030303030303 ref: [8] 0303030303030303 ref: [9] 030303030303030303 ref: [10] 03030303030303030303 ref: [11] 0303030303030303030303 ref: [12] 030303030303030303030303 ref: [13] 03030303030303030303030303 ref: [14] 0303030303030303030303030303 ref: [15] 030303030303030303030303030303 ref: [16] 03030303030303030303030303030303 [ OK ] MPITest.MpiFixlenOctetsTooSmall (1 ms) [ RUN ] MPITest.MpiSqrMulClamp [ OK ] MPITest.MpiSqrMulClamp (0 ms) [ RUN ] MPITest.MpiInvModLoop [ OK ] MPITest.MpiInvModLoop (0 ms) [----------] 14 tests from MPITest (2 ms total) [----------] 3 tests from DHTest [ RUN ] DHTest.DhGenParamSuccessTest16 [ OK ] DHTest.DhGenParamSuccessTest16 (33 ms) [ RUN ] DHTest.DhGenParamSuccessTest224 [ OK ] DHTest.DhGenParamSuccessTest224 (2813 ms) [ RUN ] DHTest.DhGenParamSuccessTest256 [ OK ] DHTest.DhGenParamSuccessTest256 (6735 ms) [----------] 3 tests from DHTest (9582 ms total) [----------] 2 tests from ECLTest [ RUN ] ECLTest.TestECDH_DeriveP256 [ OK ] ECLTest.TestECDH_DeriveP256 (0 ms) [ RUN ] ECLTest.TestECDH_DeriveP521 derived secret: 01BC33425E72A12779EACB2EDCC5B63D1281F7E86DBC7BF99A7ABD0CFE367DE4666D6EDBB8525BFFE5222F0702C3096DEC0884CE572F5A15C423FDF44D01DD99C61D [ OK ] ECLTest.TestECDH_DeriveP521 (1 ms) [----------] 2 tests from ECLTest (1 ms total) [----------] 6 tests from RSATest [ RUN ] RSATest.expOneTest [ OK ] RSATest.expOneTest (0 ms) [ RUN ] RSATest.expTwoTest [ OK ] RSATest.expTwoTest (0 ms) [ RUN ] RSATest.expFourTest [ OK ] RSATest.expFourTest (0 ms) [ RUN ] RSATest.WrongKeysizeTest [ OK ] RSATest.WrongKeysizeTest (0 ms) [ RUN ] RSATest.expThreeTest [ OK ] RSATest.expThreeTest (1622 ms) [ RUN ] RSATest.DecryptBlockTestErrors [ OK ] RSATest.DecryptBlockTestErrors (79 ms) [----------] 6 tests from RSATest (1701 ms total) [----------] 5 tests from CmacAesTest [ RUN ] CmacAesTest.CreateInvalidSize [ OK ] CmacAesTest.CreateInvalidSize (0 ms) [ RUN ] CmacAesTest.CreateRightSize [ OK ] CmacAesTest.CreateRightSize (0 ms) [ RUN ] CmacAesTest.AesNistAligned [ OK ] CmacAesTest.AesNistAligned (0 ms) [ RUN ] CmacAesTest.AesNistUnaligned [ OK ] CmacAesTest.AesNistUnaligned (0 ms) [ RUN ] CmacAesTest.AesNistTruncated [ OK ] CmacAesTest.AesNistTruncated (0 ms) [----------] 5 tests from CmacAesTest (0 ms total) [----------] 38 tests from NISTTestVector/GHashTest [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/0 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/0 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/1 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/1 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/2 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/2 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/3 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/3 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/4 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/4 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/5 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/5 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/6 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/6 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/7 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/7 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/8 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/8 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/9 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/9 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/10 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/10 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/11 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/11 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/12 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/12 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/13 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/13 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/14 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/14 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/15 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/15 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/16 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/16 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/17 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/17 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/18 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/18 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/0 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/0 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/1 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/1 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/2 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/2 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/3 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/3 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/4 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/4 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/5 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/5 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/6 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/6 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/7 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/7 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/8 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/8 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/9 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/9 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/10 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/10 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/11 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/11 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/12 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/12 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/13 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/13 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/14 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/14 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/15 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/15 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/16 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/16 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/17 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/17 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/18 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/18 (0 ms) [----------] 38 tests from NISTTestVector/GHashTest (0 ms total) [----------] Global test environment tear-down [==========] 68 tests from 6 test suites ran. (11286 ms total) [ PASSED ] 68 tests. YOU HAVE 1 DISABLED TEST gtests.sh: #14: freebl_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/freebl_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: softoken_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/softoken_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/softoken_gtest -n dummy -s CN=dummy -t ,, -x -m 8 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #15: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/softoken_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing softoken_gtest [==========] Running 76 tests from 6 test suites. [----------] Global test environment set-up. [----------] 14 tests from SoftokenTest [ RUN ] SoftokenTest.CheckDefaultPbkdf2Iterations [ OK ] SoftokenTest.CheckDefaultPbkdf2Iterations (18 ms) [ RUN ] SoftokenTest.ResetSoftokenEmptyPassword [ OK ] SoftokenTest.ResetSoftokenEmptyPassword (5 ms) [ RUN ] SoftokenTest.ResetSoftokenNonEmptyPassword [ OK ] SoftokenTest.ResetSoftokenNonEmptyPassword (32 ms) [ RUN ] SoftokenTest.GetInvalidAttribute [ OK ] SoftokenTest.GetInvalidAttribute (99 ms) [ RUN ] SoftokenTest.GetValidAttributes [ OK ] SoftokenTest.GetValidAttributes (114 ms) [ RUN ] SoftokenTest.GetOnlyInvalidAttributes [ OK ] SoftokenTest.GetOnlyInvalidAttributes (100 ms) [ RUN ] SoftokenTest.GetAttributesInvalidInterspersed1 [ OK ] SoftokenTest.GetAttributesInvalidInterspersed1 (113 ms) [ RUN ] SoftokenTest.GetAttributesInvalidInterspersed2 [ OK ] SoftokenTest.GetAttributesInvalidInterspersed2 (115 ms) [ RUN ] SoftokenTest.GetAttributesInvalidInterspersed3 [ OK ] SoftokenTest.GetAttributesInvalidInterspersed3 (114 ms) [ RUN ] SoftokenTest.CreateObjectNonEmptyPassword [ OK ] SoftokenTest.CreateObjectNonEmptyPassword (17 ms) [ RUN ] SoftokenTest.CreateObjectChangePassword [ OK ] SoftokenTest.CreateObjectChangePassword (17 ms) [ RUN ] SoftokenTest.CreateObjectChangeToBigPassword [ OK ] SoftokenTest.CreateObjectChangeToBigPassword (18 ms) [ RUN ] SoftokenTest.CreateObjectChangeToEmptyPassword [ OK ] SoftokenTest.CreateObjectChangeToEmptyPassword (18 ms) [ RUN ] SoftokenTest.CreateObjectReadBreakLine [ OK ] SoftokenTest.CreateObjectReadBreakLine (7 ms) [----------] 14 tests from SoftokenTest (787 ms total) [----------] 1 test from SoftokenNonAsciiTest [ RUN ] SoftokenNonAsciiTest.NonAsciiPathWorking [ OK ] SoftokenNonAsciiTest.NonAsciiPathWorking (5 ms) [----------] 1 test from SoftokenNonAsciiTest (5 ms total) [----------] 1 test from SoftokenNoDBTest [ RUN ] SoftokenNoDBTest.NeedUserInitNoDB [ OK ] SoftokenNoDBTest.NeedUserInitNoDB (0 ms) [----------] 1 test from SoftokenNoDBTest (0 ms total) [----------] 3 tests from SoftokenBuiltinsTest [ RUN ] SoftokenBuiltinsTest.CheckNoDistrustFields [ OK ] SoftokenBuiltinsTest.CheckNoDistrustFields (3 ms) [ RUN ] SoftokenBuiltinsTest.CheckOkDistrustFields [ OK ] SoftokenBuiltinsTest.CheckOkDistrustFields (4 ms) [ RUN ] SoftokenBuiltinsTest.CheckInvalidDistrustFields [ OK ] SoftokenBuiltinsTest.CheckInvalidDistrustFields (3 ms) [----------] 3 tests from SoftokenBuiltinsTest (10 ms total) [----------] 3 tests from SoftokenPasswordChangeTests/SoftokenPasswordChangeTest [ RUN ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/0 [ OK ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/0 (226 ms) [ RUN ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/1 [ OK ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/1 (254 ms) [ RUN ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/2 [ OK ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/2 (473 ms) [----------] 3 tests from SoftokenPasswordChangeTests/SoftokenPasswordChangeTest (953 ms total) [----------] 54 tests from DhValidateCases/SoftokenDhValidate [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/0 Test: IKE 1536 param_type: IKE_APPROVED, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/0 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/1 Test: IKE 2048 param_type: IKE_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/1 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/2 Test: TLS 3048 param_type: TLS_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/2 (5 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/3 Test: IKE 3072 param_type: IKE_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/3 (7 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/4 Test: TLS 3072 param_type: TLS_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/4 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/5 Test: IKE 4096 param_type: IKE_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/5 (11 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/6 Test: TLS 4096 param_type: TLS_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/6 (12 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/7 Test: IKE 6144 param_type: IKE_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/7 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/8 Test: TLS 6144 param_type: TLS_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/8 (21 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/9 Test: IKE 8192 param_type: IKE_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/9 (52 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/10 Test: TLS 8192 param_type: TLS_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/10 (53 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/11 Test: IKE 1536 with subprime param_type: IKE_APPROVED, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [192] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/11 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/12 Test: IKE 2048 with subprime param_type: IKE_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [256] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/12 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/13 Test: TLS 2048 with subprime param_type: TLS_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [256] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/13 (5 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/14 Test: IKE 3072 with subprime param_type: IKE_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [384] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/14 (7 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/15 Test: TLS 3072 with subprime param_type: TLS_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [384] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/15 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/16 Test: IKE 4096 with subprime param_type: IKE_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [512] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/16 (12 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/17 Test: TLS 4096 with subprime param_type: TLS_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [512] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/17 (11 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/18 Test: IKE 6144 with subprime param_type: IKE_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [768] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/18 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/19 Test: TLS 6144 with subprime param_type: TLS_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [768] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/19 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/20 Test: IKE 8192 with subprime param_type: IKE_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [1024] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/20 (52 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/21 Test: TLS 8192 with subprime param_type: TLS_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [1024] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/21 (52 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/22 Test: Safe Prime 1536 param_type: SAFE_PRIME, key_class: CLASS_1536 p: [192] f76731c8456ad9ea530b21c74afa8166765ceab7f511326dd34c7aac39171a87... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/22 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/23 Test: Safe Prime 2048 param_type: SAFE_PRIME, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 03 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/23 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/24 Test: Safe Prime 3072 param_type: SAFE_PRIME, key_class: CLASS_3072 p: [384] 8766dff7ec496a9a7c9628ae6738abfafe5c467befe918a676b2e50ebeb8f280... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/24 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/25 Test: Safe Prime 4096 param_type: SAFE_PRIME, key_class: CLASS_4096 p: [512] 8bdfc1a3e4bd1cb1f4b151d38ace3d335880a31c7c0dbd8ebdb3e79ed4de06fc... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/25 (11 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/26 Test: Safe Prime 6144 param_type: SAFE_PRIME, key_class: CLASS_6144 p: [768] b90fc1414ade1a1c80a0d6398110f309cac0608c5e8c1721a01850d66013fc38... g: [1] 03 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/26 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/27 Test: Safe Prime 8192 param_type: SAFE_PRIME, key_class: CLASS_8192 p: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... g: [1] 03 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/27 (52 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/28 Test: Safe Prime 1536 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_1536 p: [192] f76731c8456ad9ea530b21c74afa8166765ceab7f511326dd34c7aac39171a87... g: [1] 02 q: [192] 7bb398e422b56cf5298590e3a57d40b33b2e755bfa889936e9a63d561c8b8d43... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/28 (327 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/29 Test: Safe Prime 2048 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 02 q: [256] 70d1b724b4838e2fda0a9aa34ca968277fa72658f0acf69738f9c00a2a687e41... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/29 (625 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/30 Test: Safe Prime 3072 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_3072 p: [384] 8766dff7ec496a9a7c9628ae6738abfafe5c467befe918a676b2e50ebeb8f280... g: [1] 02 q: [384] 43b36ffbf624b54d3e4b1457339c55fd7f2e233df7f48c533b5972875f5c7940... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/30 (1990 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/31 Test: Weak Prime 1024 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/31 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/32 Test: Weak Prime 2048 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/32 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/33 Test: Weak Prime 3072 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/33 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/34 Test: Weak Prime 4096 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_4096 p: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... g: [512] 55a19d92163d9cfad77c71ea29539bdc8ea6bb06d5005d6c8e5d44b9134b2092... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/34 (11 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/35 Test: Weak Prime 6144 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_6144 p: [768] a22496b62168d57e2c604dc881599c1c70ec2428b652360987aac15be5a63e88... g: [768] 34c2b21fd94eb6fd6c0147b950f1be071cdd67a2f17c0de59b7c9e0ed9f881a1... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/35 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/36 Test: Weak Prime 8192 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_8192 p: [1024] 93df6d37dc2aa4ab5ddc734212188f394773f53ebc6e0d2a685d534f228ca8a8... g: [1024] 784d5da1ce9d68ae473181088c24386ac8c7f41ca1cb5d65046e0dbe551d25c2... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/36 (52 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/37 Test: Weak Prime 1024 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [20] ef0c1760d1918fea4dbe0ab237cc6bba97982d4b pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/37 (60 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/38 Test: Weak Prime 2048 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [32] cd9dbf88e5c00316ec9cb46e54d2bfdc0592cd0587c99c911954b6d71ee10a93 pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/38 (319 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/39 Test: Weak Prime 3072 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/39 (1014 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/40 Test: Weak Prime 1024 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [128] 724104a535df4da888d03a12ffa80e056b685e699244baba59eb35fa63afb576... pub_key: [0] PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/40 (58 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/41 Test: Weak Prime 2048 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [256] 5a8441b5111cef817f39b5fd86a756a587fed913f3e91aea41f95e14ffa87bb5... pub_key: [0] PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/41 (315 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/42 Test: Weak Prime 3072 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [384] 4a1963a3a8d181cdf928ae34d7829e3b3151762d666fc07996e752d2cf16d5af... pub_key: [0] PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/42 (1007 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/43 Test: Pubkey = 0 IKE 1536 param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [1] 00 PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/43 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/44 Test: PubKey = 1 TLS 2048 param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [1] 01 PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/44 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/45 Test: Pubkey == -1 IKE 1536 param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/45 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/46 Test: Pubkey = -1 SAFE 2048 WITH SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 02 q: [256] 70d1b724b4838e2fda0a9aa34ca968277fa72658f0acf69738f9c00a2a687e41... pub_key: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/46 (625 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/47 Test: Pubkey = -1 WEAK 3072 KNOWN SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/47 (1012 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/48 Test: Pubkey = -1 WEAK 4096 UNKNOWN SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_4096 p: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... g: [512] 55a19d92163d9cfad77c71ea29539bdc8ea6bb06d5005d6c8e5d44b9134b2092... q: [0] pub_key: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/48 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/49 Test: Pubkey = -1 TLS 6144 WITH SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [768] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/49 (16 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/50 Test: Pubkey = -1 SAFE 8192 param_type: BAD_PUB_KEY, key_class: CLASS_8192 p: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... g: [1] 02 q: [0] pub_key: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/50 (35 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/51 Test: Pubkey small subgroup Weak 1024 prime param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [20] ef0c1760d1918fea4dbe0ab237cc6bba97982d4b pub_key: [1] 03 PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/51 (60 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/52 Test: Pubkey small subgroup Weak 2048 prime param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [32] cd9dbf88e5c00316ec9cb46e54d2bfdc0592cd0587c99c911954b6d71ee10a93 pub_key: [1] 03 PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/52 (319 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/53 Test: Pubkey small subgroup Weak 3072 prime param_type: BAD_PUB_KEY, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [1] 03 PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/53 (1011 ms) [----------] 54 tests from DhValidateCases/SoftokenDhValidate (9409 ms total) [----------] Global test environment tear-down [==========] 76 tests from 6 test suites ran. (11164 ms total) [ PASSED ] 76 tests. gtests.sh: #16: softoken_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/softoken_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: sysinit_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/sysinit_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/sysinit_gtest -n dummy -s CN=dummy -t ,, -x -m 9 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #17: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/sysinit_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing sysinit_gtest [==========] Running 4 tests from 3 test suites. [----------] Global test environment set-up. [----------] 2 tests from Sysinit [ RUN ] Sysinit.LegacyPath [ OK ] Sysinit.LegacyPath (0 ms) [ RUN ] Sysinit.XdgDefaultPath [ OK ] Sysinit.XdgDefaultPath (0 ms) [----------] 2 tests from Sysinit (0 ms total) [----------] 1 test from SysinitSetXdgUserDataHome [ RUN ] SysinitSetXdgUserDataHome.XdgSetPath [ OK ] SysinitSetXdgUserDataHome.XdgSetPath (0 ms) [----------] 1 test from SysinitSetXdgUserDataHome (0 ms total) [----------] 1 test from SysinitSetTrashXdgUserDataHome [ RUN ] SysinitSetTrashXdgUserDataHome.XdgSetToTrashPath [ OK ] SysinitSetTrashXdgUserDataHome.XdgSetToTrashPath (0 ms) [----------] 1 test from SysinitSetTrashXdgUserDataHome (0 ms total) [----------] Global test environment tear-down [==========] 4 tests from 3 test suites ran. (0 ms total) [ PASSED ] 4 tests. gtests.sh: #18: sysinit_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/sysinit_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: blake2b_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/blake2b_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/blake2b_gtest -n dummy -s CN=dummy -t ,, -x -m 10 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #19: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/blake2b_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing blake2b_gtest [==========] Running 523 tests from 3 test suites. [----------] Global test environment set-up. [----------] 11 tests from Blake2BTests [ RUN ] Blake2BTests.ContextTest [ OK ] Blake2BTests.ContextTest (0 ms) [ RUN ] Blake2BTests.ContextTest2 [ OK ] Blake2BTests.ContextTest2 (0 ms) [ RUN ] Blake2BTests.NullContextTest [ OK ] Blake2BTests.NullContextTest (0 ms) [ RUN ] Blake2BTests.CloneTest [ OK ] Blake2BTests.CloneTest (0 ms) [ RUN ] Blake2BTests.NullTest [ OK ] Blake2BTests.NullTest (0 ms) [ RUN ] Blake2BTests.HashTest [ OK ] Blake2BTests.HashTest (0 ms) [ RUN ] Blake2BTests.LongHashTest [ OK ] Blake2BTests.LongHashTest (0 ms) [ RUN ] Blake2BTests.TruncatedHashTest [ OK ] Blake2BTests.TruncatedHashTest (0 ms) [ RUN ] Blake2BTests.TruncatedHashTest2 [ OK ] Blake2BTests.TruncatedHashTest2 (0 ms) [ RUN ] Blake2BTests.OverlongKeyTest [ OK ] Blake2BTests.OverlongKeyTest (0 ms) [ RUN ] Blake2BTests.EmptyKeyTest [ OK ] Blake2BTests.EmptyKeyTest (0 ms) [----------] 11 tests from Blake2BTests (0 ms total) [----------] 256 tests from UnkeyedKAT/Blake2BKATUnkeyed [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/0 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/0 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/1 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/1 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/2 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/2 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/3 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/3 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/4 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/4 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/5 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/5 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/6 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/6 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/7 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/7 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/8 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/8 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/9 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/9 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/10 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/10 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/11 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/11 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/12 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/12 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/13 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/13 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/14 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/14 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/15 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/15 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/16 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/16 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/17 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/17 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/18 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/18 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/19 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/19 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/20 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/20 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/21 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/21 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/22 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/22 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/23 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/23 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/24 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/24 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/25 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/25 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/26 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/26 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/27 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/27 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/28 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/28 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/29 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/29 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/30 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/30 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/31 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/31 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/32 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/32 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/33 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/33 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/34 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/34 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/35 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/35 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/36 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/36 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/37 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/37 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/38 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/38 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/39 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/39 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/40 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/40 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/41 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/41 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/42 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/42 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/43 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/43 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/44 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/44 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/45 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/45 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/46 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/46 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/47 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/47 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/48 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/48 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/49 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/49 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/50 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/50 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/51 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/51 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/52 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/52 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/53 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/53 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/54 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/54 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/55 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/55 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/56 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/56 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/57 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/57 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/58 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/58 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/59 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/59 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/60 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/60 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/61 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/61 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/62 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/62 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/63 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/63 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/64 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/64 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/65 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/65 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/66 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/66 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/67 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/67 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/68 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/68 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/69 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/69 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/70 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/70 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/71 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/71 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/72 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/72 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/73 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/73 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/74 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/74 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/75 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/75 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/76 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/76 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/77 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/77 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/78 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/78 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/79 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/79 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/80 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/80 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/81 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/81 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/82 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/82 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/83 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/83 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/84 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/84 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/85 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/85 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/86 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/86 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/87 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/87 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/88 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/88 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/89 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/89 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/90 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/90 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/91 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/91 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/92 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/92 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/93 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/93 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/94 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/94 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/95 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/95 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/96 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/96 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/97 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/97 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/98 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/98 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/99 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/99 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/100 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/100 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/101 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/101 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/102 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/102 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/103 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/103 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/104 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/104 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/105 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/105 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/106 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/106 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/107 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/107 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/108 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/108 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/109 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/109 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/110 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/110 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/111 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/111 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/112 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/112 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/113 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/113 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/114 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/114 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/115 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/115 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/116 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/116 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/117 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/117 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/118 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/118 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/119 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/119 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/120 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/120 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/121 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/121 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/122 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/122 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/123 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/123 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/124 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/124 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/125 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/125 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/126 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/126 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/127 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/127 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/128 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/128 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/129 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/129 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/130 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/130 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/131 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/131 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/132 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/132 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/133 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/133 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/134 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/134 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/135 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/135 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/136 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/136 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/137 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/137 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/138 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/138 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/139 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/139 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/140 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/140 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/141 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/141 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/142 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/142 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/143 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/143 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/144 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/144 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/145 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/145 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/146 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/146 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/147 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/147 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/148 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/148 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/149 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/149 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/150 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/150 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/151 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/151 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/152 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/152 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/153 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/153 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/154 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/154 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/155 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/155 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/156 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/156 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/157 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/157 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/158 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/158 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/159 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/159 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/160 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/160 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/161 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/161 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/162 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/162 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/163 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/163 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/164 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/164 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/165 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/165 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/166 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/166 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/167 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/167 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/168 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/168 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/169 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/169 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/170 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/170 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/171 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/171 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/172 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/172 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/173 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/173 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/174 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/174 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/175 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/175 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/176 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/176 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/177 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/177 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/178 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/178 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/179 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/179 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/180 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/180 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/181 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/181 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/182 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/182 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/183 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/183 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/184 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/184 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/185 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/185 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/186 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/186 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/187 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/187 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/188 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/188 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/189 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/189 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/190 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/190 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/191 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/191 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/192 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/192 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/193 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/193 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/194 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/194 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/195 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/195 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/196 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/196 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/197 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/197 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/198 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/198 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/199 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/199 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/200 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/200 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/201 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/201 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/202 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/202 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/203 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/203 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/204 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/204 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/205 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/205 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/206 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/206 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/207 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/207 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/208 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/208 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/209 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/209 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/210 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/210 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/211 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/211 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/212 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/212 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/213 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/213 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/214 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/214 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/215 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/215 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/216 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/216 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/217 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/217 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/218 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/218 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/219 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/219 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/220 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/220 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/221 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/221 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/222 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/222 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/223 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/223 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/224 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/224 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/225 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/225 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/226 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/226 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/227 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/227 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/228 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/228 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/229 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/229 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/230 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/230 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/231 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/231 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/232 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/232 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/233 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/233 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/234 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/234 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/235 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/235 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/236 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/236 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/237 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/237 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/238 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/238 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/239 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/239 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/240 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/240 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/241 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/241 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/242 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/242 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/243 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/243 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/244 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/244 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/245 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/245 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/246 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/246 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/247 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/247 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/248 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/248 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/249 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/249 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/250 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/250 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/251 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/251 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/252 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/252 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/253 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/253 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/254 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/254 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/255 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/255 (0 ms) [----------] 256 tests from UnkeyedKAT/Blake2BKATUnkeyed (0 ms total) [----------] 256 tests from KeyedKAT/Blake2BKATKeyed [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/0 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/0 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/1 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/1 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/2 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/2 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/3 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/3 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/4 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/4 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/5 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/5 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/6 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/6 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/7 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/7 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/8 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/8 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/9 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/9 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/10 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/10 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/11 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/11 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/12 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/12 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/13 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/13 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/14 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/14 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/15 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/15 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/16 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/16 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/17 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/17 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/18 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/18 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/19 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/19 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/20 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/20 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/21 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/21 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/22 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/22 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/23 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/23 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/24 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/24 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/25 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/25 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/26 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/26 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/27 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/27 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/28 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/28 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/29 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/29 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/30 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/30 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/31 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/31 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/32 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/32 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/33 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/33 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/34 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/34 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/35 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/35 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/36 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/36 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/37 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/37 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/38 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/38 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/39 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/39 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/40 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/40 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/41 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/41 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/42 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/42 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/43 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/43 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/44 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/44 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/45 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/45 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/46 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/46 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/47 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/47 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/48 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/48 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/49 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/49 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/50 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/50 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/51 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/51 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/52 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/52 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/53 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/53 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/54 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/54 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/55 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/55 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/56 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/56 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/57 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/57 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/58 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/58 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/59 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/59 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/60 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/60 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/61 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/61 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/62 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/62 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/63 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/63 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/64 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/64 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/65 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/65 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/66 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/66 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/67 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/67 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/68 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/68 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/69 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/69 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/70 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/70 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/71 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/71 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/72 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/72 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/73 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/73 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/74 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/74 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/75 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/75 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/76 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/76 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/77 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/77 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/78 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/78 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/79 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/79 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/80 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/80 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/81 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/81 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/82 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/82 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/83 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/83 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/84 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/84 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/85 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/85 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/86 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/86 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/87 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/87 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/88 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/88 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/89 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/89 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/90 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/90 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/91 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/91 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/92 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/92 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/93 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/93 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/94 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/94 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/95 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/95 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/96 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/96 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/97 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/97 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/98 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/98 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/99 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/99 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/100 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/100 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/101 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/101 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/102 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/102 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/103 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/103 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/104 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/104 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/105 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/105 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/106 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/106 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/107 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/107 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/108 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/108 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/109 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/109 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/110 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/110 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/111 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/111 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/112 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/112 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/113 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/113 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/114 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/114 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/115 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/115 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/116 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/116 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/117 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/117 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/118 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/118 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/119 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/119 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/120 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/120 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/121 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/121 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/122 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/122 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/123 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/123 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/124 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/124 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/125 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/125 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/126 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/126 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/127 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/127 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/128 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/128 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/129 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/129 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/130 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/130 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/131 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/131 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/132 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/132 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/133 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/133 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/134 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/134 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/135 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/135 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/136 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/136 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/137 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/137 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/138 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/138 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/139 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/139 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/140 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/140 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/141 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/141 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/142 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/142 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/143 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/143 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/144 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/144 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/145 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/145 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/146 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/146 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/147 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/147 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/148 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/148 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/149 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/149 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/150 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/150 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/151 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/151 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/152 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/152 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/153 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/153 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/154 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/154 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/155 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/155 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/156 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/156 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/157 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/157 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/158 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/158 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/159 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/159 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/160 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/160 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/161 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/161 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/162 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/162 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/163 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/163 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/164 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/164 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/165 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/165 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/166 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/166 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/167 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/167 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/168 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/168 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/169 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/169 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/170 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/170 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/171 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/171 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/172 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/172 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/173 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/173 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/174 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/174 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/175 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/175 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/176 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/176 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/177 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/177 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/178 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/178 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/179 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/179 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/180 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/180 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/181 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/181 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/182 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/182 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/183 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/183 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/184 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/184 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/185 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/185 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/186 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/186 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/187 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/187 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/188 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/188 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/189 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/189 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/190 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/190 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/191 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/191 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/192 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/192 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/193 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/193 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/194 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/194 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/195 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/195 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/196 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/196 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/197 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/197 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/198 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/198 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/199 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/199 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/200 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/200 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/201 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/201 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/202 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/202 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/203 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/203 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/204 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/204 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/205 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/205 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/206 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/206 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/207 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/207 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/208 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/208 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/209 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/209 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/210 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/210 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/211 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/211 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/212 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/212 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/213 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/213 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/214 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/214 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/215 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/215 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/216 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/216 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/217 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/217 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/218 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/218 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/219 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/219 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/220 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/220 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/221 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/221 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/222 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/222 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/223 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/223 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/224 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/224 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/225 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/225 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/226 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/226 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/227 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/227 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/228 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/228 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/229 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/229 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/230 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/230 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/231 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/231 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/232 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/232 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/233 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/233 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/234 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/234 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/235 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/235 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/236 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/236 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/237 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/237 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/238 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/238 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/239 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/239 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/240 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/240 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/241 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/241 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/242 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/242 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/243 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/243 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/244 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/244 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/245 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/245 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/246 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/246 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/247 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/247 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/248 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/248 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/249 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/249 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/250 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/250 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/251 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/251 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/252 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/252 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/253 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/253 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/254 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/254 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/255 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/255 (0 ms) [----------] 256 tests from KeyedKAT/Blake2BKATKeyed (1 ms total) [----------] Global test environment tear-down [==========] 523 tests from 3 test suites ran. (1 ms total) [ PASSED ] 523 tests. gtests.sh: #20: blake2b_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/blake2b_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: smime_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/smime_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/smime_gtest -n dummy -s CN=dummy -t ,, -x -m 11 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #21: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/smime_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing smime_gtest [==========] Running 5 tests from 1 test suite. [----------] Global test environment set-up. [----------] 5 tests from SMimeTest [ RUN ] SMimeTest.InvalidDER [ OK ] SMimeTest.InvalidDER (0 ms) [ RUN ] SMimeTest.IsSignedValid [ OK ] SMimeTest.IsSignedValid (0 ms) [ RUN ] SMimeTest.TruncatedCmsSignature [ OK ] SMimeTest.TruncatedCmsSignature (0 ms) [ RUN ] SMimeTest.SlightlyTruncatedCmsSignature [ OK ] SMimeTest.SlightlyTruncatedCmsSignature (0 ms) [ RUN ] SMimeTest.IsSignedNull [ OK ] SMimeTest.IsSignedNull (0 ms) [----------] 5 tests from SMimeTest (0 ms total) [----------] Global test environment tear-down [==========] 5 tests from 1 test suite ran. (0 ms total) [ PASSED ] 5 tests. gtests.sh: #22: smime_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/smime_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests gtests.sh: mozpkix_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/mozpkix_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/mozpkix_gtest -n dummy -s CN=dummy -t ,, -x -m 12 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #23: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/mozpkix_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests executing mozpkix_gtest [==========] Running 1636 tests from 43 test suites. [----------] Global test environment set-up. [----------] 8 tests from pkixbuild [ RUN ] pkixbuild.MaxAcceptableCertChainLength [ OK ] pkixbuild.MaxAcceptableCertChainLength (4 ms) [ RUN ] pkixbuild.BeyondMaxAcceptableCertChainLength [ OK ] pkixbuild.BeyondMaxAcceptableCertChainLength (6 ms) [ RUN ] pkixbuild.NoRevocationCheckingForExpiredCert [ OK ] pkixbuild.NoRevocationCheckingForExpiredCert (6 ms) [ RUN ] pkixbuild.CertificateTransparencyExtension [ OK ] pkixbuild.CertificateTransparencyExtension (6 ms) [ RUN ] pkixbuild.BadEmbeddedSCTWithMultiplePaths [ OK ] pkixbuild.BadEmbeddedSCTWithMultiplePaths (16 ms) [ RUN ] pkixbuild.RevokedEndEntityWithMultiplePaths [ OK ] pkixbuild.RevokedEndEntityWithMultiplePaths (15 ms) [ RUN ] pkixbuild.AvoidUnboundedPathSearchingFailure [ OK ] pkixbuild.AvoidUnboundedPathSearchingFailure (3302 ms) [ RUN ] pkixbuild.AvoidUnboundedPathSearchingSuccess [ OK ] pkixbuild.AvoidUnboundedPathSearchingSuccess (3654 ms) [----------] 8 tests from pkixbuild (7009 ms total) [----------] 1 test from pkixbuild_DSS [ RUN ] pkixbuild_DSS.DSSEndEntityKeyNotAccepted [ OK ] pkixbuild_DSS.DSSEndEntityKeyNotAccepted (7 ms) [----------] 1 test from pkixbuild_DSS (7 ms total) [----------] 2 tests from pkixc_tests [ RUN ] pkixc_tests.Valid_VerifyCodeSigningCertificateChain [ OK ] pkixc_tests.Valid_VerifyCodeSigningCertificateChain (12 ms) [ RUN ] pkixc_tests.Invalid_VerifyCodeSigningCertificateChain [ OK ] pkixc_tests.Invalid_VerifyCodeSigningCertificateChain (10 ms) [----------] 2 tests from pkixc_tests (22 ms total) [----------] 1 test from pkixcert_extension [ RUN ] pkixcert_extension.DuplicateSubjectAltName [ OK ] pkixcert_extension.DuplicateSubjectAltName (3 ms) [----------] 1 test from pkixcert_extension (3 ms total) [----------] 2 tests from pkixcheck_CheckExtendedKeyUsage [ RUN ] pkixcheck_CheckExtendedKeyUsage.none [ OK ] pkixcheck_CheckExtendedKeyUsage.none (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage.empty [ OK ] pkixcheck_CheckExtendedKeyUsage.empty (0 ms) [----------] 2 tests from pkixcheck_CheckExtendedKeyUsage (0 ms total) [----------] 2 tests from pkixcheck_CheckIssuer [ RUN ] pkixcheck_CheckIssuer.ValidIssuer [ OK ] pkixcheck_CheckIssuer.ValidIssuer (0 ms) [ RUN ] pkixcheck_CheckIssuer.EmptyIssuer [ OK ] pkixcheck_CheckIssuer.EmptyIssuer (0 ms) [----------] 2 tests from pkixcheck_CheckIssuer (0 ms total) [----------] 11 tests from pkixcheck_CheckKeyUsage [ RUN ] pkixcheck_CheckKeyUsage.EE_none [ OK ] pkixcheck_CheckKeyUsage.EE_none (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.EE_empty [ OK ] pkixcheck_CheckKeyUsage.EE_empty (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.CA_none [ OK ] pkixcheck_CheckKeyUsage.CA_none (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.CA_empty [ OK ] pkixcheck_CheckKeyUsage.CA_empty (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.maxUnusedBits [ OK ] pkixcheck_CheckKeyUsage.maxUnusedBits (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.tooManyUnusedBits [ OK ] pkixcheck_CheckKeyUsage.tooManyUnusedBits (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.NoValueBytes_NoPaddingBits [ OK ] pkixcheck_CheckKeyUsage.NoValueBytes_NoPaddingBits (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.NoValueBytes_7PaddingBits [ OK ] pkixcheck_CheckKeyUsage.NoValueBytes_7PaddingBits (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.simpleCases [ OK ] pkixcheck_CheckKeyUsage.simpleCases (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.keyCertSign [ OK ] pkixcheck_CheckKeyUsage.keyCertSign (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.unusedBitNotZero [ OK ] pkixcheck_CheckKeyUsage.unusedBitNotZero (0 ms) [----------] 11 tests from pkixcheck_CheckKeyUsage (0 ms total) [----------] 1 test from pkixcheck_CheckSignatureAlgorithm [ RUN ] pkixcheck_CheckSignatureAlgorithm.BuildCertChain [ OK ] pkixcheck_CheckSignatureAlgorithm.BuildCertChain (6 ms) [----------] 1 test from pkixcheck_CheckSignatureAlgorithm (6 ms total) [----------] 6 tests from pkixcheck_CheckValidity [ RUN ] pkixcheck_CheckValidity.Valid_UTCTIME_UTCTIME [ OK ] pkixcheck_CheckValidity.Valid_UTCTIME_UTCTIME (0 ms) [ RUN ] pkixcheck_CheckValidity.Valid_GENERALIZEDTIME_GENERALIZEDTIME [ OK ] pkixcheck_CheckValidity.Valid_GENERALIZEDTIME_GENERALIZEDTIME (0 ms) [ RUN ] pkixcheck_CheckValidity.Valid_GENERALIZEDTIME_UTCTIME [ OK ] pkixcheck_CheckValidity.Valid_GENERALIZEDTIME_UTCTIME (0 ms) [ RUN ] pkixcheck_CheckValidity.Valid_UTCTIME_GENERALIZEDTIME [ OK ] pkixcheck_CheckValidity.Valid_UTCTIME_GENERALIZEDTIME (0 ms) [ RUN ] pkixcheck_CheckValidity.InvalidBeforeNotBefore [ OK ] pkixcheck_CheckValidity.InvalidBeforeNotBefore (0 ms) [ RUN ] pkixcheck_CheckValidity.InvalidAfterNotAfter [ OK ] pkixcheck_CheckValidity.InvalidAfterNotAfter (0 ms) [----------] 6 tests from pkixcheck_CheckValidity (0 ms total) [----------] 4 tests from pkixcheck_ParseValidity [ RUN ] pkixcheck_ParseValidity.BothEmptyNull [ OK ] pkixcheck_ParseValidity.BothEmptyNull (0 ms) [ RUN ] pkixcheck_ParseValidity.NotBeforeEmptyNull [ OK ] pkixcheck_ParseValidity.NotBeforeEmptyNull (0 ms) [ RUN ] pkixcheck_ParseValidity.NotAfterEmptyNull [ OK ] pkixcheck_ParseValidity.NotAfterEmptyNull (0 ms) [ RUN ] pkixcheck_ParseValidity.InvalidNotAfterBeforeNotBefore [ OK ] pkixcheck_ParseValidity.InvalidNotAfterBeforeNotBefore (0 ms) [----------] 4 tests from pkixcheck_ParseValidity (0 ms total) [----------] 70 tests from pkixder_input_tests [ RUN ] pkixder_input_tests.InputInit [ OK ] pkixder_input_tests.InputInit (0 ms) [ RUN ] pkixder_input_tests.InputInitWithNullPointerOrZeroLength [ OK ] pkixder_input_tests.InputInitWithNullPointerOrZeroLength (0 ms) [ RUN ] pkixder_input_tests.InputInitWithLargeData [ OK ] pkixder_input_tests.InputInitWithLargeData (0 ms) [ RUN ] pkixder_input_tests.InputInitMultipleTimes [ OK ] pkixder_input_tests.InputInitMultipleTimes (0 ms) [ RUN ] pkixder_input_tests.PeekWithinBounds [ OK ] pkixder_input_tests.PeekWithinBounds (0 ms) [ RUN ] pkixder_input_tests.PeekPastBounds [ OK ] pkixder_input_tests.PeekPastBounds (0 ms) [ RUN ] pkixder_input_tests.ReadByte [ OK ] pkixder_input_tests.ReadByte (0 ms) [ RUN ] pkixder_input_tests.ReadBytePastEnd [ OK ] pkixder_input_tests.ReadBytePastEnd (0 ms) [ RUN ] pkixder_input_tests.ReadByteWrapAroundPointer [ OK ] pkixder_input_tests.ReadByteWrapAroundPointer (0 ms) [ RUN ] pkixder_input_tests.ReadWord [ OK ] pkixder_input_tests.ReadWord (0 ms) [ RUN ] pkixder_input_tests.ReadWordPastEnd [ OK ] pkixder_input_tests.ReadWordPastEnd (0 ms) [ RUN ] pkixder_input_tests.ReadWordWithInsufficentData [ OK ] pkixder_input_tests.ReadWordWithInsufficentData (0 ms) [ RUN ] pkixder_input_tests.ReadWordWrapAroundPointer [ OK ] pkixder_input_tests.ReadWordWrapAroundPointer (0 ms) [ RUN ] pkixder_input_tests.Skip [ OK ] pkixder_input_tests.Skip (0 ms) [ RUN ] pkixder_input_tests.Skip_ToEnd [ OK ] pkixder_input_tests.Skip_ToEnd (0 ms) [ RUN ] pkixder_input_tests.Skip_PastEnd [ OK ] pkixder_input_tests.Skip_PastEnd (0 ms) [ RUN ] pkixder_input_tests.Skip_ToNewInput [ OK ] pkixder_input_tests.Skip_ToNewInput (0 ms) [ RUN ] pkixder_input_tests.Skip_ToNewInputPastEnd [ OK ] pkixder_input_tests.Skip_ToNewInputPastEnd (0 ms) [ RUN ] pkixder_input_tests.Skip_ToInput [ OK ] pkixder_input_tests.Skip_ToInput (0 ms) [ RUN ] pkixder_input_tests.Skip_WrapAroundPointer [ OK ] pkixder_input_tests.Skip_WrapAroundPointer (0 ms) [ RUN ] pkixder_input_tests.Skip_ToInputPastEnd [ OK ] pkixder_input_tests.Skip_ToInputPastEnd (0 ms) [ RUN ] pkixder_input_tests.SkipToEnd_ToInput [ OK ] pkixder_input_tests.SkipToEnd_ToInput (0 ms) [ RUN ] pkixder_input_tests.SkipToEnd_ToInput_InputAlreadyInited [ OK ] pkixder_input_tests.SkipToEnd_ToInput_InputAlreadyInited (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndSkipValue [ OK ] pkixder_input_tests.ExpectTagAndSkipValue (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndSkipValueWithTruncatedData [ OK ] pkixder_input_tests.ExpectTagAndSkipValueWithTruncatedData (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndSkipValueWithOverrunData [ OK ] pkixder_input_tests.ExpectTagAndSkipValueWithOverrunData (0 ms) [ RUN ] pkixder_input_tests.AtEndOnUnInitializedInput [ OK ] pkixder_input_tests.AtEndOnUnInitializedInput (0 ms) [ RUN ] pkixder_input_tests.AtEndAtBeginning [ OK ] pkixder_input_tests.AtEndAtBeginning (0 ms) [ RUN ] pkixder_input_tests.AtEndAtEnd [ OK ] pkixder_input_tests.AtEndAtEnd (0 ms) [ RUN ] pkixder_input_tests.MarkAndGetInput [ OK ] pkixder_input_tests.MarkAndGetInput (0 ms) [ RUN ] pkixder_input_tests.MarkAndGetInputDifferentInput [ OK ] pkixder_input_tests.MarkAndGetInputDifferentInput (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_AtEnd [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_AtEnd (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_TruncatedAfterTag [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_TruncatedAfterTag (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_ValidEmpty [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_ValidNotEmpty [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_ValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidNotEmptyValueTruncated (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidWrongLength [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm1 [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm1 (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm2 [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm2 (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm3 [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm3 (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_ValidEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_ValidNotEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_ValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidNotEmptyValueTruncated (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidWrongLength [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidWrongTag [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidWrongTag (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_ValidEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_ValidNotEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_ValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidNotEmptyValueTruncated (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidWrongLength [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidWrongTag [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidWrongTag (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_ValidEmpty [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_InValidNotEmpty [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_InValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_Input_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_Input_InvalidNotEmptyValueTruncated (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_InvalidWrongLength [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_InvalidWrongTag [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_InvalidWrongTag (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_ValidEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_ValidNotEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_ValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidNotEmptyValueTruncated (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidWrongLength [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidWrongTag [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidWrongTag (0 ms) [ RUN ] pkixder_input_tests.EndAtEnd [ OK ] pkixder_input_tests.EndAtEnd (0 ms) [ RUN ] pkixder_input_tests.EndBeforeEnd [ OK ] pkixder_input_tests.EndBeforeEnd (0 ms) [ RUN ] pkixder_input_tests.EndAtBeginning [ OK ] pkixder_input_tests.EndAtBeginning (0 ms) [ RUN ] pkixder_input_tests.NestedOf [ OK ] pkixder_input_tests.NestedOf (0 ms) [ RUN ] pkixder_input_tests.NestedOfWithTruncatedData [ OK ] pkixder_input_tests.NestedOfWithTruncatedData (0 ms) [ RUN ] pkixder_input_tests.MatchRestAtEnd [ OK ] pkixder_input_tests.MatchRestAtEnd (0 ms) [ RUN ] pkixder_input_tests.MatchRest1Match [ OK ] pkixder_input_tests.MatchRest1Match (0 ms) [ RUN ] pkixder_input_tests.MatchRest1Mismatch [ OK ] pkixder_input_tests.MatchRest1Mismatch (0 ms) [ RUN ] pkixder_input_tests.MatchRest2WithTrailingByte [ OK ] pkixder_input_tests.MatchRest2WithTrailingByte (0 ms) [ RUN ] pkixder_input_tests.MatchRest2Mismatch [ OK ] pkixder_input_tests.MatchRest2Mismatch (0 ms) [----------] 70 tests from pkixder_input_tests (0 ms total) [----------] 10 tests from pkixder_pki_types_tests [ RUN ] pkixder_pki_types_tests.CertificateSerialNumber [ OK ] pkixder_pki_types_tests.CertificateSerialNumber (0 ms) [ RUN ] pkixder_pki_types_tests.CertificateSerialNumberLongest [ OK ] pkixder_pki_types_tests.CertificateSerialNumberLongest (0 ms) [ RUN ] pkixder_pki_types_tests.CertificateSerialNumberCrazyLong [ OK ] pkixder_pki_types_tests.CertificateSerialNumberCrazyLong (0 ms) [ RUN ] pkixder_pki_types_tests.CertificateSerialNumberZeroLength [ OK ] pkixder_pki_types_tests.CertificateSerialNumberZeroLength (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionV1ExplicitEncodingAllowed [ OK ] pkixder_pki_types_tests.OptionalVersionV1ExplicitEncodingAllowed (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionV2 [ OK ] pkixder_pki_types_tests.OptionalVersionV2 (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionV3 [ OK ] pkixder_pki_types_tests.OptionalVersionV3 (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionUnknown [ OK ] pkixder_pki_types_tests.OptionalVersionUnknown (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionInvalidTooLong [ OK ] pkixder_pki_types_tests.OptionalVersionInvalidTooLong (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionMissing [ OK ] pkixder_pki_types_tests.OptionalVersionMissing (0 ms) [----------] 10 tests from pkixder_pki_types_tests (0 ms total) [----------] 56 tests from pkixder_universal_types_tests [ RUN ] pkixder_universal_types_tests.BooleanTrue01 [ OK ] pkixder_universal_types_tests.BooleanTrue01 (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanTrue42 [ OK ] pkixder_universal_types_tests.BooleanTrue42 (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanTrueFF [ OK ] pkixder_universal_types_tests.BooleanTrueFF (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanFalse [ OK ] pkixder_universal_types_tests.BooleanFalse (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanInvalidLength [ OK ] pkixder_universal_types_tests.BooleanInvalidLength (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanInvalidZeroLength [ OK ] pkixder_universal_types_tests.BooleanInvalidZeroLength (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalBooleanValidEncodings [ OK ] pkixder_universal_types_tests.OptionalBooleanValidEncodings (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalBooleanInvalidEncodings [ OK ] pkixder_universal_types_tests.OptionalBooleanInvalidEncodings (0 ms) [ RUN ] pkixder_universal_types_tests.Enumerated [ OK ] pkixder_universal_types_tests.Enumerated (0 ms) [ RUN ] pkixder_universal_types_tests.EnumeratedNotShortestPossibleDER [ OK ] pkixder_universal_types_tests.EnumeratedNotShortestPossibleDER (0 ms) [ RUN ] pkixder_universal_types_tests.EnumeratedOutOfAcceptedRange [ OK ] pkixder_universal_types_tests.EnumeratedOutOfAcceptedRange (0 ms) [ RUN ] pkixder_universal_types_tests.EnumeratedInvalidZeroLength [ OK ] pkixder_universal_types_tests.EnumeratedInvalidZeroLength (0 ms) [ RUN ] pkixder_universal_types_tests.ValidControl [ OK ] pkixder_universal_types_tests.ValidControl (0 ms) [ RUN ] pkixder_universal_types_tests.TimeTimeZoneOffset [ OK ] pkixder_universal_types_tests.TimeTimeZoneOffset (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidZeroLength [ OK ] pkixder_universal_types_tests.TimeInvalidZeroLength (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidLocal [ OK ] pkixder_universal_types_tests.TimeInvalidLocal (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidTruncated [ OK ] pkixder_universal_types_tests.TimeInvalidTruncated (0 ms) [ RUN ] pkixder_universal_types_tests.TimeNoSeconds [ OK ] pkixder_universal_types_tests.TimeNoSeconds (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidPrefixedYear [ OK ] pkixder_universal_types_tests.TimeInvalidPrefixedYear (0 ms) [ RUN ] pkixder_universal_types_tests.TimeTooManyDigits [ OK ] pkixder_universal_types_tests.TimeTooManyDigits (0 ms) [ RUN ] pkixder_universal_types_tests.GeneralizedTimeYearValidRange [ OK ] pkixder_universal_types_tests.GeneralizedTimeYearValidRange (1 ms) [ RUN ] pkixder_universal_types_tests.TimeYearInvalid1969 [ OK ] pkixder_universal_types_tests.TimeYearInvalid1969 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthDaysValidRange [ OK ] pkixder_universal_types_tests.TimeMonthDaysValidRange (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthInvalid0 [ OK ] pkixder_universal_types_tests.TimeMonthInvalid0 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthInvalid13 [ OK ] pkixder_universal_types_tests.TimeMonthInvalid13 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeDayInvalid0 [ OK ] pkixder_universal_types_tests.TimeDayInvalid0 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthDayInvalidPastEndOfMonth [ OK ] pkixder_universal_types_tests.TimeMonthDayInvalidPastEndOfMonth (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebLeapYear2016 [ OK ] pkixder_universal_types_tests.TimeMonthFebLeapYear2016 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebLeapYear2000 [ OK ] pkixder_universal_types_tests.TimeMonthFebLeapYear2000 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebLeapYear2400 [ OK ] pkixder_universal_types_tests.TimeMonthFebLeapYear2400 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebNotLeapYear2014 [ OK ] pkixder_universal_types_tests.TimeMonthFebNotLeapYear2014 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebNotLeapYear2100 [ OK ] pkixder_universal_types_tests.TimeMonthFebNotLeapYear2100 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeHoursValidRange [ OK ] pkixder_universal_types_tests.TimeHoursValidRange (0 ms) [ RUN ] pkixder_universal_types_tests.TimeHoursInvalid_24_00_00 [ OK ] pkixder_universal_types_tests.TimeHoursInvalid_24_00_00 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMinutesValidRange [ OK ] pkixder_universal_types_tests.TimeMinutesValidRange (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMinutesInvalid60 [ OK ] pkixder_universal_types_tests.TimeMinutesInvalid60 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeSecondsValidRange [ OK ] pkixder_universal_types_tests.TimeSecondsValidRange (0 ms) [ RUN ] pkixder_universal_types_tests.TimeSecondsInvalid60 [ OK ] pkixder_universal_types_tests.TimeSecondsInvalid60 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeSecondsInvalid61 [ OK ] pkixder_universal_types_tests.TimeSecondsInvalid61 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidZulu [ OK ] pkixder_universal_types_tests.TimeInvalidZulu (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidExtraData [ OK ] pkixder_universal_types_tests.TimeInvalidExtraData (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidCenturyChar [ OK ] pkixder_universal_types_tests.TimeInvalidCenturyChar (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidYearChar [ OK ] pkixder_universal_types_tests.TimeInvalidYearChar (0 ms) [ RUN ] pkixder_universal_types_tests.GeneralizedTimeInvalidMonthChar [ OK ] pkixder_universal_types_tests.GeneralizedTimeInvalidMonthChar (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidDayChar [ OK ] pkixder_universal_types_tests.TimeInvalidDayChar (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidFractionalSeconds [ OK ] pkixder_universal_types_tests.TimeInvalidFractionalSeconds (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalIntegerSupportedDefault [ OK ] pkixder_universal_types_tests.OptionalIntegerSupportedDefault (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalIntegerUnsupportedDefault [ OK ] pkixder_universal_types_tests.OptionalIntegerUnsupportedDefault (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalIntegerSupportedDefaultAtEnd [ OK ] pkixder_universal_types_tests.OptionalIntegerSupportedDefaultAtEnd (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalIntegerNonDefaultValue [ OK ] pkixder_universal_types_tests.OptionalIntegerNonDefaultValue (0 ms) [ RUN ] pkixder_universal_types_tests.Null [ OK ] pkixder_universal_types_tests.Null (0 ms) [ RUN ] pkixder_universal_types_tests.NullWithBadLength [ OK ] pkixder_universal_types_tests.NullWithBadLength (0 ms) [ RUN ] pkixder_universal_types_tests.OID [ OK ] pkixder_universal_types_tests.OID (0 ms) [ RUN ] pkixder_universal_types_tests.SkipOptionalImplicitPrimitiveTag [ OK ] pkixder_universal_types_tests.SkipOptionalImplicitPrimitiveTag (0 ms) [ RUN ] pkixder_universal_types_tests.SkipOptionalImplicitPrimitiveTagMismatch [ OK ] pkixder_universal_types_tests.SkipOptionalImplicitPrimitiveTagMismatch (0 ms) [ RUN ] pkixder_universal_types_tests.NoSkipOptionalImplicitConstructedTag [ OK ] pkixder_universal_types_tests.NoSkipOptionalImplicitConstructedTag (0 ms) [----------] 56 tests from pkixder_universal_types_tests (1 ms total) [----------] 1 test from pkixnames_CheckCertHostname [ RUN ] pkixnames_CheckCertHostname.SANWithoutSequence [ OK ] pkixnames_CheckCertHostname.SANWithoutSequence (3 ms) [----------] 1 test from pkixnames_CheckCertHostname (3 ms total) [----------] 2 tests from pkixocsp_CreateEncodedOCSPRequest [ RUN ] pkixocsp_CreateEncodedOCSPRequest.ChildCertLongSerialNumberTest [ OK ] pkixocsp_CreateEncodedOCSPRequest.ChildCertLongSerialNumberTest (148 ms) [ RUN ] pkixocsp_CreateEncodedOCSPRequest.LongestSupportedSerialNumberTest [ OK ] pkixocsp_CreateEncodedOCSPRequest.LongestSupportedSerialNumberTest (112 ms) [----------] 2 tests from pkixocsp_CreateEncodedOCSPRequest (260 ms total) [----------] 8 tests from pkixocsp_VerifyEncodedResponse_successful [ RUN ] pkixocsp_VerifyEncodedResponse_successful.good_byKey [ OK ] pkixocsp_VerifyEncodedResponse_successful.good_byKey (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.good_byName [ OK ] pkixocsp_VerifyEncodedResponse_successful.good_byName (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.good_byKey_without_nextUpdate [ OK ] pkixocsp_VerifyEncodedResponse_successful.good_byKey_without_nextUpdate (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.revoked [ OK ] pkixocsp_VerifyEncodedResponse_successful.revoked (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.unknown [ OK ] pkixocsp_VerifyEncodedResponse_successful.unknown (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.good_unsupportedSignatureAlgorithm [ OK ] pkixocsp_VerifyEncodedResponse_successful.good_unsupportedSignatureAlgorithm (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.check_validThrough [ OK ] pkixocsp_VerifyEncodedResponse_successful.check_validThrough (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.ct_extension [ OK ] pkixocsp_VerifyEncodedResponse_successful.ct_extension (3 ms) [----------] 8 tests from pkixocsp_VerifyEncodedResponse_successful (25 ms total) [----------] 13 tests from pkixocsp_VerifyEncodedResponse_DelegatedResponder [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byKey [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byKey (76 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byName [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byName (118 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byKey_missing_signer [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byKey_missing_signer (72 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byName_missing_signer [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byName_missing_signer (186 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_expired [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_expired (85 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_future [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_future (81 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_no_eku [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_no_eku (54 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_wrong_eku [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_wrong_eku (159 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_tampered_eku [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_tampered_eku (142 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_unknown_issuer [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_unknown_issuer (305 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_subca_1_first [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_subca_1_first (194 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_subca_1_second [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_subca_1_second (187 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_unsupportedSignatureAlgorithmOnResponder [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_unsupportedSignatureAlgorithmOnResponder (138 ms) [----------] 13 tests from pkixocsp_VerifyEncodedResponse_DelegatedResponder (1797 ms total) [----------] 3 tests from pkixocsp_VerifyEncodedResponse_GetCertTrust [ RUN ] pkixocsp_VerifyEncodedResponse_GetCertTrust.InheritTrust [ OK ] pkixocsp_VerifyEncodedResponse_GetCertTrust.InheritTrust (111 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_GetCertTrust.TrustAnchor [ OK ] pkixocsp_VerifyEncodedResponse_GetCertTrust.TrustAnchor (74 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_GetCertTrust.ActivelyDistrusted [ OK ] pkixocsp_VerifyEncodedResponse_GetCertTrust.ActivelyDistrusted (219 ms) [----------] 3 tests from pkixocsp_VerifyEncodedResponse_GetCertTrust (404 ms total) [----------] 9 tests from pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/0 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/0 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/1 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/1 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/2 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/2 (7 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/3 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/3 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/4 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/4 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/5 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/5 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/6 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/6 (9 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/7 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/7 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/8 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/8 (6 ms) [----------] 9 tests from pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck (58 ms total) [----------] 8 tests from pkixcert_extension/pkixcert_extension [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/0 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/0 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/1 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/1 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/2 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/2 (4 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/3 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/3 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/4 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/4 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/5 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/5 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/6 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/6 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/7 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/7 (3 ms) [----------] 8 tests from pkixcert_extension/pkixcert_extension (25 ms total) [----------] 8 tests from pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/0 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/0 (6 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/1 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/1 (6 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/2 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/2 (6 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/3 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/3 (7 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/4 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/4 (6 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/5 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/5 (9 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/6 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/6 (9 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/7 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/7 (10 ms) [----------] 8 tests from pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm (59 ms total) [----------] 216 tests from pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/0 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/0 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/1 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/1 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/2 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/2 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/3 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/3 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/4 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/4 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/5 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/5 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/6 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/6 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/7 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/7 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/8 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/8 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/9 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/9 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/10 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/10 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/11 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/11 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/12 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/12 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/13 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/13 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/14 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/14 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/15 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/15 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/16 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/16 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/17 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/17 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/18 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/18 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/19 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/19 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/20 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/20 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/21 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/21 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/22 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/22 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/23 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/23 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/24 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/24 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/25 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/25 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/26 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/26 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/27 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/27 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/28 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/28 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/29 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/29 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/30 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/30 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/31 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/31 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/32 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/32 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/33 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/33 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/34 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/34 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/35 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/35 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/36 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/36 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/37 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/37 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/38 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/38 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/39 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/39 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/40 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/40 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/41 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/41 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/42 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/42 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/43 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/43 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/44 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/44 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/45 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/45 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/46 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/46 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/47 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/47 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/48 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/48 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/49 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/49 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/50 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/50 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/51 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/51 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/52 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/52 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/53 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/53 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/54 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/54 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/55 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/55 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/56 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/56 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/57 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/57 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/58 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/58 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/59 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/59 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/60 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/60 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/61 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/61 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/62 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/62 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/63 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/63 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/64 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/64 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/65 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/65 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/66 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/66 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/67 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/67 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/68 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/68 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/69 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/69 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/70 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/70 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/71 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/71 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/72 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/72 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/73 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/73 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/74 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/74 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/75 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/75 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/76 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/76 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/77 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/77 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/78 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/78 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/79 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/79 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/80 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/80 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/81 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/81 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/82 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/82 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/83 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/83 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/84 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/84 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/85 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/85 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/86 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/86 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/87 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/87 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/88 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/88 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/89 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/89 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/90 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/90 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/91 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/91 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/92 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/92 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/93 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/93 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/94 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/94 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/95 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/95 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/96 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/96 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/97 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/97 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/98 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/98 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/99 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/99 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/100 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/100 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/101 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/101 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/102 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/102 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/103 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/103 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/104 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/104 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/105 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/105 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/106 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/106 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/107 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/107 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/108 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/108 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/109 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/109 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/110 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/110 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/111 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/111 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/112 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/112 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/113 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/113 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/114 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/114 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/115 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/115 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/116 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/116 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/117 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/117 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/118 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/118 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/119 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/119 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/120 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/120 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/121 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/121 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/122 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/122 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/123 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/123 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/124 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/124 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/125 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/125 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/126 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/126 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/127 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/127 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/128 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/128 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/129 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/129 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/130 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/130 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/131 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/131 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/132 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/132 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/133 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/133 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/134 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/134 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/135 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/135 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/136 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/136 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/137 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/137 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/138 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/138 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/139 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/139 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/140 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/140 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/141 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/141 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/142 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/142 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/143 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/143 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/144 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/144 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/145 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/145 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/146 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/146 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/147 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/147 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/148 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/148 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/149 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/149 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/150 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/150 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/151 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/151 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/152 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/152 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/153 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/153 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/154 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/154 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/155 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/155 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/156 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/156 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/157 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/157 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/158 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/158 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/159 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/159 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/160 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/160 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/161 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/161 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/162 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/162 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/163 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/163 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/164 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/164 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/165 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/165 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/166 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/166 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/167 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/167 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/168 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/168 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/169 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/169 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/170 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/170 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/171 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/171 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/172 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/172 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/173 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/173 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/174 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/174 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/175 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/175 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/176 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/176 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/177 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/177 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/178 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/178 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/179 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/179 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/180 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/180 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/181 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/181 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/182 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/182 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/183 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/183 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/184 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/184 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/185 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/185 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/186 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/186 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/187 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/187 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/188 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/188 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/189 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/189 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/190 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/190 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/191 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/191 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/192 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/192 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/193 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/193 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/194 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/194 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/195 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/195 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/196 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/196 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/197 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/197 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/198 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/198 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/199 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/199 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/200 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/200 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/201 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/201 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/202 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/202 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/203 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/203 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/204 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/204 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/205 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/205 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/206 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/206 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/207 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/207 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/208 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/208 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/209 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/209 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/210 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/210 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/211 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/211 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/212 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/212 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/213 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/213 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/214 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/214 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/215 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/215 (0 ms) [----------] 216 tests from pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest (0 ms total) [----------] 14 tests from pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/0 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/0 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/1 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/1 (7 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/2 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/2 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/3 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/3 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/4 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/4 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/5 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/5 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/6 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/6 (7 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/7 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/7 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/8 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/8 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/9 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/9 (9 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/10 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/10 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/11 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/11 (7 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/12 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/12 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/13 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/13 (6 ms) [----------] 14 tests from pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest (90 ms total) [----------] 17 tests from pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/0 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/0 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/1 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/1 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/2 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/2 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/3 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/3 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/4 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/4 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/5 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/5 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/6 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/6 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/7 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/7 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/8 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/8 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/9 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/9 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/10 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/10 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/11 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/11 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/12 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/12 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/13 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/13 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/14 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/14 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/15 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/15 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/16 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/16 (0 ms) [----------] 17 tests from pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm (0 ms total) [----------] 7 tests from pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/0 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/0 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/1 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/1 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/2 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/2 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/3 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/3 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/4 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/4 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/5 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/5 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/6 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/6 (0 ms) [----------] 7 tests from pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal (0 ms total) [----------] 4 tests from pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid [ RUN ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/0 [ OK ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/0 (0 ms) [ RUN ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/1 [ OK ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/1 (0 ms) [ RUN ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/2 [ OK ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/2 (0 ms) [ RUN ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/3 [ OK ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/3 (0 ms) [----------] 4 tests from pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid (0 ms total) [----------] 2 tests from pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid [ RUN ] pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid.Invalid/0 [ OK ] pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid.Invalid/0 (0 ms) [ RUN ] pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid.Invalid/1 [ OK ] pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid.Invalid/1 (0 ms) [----------] 2 tests from pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid (0 ms total) [----------] 9 tests from pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/0 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/0 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/1 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/1 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/2 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/2 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/3 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/3 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/4 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/4 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/5 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/5 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/6 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/6 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/7 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/7 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/8 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/8 (0 ms) [----------] 9 tests from pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid (0 ms total) [----------] 4 tests from pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid [ RUN ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/0 [ OK ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/0 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/1 [ OK ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/1 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/2 [ OK ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/2 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/3 [ OK ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/3 (0 ms) [----------] 4 tests from pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid (0 ms total) [----------] 105 tests from pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/0 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/0 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/1 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/1 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/2 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/2 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/3 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/3 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/4 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/4 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/5 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/5 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/6 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/6 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/7 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/7 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/8 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/8 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/9 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/9 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/10 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/10 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/11 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/11 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/12 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/12 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/13 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/13 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/14 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/14 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/15 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/15 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/16 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/16 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/17 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/17 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/18 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/18 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/19 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/19 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/20 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/20 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/21 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/21 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/22 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/22 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/23 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/23 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/24 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/24 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/25 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/25 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/26 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/26 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/27 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/27 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/28 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/28 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/29 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/29 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/30 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/30 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/31 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/31 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/32 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/32 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/33 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/33 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/34 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/34 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/0 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/0 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/1 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/1 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/2 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/2 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/3 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/3 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/4 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/4 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/5 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/5 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/6 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/6 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/7 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/7 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/8 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/8 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/9 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/9 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/10 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/10 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/11 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/11 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/12 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/12 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/13 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/13 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/14 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/14 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/15 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/15 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/16 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/16 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/17 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/17 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/18 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/18 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/19 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/19 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/20 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/20 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/21 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/21 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/22 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/22 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/23 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/23 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/24 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/24 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/25 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/25 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/26 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/26 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/27 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/27 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/28 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/28 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/29 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/29 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/30 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/30 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/31 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/31 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/32 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/32 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/33 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/33 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/34 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/34 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/0 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/0 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/1 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/1 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/2 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/2 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/3 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/3 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/4 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/4 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/5 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/5 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/6 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/6 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/7 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/7 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/8 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/8 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/9 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/9 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/10 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/10 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/11 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/11 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/12 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/12 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/13 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/13 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/14 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/14 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/15 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/15 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/16 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/16 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/17 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/17 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/18 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/18 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/19 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/19 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/20 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/20 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/21 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/21 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/22 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/22 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/23 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/23 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/24 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/24 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/25 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/25 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/26 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/26 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/27 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/27 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/28 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/28 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/29 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/29 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/30 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/30 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/31 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/31 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/32 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/32 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/33 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/33 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/34 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/34 (0 ms) [----------] 105 tests from pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer (0 ms total) [----------] 128 tests from pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/0 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/0 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/1 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/1 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/2 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/2 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/3 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/3 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/4 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/4 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/5 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/5 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/6 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/6 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/7 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/7 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/8 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/8 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/9 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/9 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/10 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/10 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/11 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/11 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/12 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/12 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/13 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/13 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/14 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/14 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/15 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/15 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/16 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/16 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/17 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/17 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/18 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/18 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/19 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/19 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/20 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/20 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/21 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/21 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/22 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/22 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/23 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/23 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/24 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/24 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/25 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/25 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/26 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/26 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/27 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/27 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/28 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/28 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/29 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/29 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/30 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/30 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/31 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/31 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/32 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/32 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/33 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/33 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/34 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/34 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/35 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/35 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/36 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/36 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/37 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/37 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/38 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/38 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/39 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/39 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/40 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/40 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/41 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/41 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/42 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/42 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/43 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/43 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/44 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/44 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/45 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/45 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/46 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/46 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/47 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/47 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/48 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/48 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/49 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/49 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/50 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/50 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/51 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/51 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/52 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/52 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/53 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/53 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/54 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/54 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/55 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/55 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/56 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/56 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/57 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/57 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/58 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/58 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/59 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/59 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/60 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/60 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/61 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/61 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/62 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/62 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/63 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/63 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/64 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/64 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/65 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/65 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/66 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/66 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/67 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/67 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/68 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/68 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/69 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/69 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/70 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/70 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/71 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/71 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/72 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/72 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/73 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/73 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/74 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/74 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/75 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/75 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/76 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/76 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/77 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/77 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/78 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/78 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/79 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/79 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/80 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/80 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/81 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/81 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/82 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/82 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/83 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/83 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/84 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/84 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/85 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/85 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/86 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/86 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/87 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/87 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/88 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/88 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/89 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/89 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/90 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/90 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/91 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/91 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/92 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/92 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/93 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/93 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/94 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/94 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/95 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/95 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/96 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/96 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/97 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/97 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/98 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/98 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/99 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/99 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/100 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/100 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/101 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/101 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/102 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/102 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/103 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/103 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/104 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/104 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/105 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/105 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/106 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/106 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/107 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/107 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/108 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/108 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/109 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/109 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/110 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/110 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/111 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/111 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/112 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/112 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/113 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/113 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/114 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/114 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/115 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/115 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/116 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/116 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/117 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/117 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/118 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/118 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/119 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/119 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/120 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/120 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/121 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/121 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/122 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/122 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/123 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/123 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/124 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/124 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/125 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/125 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/126 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/126 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/127 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/127 (0 ms) [----------] 128 tests from pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID (1 ms total) [----------] 24 tests from pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/0 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/0 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/1 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/1 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/2 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/2 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/3 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/3 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/4 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/4 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/5 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/5 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/6 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/6 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/7 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/7 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/0 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/0 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/1 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/1 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/2 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/2 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/3 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/3 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/4 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/4 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/5 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/5 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/6 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/6 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/7 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/7 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/0 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/0 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/1 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/1 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/2 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/2 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/3 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/3 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/4 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/4 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/5 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/5 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/6 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/6 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/7 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/7 (3 ms) [----------] 24 tests from pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison (49 ms total) [----------] 143 tests from pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/0 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/0 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/1 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/1 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/2 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/2 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/3 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/3 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/4 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/4 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/5 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/5 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/6 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/6 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/7 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/7 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/8 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/8 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/9 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/9 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/10 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/10 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/11 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/11 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/12 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/12 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/13 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/13 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/14 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/14 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/15 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/15 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/16 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/16 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/17 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/17 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/18 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/18 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/19 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/19 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/20 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/20 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/21 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/21 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/22 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/22 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/23 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/23 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/24 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/24 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/25 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/25 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/26 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/26 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/27 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/27 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/28 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/28 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/29 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/29 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/30 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/30 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/31 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/31 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/32 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/32 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/33 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/33 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/34 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/34 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/35 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/35 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/36 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/36 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/37 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/37 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/38 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/38 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/39 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/39 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/40 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/40 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/41 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/41 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/42 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/42 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/43 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/43 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/44 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/44 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/45 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/45 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/46 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/46 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/47 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/47 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/48 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/48 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/49 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/49 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/50 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/50 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/51 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/51 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/52 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/52 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/53 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/53 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/54 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/54 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/55 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/55 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/56 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/56 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/57 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/57 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/58 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/58 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/59 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/59 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/60 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/60 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/61 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/61 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/62 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/62 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/63 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/63 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/64 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/64 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/65 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/65 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/66 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/66 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/67 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/67 (1 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/68 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/68 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/69 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/69 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/70 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/70 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/71 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/71 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/72 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/72 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/73 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/73 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/74 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/74 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/75 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/75 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/76 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/76 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/77 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/77 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/78 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/78 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/79 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/79 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/80 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/80 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/81 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/81 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/82 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/82 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/83 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/83 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/84 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/84 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/85 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/85 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/86 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/86 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/87 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/87 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/88 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/88 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/89 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/89 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/90 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/90 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/91 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/91 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/92 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/92 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/93 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/93 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/94 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/94 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/95 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/95 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/96 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/96 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/97 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/97 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/98 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/98 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/99 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/99 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/100 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/100 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/101 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/101 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/102 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/102 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/103 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/103 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/104 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/104 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/105 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/105 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/106 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/106 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/107 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/107 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/108 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/108 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/109 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/109 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/110 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/110 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/111 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/111 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/112 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/112 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/113 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/113 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/114 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/114 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/115 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/115 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/116 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/116 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/117 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/117 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/118 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/118 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/119 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/119 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/120 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/120 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/121 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/121 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/122 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/122 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/123 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/123 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/124 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/124 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/125 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/125 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/126 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/126 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/127 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/127 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/128 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/128 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/129 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/129 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/130 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/130 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/131 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/131 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/132 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/132 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/133 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/133 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/134 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/134 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/135 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/135 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/136 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/136 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/137 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/137 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/138 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/138 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/139 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/139 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/140 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/140 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/141 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/141 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/142 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/142 (0 ms) [----------] 143 tests from pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID (1 ms total) [----------] 8 tests from pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/0 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/0 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/1 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/1 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/2 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/2 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/3 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/3 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/4 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/4 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/5 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/5 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/6 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/6 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/7 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/7 (0 ms) [----------] 8 tests from pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID (0 ms total) [----------] 53 tests from pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/0 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/0 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/1 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/1 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/2 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/2 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/3 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/3 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/4 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/4 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/5 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/5 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/6 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/6 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/7 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/7 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/8 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/8 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/9 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/9 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/10 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/10 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/11 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/11 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/12 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/12 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/13 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/13 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/14 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/14 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/15 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/15 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/16 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/16 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/17 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/17 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/18 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/18 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/19 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/19 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/20 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/20 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/21 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/21 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/22 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/22 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/23 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/23 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/24 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/24 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/25 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/25 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/26 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/26 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/27 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/27 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/28 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/28 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/29 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/29 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/30 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/30 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/31 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/31 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/32 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/32 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/33 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/33 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/34 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/34 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/35 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/35 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/36 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/36 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/37 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/37 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/38 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/38 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/39 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/39 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/40 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/40 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/41 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/41 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/42 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/42 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/43 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/43 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/44 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/44 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/45 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/45 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/46 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/46 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/47 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/47 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/48 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/48 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/49 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/49 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/50 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/50 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/51 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/51 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/52 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/52 (0 ms) [----------] 53 tests from pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address (0 ms total) [----------] 83 tests from pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/0 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/0 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/1 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/1 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/2 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/2 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/3 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/3 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/4 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/4 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/5 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/5 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/6 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/6 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/7 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/7 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/8 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/8 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/9 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/9 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/10 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/10 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/11 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/11 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/12 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/12 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/13 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/13 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/14 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/14 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/15 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/15 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/16 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/16 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/17 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/17 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/18 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/18 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/19 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/19 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/20 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/20 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/21 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/21 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/22 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/22 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/23 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/23 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/24 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/24 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/25 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/25 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/26 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/26 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/27 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/27 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/28 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/28 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/29 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/29 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/30 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/30 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/31 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/31 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/32 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/32 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/33 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/33 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/34 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/34 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/35 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/35 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/36 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/36 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/37 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/37 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/38 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/38 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/39 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/39 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/40 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/40 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/41 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/41 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/42 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/42 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/43 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/43 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/44 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/44 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/45 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/45 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/46 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/46 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/47 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/47 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/48 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/48 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/49 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/49 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/50 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/50 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/51 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/51 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/52 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/52 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/53 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/53 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/54 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/54 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/55 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/55 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/56 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/56 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/57 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/57 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/58 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/58 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/59 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/59 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/60 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/60 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/61 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/61 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/62 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/62 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/63 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/63 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/64 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/64 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/65 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/65 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/66 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/66 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/67 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/67 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/68 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/68 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/69 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/69 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/70 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/70 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/71 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/71 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/72 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/72 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/73 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/73 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/74 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/74 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/75 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/75 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/76 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/76 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/77 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/77 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/78 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/78 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/79 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/79 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/80 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/80 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/81 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/81 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/82 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/82 (0 ms) [----------] 83 tests from pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address (0 ms total) [----------] 80 tests from pkixnames_CheckCertHostname/pkixnames_CheckCertHostname [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/0 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/1 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/1 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/2 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/2 (4 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/3 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/4 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/4 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/5 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/6 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/7 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/8 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/9 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/9 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/10 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/11 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/12 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/13 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/14 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/15 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/15 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/16 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/16 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/17 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/17 (4 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/18 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/18 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/19 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/20 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/21 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/22 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/22 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/23 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/23 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/24 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/25 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/25 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/26 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/26 (6 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/27 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/28 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/28 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/29 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/30 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/31 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/31 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/32 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/32 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/33 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/33 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/34 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/34 (4 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/35 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/36 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/37 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/38 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/39 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/39 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/40 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/40 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/41 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/41 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/42 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/43 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/44 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/45 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/45 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/46 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/47 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/47 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/48 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/48 (4 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/49 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/49 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/50 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/51 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/51 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/52 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/52 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/53 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/53 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/54 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/54 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/55 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/55 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/56 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/56 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/57 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/57 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/58 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/58 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/59 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/59 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/60 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/60 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/61 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/61 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/62 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/62 (4 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/63 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/63 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/64 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/64 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/65 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/65 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/66 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/66 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/67 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/67 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/68 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/68 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/69 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/69 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/70 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/70 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/71 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/71 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/72 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/72 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/73 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/73 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/74 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/74 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/75 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/75 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/76 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/76 (4 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/77 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/77 (6 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/78 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/78 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/79 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/79 (3 ms) [----------] 80 tests from pkixnames_CheckCertHostname/pkixnames_CheckCertHostname (252 ms total) [----------] 256 tests from pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/0 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/1 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/1 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/2 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/2 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/3 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/4 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/4 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/5 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/6 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/7 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/8 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/9 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/9 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/10 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/11 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/12 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/13 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/14 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/15 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/15 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/16 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/16 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/17 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/17 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/18 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/18 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/19 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/20 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/21 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/22 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/22 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/23 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/23 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/24 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/25 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/25 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/26 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/26 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/27 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/28 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/28 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/29 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/30 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/31 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/31 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/32 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/32 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/33 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/33 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/34 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/34 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/35 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/36 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/37 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/38 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/39 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/39 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/40 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/40 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/41 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/41 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/42 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/43 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/44 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/45 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/45 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/46 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/47 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/47 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/48 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/48 (6 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/49 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/49 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/50 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/51 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/51 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/52 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/52 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/53 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/53 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/54 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/54 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/55 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/55 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/56 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/56 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/57 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/57 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/58 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/58 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/59 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/59 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/60 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/60 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/61 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/61 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/62 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/62 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/63 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/63 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/64 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/64 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/65 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/65 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/66 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/66 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/67 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/67 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/68 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/68 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/69 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/69 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/70 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/70 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/71 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/71 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/72 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/72 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/73 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/73 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/74 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/74 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/75 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/75 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/76 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/76 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/77 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/77 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/78 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/78 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/79 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/79 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/80 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/80 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/81 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/81 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/82 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/82 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/83 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/83 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/84 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/84 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/85 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/85 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/86 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/86 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/87 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/87 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/88 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/88 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/89 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/89 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/90 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/90 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/91 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/91 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/92 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/92 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/93 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/93 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/94 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/94 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/95 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/95 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/96 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/96 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/97 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/97 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/98 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/98 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/99 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/99 (6 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/100 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/100 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/101 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/101 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/102 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/102 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/103 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/103 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/104 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/104 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/105 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/105 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/106 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/106 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/107 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/107 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/108 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/108 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/109 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/109 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/110 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/110 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/111 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/111 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/112 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/112 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/113 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/113 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/114 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/114 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/115 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/115 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/116 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/116 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/117 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/117 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/118 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/118 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/119 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/119 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/120 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/120 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/121 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/121 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/122 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/122 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/123 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/123 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/124 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/124 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/125 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/125 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/126 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/126 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/127 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/127 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/0 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/1 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/1 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/2 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/2 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/3 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/4 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/4 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/5 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/6 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/7 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/8 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/9 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/9 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/10 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/11 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/12 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/13 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/14 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/15 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/15 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/16 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/16 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/17 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/17 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/18 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/18 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/19 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/20 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/21 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/22 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/22 (6 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/23 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/23 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/24 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/25 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/25 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/26 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/26 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/27 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/28 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/28 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/29 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/30 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/31 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/31 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/32 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/32 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/33 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/33 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/34 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/34 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/35 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/36 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/37 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/38 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/39 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/39 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/40 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/40 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/41 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/41 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/42 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/43 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/44 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/45 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/45 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/46 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/47 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/47 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/48 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/48 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/49 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/49 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/50 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/51 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/51 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/52 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/52 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/53 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/53 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/54 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/54 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/55 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/55 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/56 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/56 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/57 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/57 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/58 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/58 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/59 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/59 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/60 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/60 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/61 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/61 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/62 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/62 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/63 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/63 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/64 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/64 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/65 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/65 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/66 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/66 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/67 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/67 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/68 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/68 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/69 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/69 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/70 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/70 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/71 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/71 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/72 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/72 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/73 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/73 (6 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/74 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/74 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/75 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/75 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/76 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/76 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/77 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/77 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/78 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/78 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/79 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/79 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/80 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/80 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/81 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/81 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/82 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/82 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/83 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/83 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/84 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/84 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/85 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/85 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/86 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/86 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/87 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/87 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/88 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/88 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/89 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/89 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/90 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/90 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/91 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/91 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/92 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/92 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/93 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/93 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/94 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/94 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/95 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/95 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/96 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/96 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/97 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/97 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/98 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/98 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/99 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/99 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/100 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/100 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/101 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/101 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/102 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/102 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/103 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/103 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/104 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/104 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/105 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/105 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/106 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/106 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/107 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/107 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/108 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/108 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/109 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/109 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/110 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/110 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/111 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/111 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/112 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/112 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/113 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/113 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/114 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/114 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/115 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/115 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/116 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/116 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/117 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/117 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/118 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/118 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/119 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/119 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/120 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/120 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/121 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/121 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/122 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/122 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/123 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/123 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/124 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/124 (6 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/125 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/125 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/126 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/126 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/127 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/127 (3 ms) [----------] 256 tests from pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference (800 ms total) [----------] 106 tests from pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/0 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/1 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/1 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/2 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/2 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/3 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/4 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/4 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/5 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/6 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/7 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/8 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/9 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/9 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/10 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/11 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/12 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/13 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/14 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/15 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/15 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/16 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/16 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/17 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/17 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/18 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/18 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/19 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/20 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/21 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/22 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/22 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/23 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/23 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/24 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/25 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/25 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/26 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/26 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/27 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/28 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/28 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/29 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/30 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/31 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/31 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/32 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/32 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/33 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/33 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/34 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/34 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/35 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/36 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/37 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/38 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/39 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/39 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/40 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/40 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/41 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/41 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/42 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/43 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/44 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/45 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/45 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/46 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/47 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/47 (6 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/48 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/48 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/49 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/49 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/50 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/51 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/51 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/52 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/52 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/0 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/1 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/1 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/2 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/2 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/3 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/4 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/4 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/5 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/6 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/7 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/8 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/9 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/9 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/10 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/11 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/12 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/13 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/14 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/15 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/15 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/16 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/16 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/17 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/17 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/18 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/18 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/19 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/20 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/21 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/22 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/22 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/23 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/23 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/24 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/25 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/25 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/26 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/26 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/27 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/28 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/28 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/29 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/30 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/31 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/31 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/32 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/32 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/33 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/33 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/34 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/34 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/35 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/36 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/37 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/38 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/39 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/39 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/40 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/40 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/41 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/41 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/42 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/43 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/44 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/45 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/45 (6 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/46 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/47 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/47 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/48 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/48 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/49 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/49 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/50 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/51 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/51 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/52 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/52 (3 ms) [----------] 106 tests from pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses (331 ms total) [----------] 133 tests from pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/0 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/0 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/1 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/1 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/2 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/2 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/3 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/3 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/4 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/4 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/5 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/5 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/6 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/6 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/7 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/7 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/8 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/8 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/9 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/9 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/10 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/10 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/11 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/11 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/12 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/12 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/13 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/13 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/14 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/14 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/15 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/15 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/16 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/16 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/17 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/17 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/18 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/18 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/19 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/19 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/20 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/20 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/21 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/21 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/22 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/22 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/23 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/23 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/24 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/24 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/25 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/25 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/26 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/26 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/27 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/27 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/28 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/28 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/29 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/29 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/30 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/30 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/31 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/31 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/32 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/32 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/33 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/33 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/34 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/34 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/35 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/35 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/36 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/36 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/37 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/37 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/38 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/38 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/39 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/39 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/40 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/40 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/41 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/41 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/42 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/42 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/43 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/43 (6 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/44 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/44 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/45 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/45 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/46 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/46 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/47 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/47 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/48 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/48 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/49 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/49 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/50 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/50 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/51 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/51 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/52 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/52 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/53 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/53 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/54 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/54 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/55 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/55 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/56 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/56 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/57 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/57 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/58 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/58 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/59 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/59 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/60 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/60 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/61 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/61 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/62 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/62 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/63 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/63 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/64 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/64 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/65 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/65 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/66 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/66 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/67 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/67 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/68 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/68 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/69 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/69 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/70 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/70 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/71 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/71 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/72 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/72 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/73 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/73 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/74 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/74 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/75 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/75 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/76 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/76 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/77 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/77 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/78 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/78 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/79 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/79 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/80 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/80 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/81 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/81 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/82 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/82 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/83 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/83 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/84 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/84 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/85 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/85 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/86 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/86 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/87 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/87 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/88 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/88 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/89 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/89 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/90 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/90 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/91 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/91 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/92 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/92 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/93 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/93 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/94 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/94 (6 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/95 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/95 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/96 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/96 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/97 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/97 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/98 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/98 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/99 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/99 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/100 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/100 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/101 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/101 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/102 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/102 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/103 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/103 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/104 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/104 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/105 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/105 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/106 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/106 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/107 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/107 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/108 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/108 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/109 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/109 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/110 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/110 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/111 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/111 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/112 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/112 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/113 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/113 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/114 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/114 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/115 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/115 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/116 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/116 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/117 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/117 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/118 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/118 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/119 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/119 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/120 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/120 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/121 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/121 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/122 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/122 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/123 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/123 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/124 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/124 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/125 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/125 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/126 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/126 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/127 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/127 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/128 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/128 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/129 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/129 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/130 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/130 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/131 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/131 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/132 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/132 (3 ms) [----------] 133 tests from pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints (414 ms total) [----------] 5 tests from pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/0 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/0 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/1 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/1 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/2 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/2 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/3 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/3 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/4 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/4 (3 ms) [----------] 5 tests from pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate (15 ms total) [----------] 5 tests from pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/0 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/0 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/1 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/1 (4 ms) [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/2 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/2 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/3 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/3 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/4 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/4 (3 ms) [----------] 5 tests from pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage (16 ms total) [----------] 8 tests from pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/0 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/0 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/1 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/1 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/2 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/2 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/3 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/3 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/4 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/4 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/5 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/5 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/6 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/6 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/7 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/7 (0 ms) [----------] 8 tests from pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes (0 ms total) [----------] Global test environment tear-down [==========] 1636 tests from 43 test suites ran. (12388 ms total) [ PASSED ] 1636 tests. gtests.sh: #24: mozpkix_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests/mozpkix_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/gtests TIMESTAMP gtests END: Tue Aug 3 00:32:13 UTC 2021 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Tue Aug 3 00:32:13 UTC 2021 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #1: create ssl_gtest database - PASSED ~/RPM/BUILD/nss-3.66.0/nss/tests ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n client -s CN=client -t ,, -x -m 1 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #2: create certificate: client rsa sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa -s CN=rsa -t ,, -x -m 2 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #3: create certificate: rsa rsa sign kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa2048 -s CN=rsa2048 -t ,, -x -m 3 -w -2 -v 120 -k rsa -g 2048 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4: create certificate: rsa2048 rsa2048 sign kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa8192 -s CN=rsa8192 -t ,, -x -m 4 -w -2 -v 120 -k rsa -g 8192 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #5: create certificate: rsa8192 rsa8192 sign kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_sign -s CN=rsa_sign -t ,, -x -m 5 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #6: create certificate: rsa_sign rsa sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_pss -s CN=rsa_pss -t ,, -x -m 6 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7: create certificate: rsa_pss rsapss sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_pss384 -s CN=rsa_pss384 -t ,, -x -m 7 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA384 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8: create certificate: rsa_pss384 rsapss384 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_pss512 -s CN=rsa_pss512 -t ,, -x -m 8 -w -2 -v 120 -k rsa -g 2048 --pss -Z SHA512 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9: create certificate: rsa_pss512 rsapss512 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_pss_noparam -s CN=rsa_pss_noparam -t ,, -x -m 9 -w -2 -v 120 -k rsa -g 2048 --pss -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #10: create certificate: rsa_pss_noparam rsapss_noparam sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_decrypt -s CN=rsa_decrypt -t ,, -x -m 10 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11: create certificate: rsa_decrypt rsa kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n ecdsa256 -s CN=ecdsa256 -t ,, -x -m 11 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12: create certificate: ecdsa256 p256 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n ecdsa384 -s CN=ecdsa384 -t ,, -x -m 12 -w -2 -v 120 -k ec -q secp384r1 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #13: create certificate: ecdsa384 p384 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n ecdsa521 -s CN=ecdsa521 -t ,, -x -m 13 -w -2 -v 120 -k ec -q secp521r1 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #14: create certificate: ecdsa521 p521 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n ecdh_ecdsa -s CN=ecdh_ecdsa -t ,, -x -m 14 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15: create certificate: ecdh_ecdsa p256 kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_ca -s CN=rsa_ca -t CT,CT,CT -x -m 15 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #16: create certificate: rsa_ca rsa_ca ca - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_chain -s CN=rsa_chain -t ,, -c rsa_ca -m 16 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #17: create certificate: rsa_chain rsa_chain sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_pss_ca -s CN=rsa_pss_ca -t CT,CT,CT -x -m 17 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #18: create certificate: rsa_pss_ca rsapss_ca ca - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_pss_chain -s CN=rsa_pss_chain -t ,, -c rsa_pss_ca -m 18 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #19: create certificate: rsa_pss_chain rsapss_chain sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n rsa_ca_rsa_pss_chain -s CN=rsa_ca_rsa_pss_chain -t ,, -c rsa_ca -m 19 -w -2 -v 120 -k rsa -g 1024 --pss-sign -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #20: create certificate: rsa_ca_rsa_pss_chain rsa_ca_rsapss_chain sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n ecdh_rsa -s CN=ecdh_rsa -t ,, -c rsa_ca -m 20 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #21: create certificate: ecdh_rsa ecdh_rsa kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n dsa -s CN=dsa -t ,, -x -m 21 -w -2 -v 120 -k dsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #22: create certificate: dsa dsa sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n delegator_ecdsa256 -s CN=delegator_ecdsa256 -t ,, -x -m 22 -w -2 -v 120 -k ec -q nistp256 --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #23: create certificate: delegator_ecdsa256 delegator_p256 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n delegator_rsae2048 -s CN=delegator_rsae2048 -t ,, -x -m 23 -w -2 -v 120 -k rsa -g 2048 --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #24: create certificate: delegator_rsae2048 delegator_rsae2048 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/ssl_gtests -n delegator_rsa_pss2048 -s CN=delegator_rsa_pss2048 -t ,, -x -m 24 -w -2 -v 120 -k rsa -g 2048 --pss --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #25: create certificate: delegator_rsa_pss2048 delegator_rsa_pss2048 sign - PASSED DEBUG: ssl_gtests will be divided into 1 chunk(s) [==========] Running 12780 tests from 103 test suites. [----------] Global test environment set-up. [----------] 8 tests from SelfEncryptTest128 [ RUN ] SelfEncryptTest128.ShortKeyName Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortKeyName (0 ms) [ RUN ] SelfEncryptTest128.ShortIv Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortIv (0 ms) [ RUN ] SelfEncryptTest128.ShortCiphertextLen Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortCiphertextLen (0 ms) [ RUN ] SelfEncryptTest128.ShortCiphertext Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortCiphertext (0 ms) [ RUN ] SelfEncryptTest128.MacWithAESKeyEncrypt Error: SEC_ERROR_LIBRARY_FAILURE [ OK ] SelfEncryptTest128.MacWithAESKeyEncrypt (0 ms) [ RUN ] SelfEncryptTest128.AESWithMacKeyEncrypt Error: SEC_ERROR_INVALID_KEY [ OK ] SelfEncryptTest128.AESWithMacKeyEncrypt (0 ms) [ RUN ] SelfEncryptTest128.MacWithAESKeyDecrypt Error: SEC_ERROR_LIBRARY_FAILURE [ OK ] SelfEncryptTest128.MacWithAESKeyDecrypt (0 ms) [ RUN ] SelfEncryptTest128.AESWithMacKeyDecrypt Error: SEC_ERROR_INVALID_KEY [ OK ] SelfEncryptTest128.AESWithMacKeyDecrypt (0 ms) [----------] 8 tests from SelfEncryptTest128 (0 ms total) [----------] 108 tests from TlsConnectStreamTls13 [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicket (10 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicketPha Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicketPha (11 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicketClientAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicketClientAuth (10 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttLateReadTls Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttLateReadTls (8 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttCoalesceReadTls Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttCoalesceReadTls (7 ms) [ RUN ] TlsConnectStreamTls13.TimePassesByDefault Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TimePassesByDefault (1013 ms) [ RUN ] TlsConnectStreamTls13.BadAntiReplayArgs Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.BadAntiReplayArgs (0 ms) [ RUN ] TlsConnectStreamTls13.SuppressEndOfEarlyDataClientOnly Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SuppressEndOfEarlyDataClientOnly (8 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuth (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthAfterResumption Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthAfterResumption (10 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthMultiple Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthMultiple (13 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthConcurrent Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthConcurrent (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthBeforeKeyUpdate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthBeforeKeyUpdate (3 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthDuringClientKeyUpdate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthDuringClientKeyUpdate (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthMissingExtension Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthMissingExtension (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthAfterClientAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthAfterClientAuth (10 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthContextMismatch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [47] 107426fb079f0071d3c433d52b735c6f36001c000d0018001604030503060302... handshake new: [47] 103d26fb079f0071d3c433d52b735c6f36001c000d0018001604030503060302... record old: [51] 0d00002f107426fb079f0071d3c433d52b735c6f36001c000d00180016040305... record new: [51] 0d00002f103d26fb079f0071d3c433d52b735c6f36001c000d00180016040305... server: Filtered packet: [73] 17030300447476692bff3a6c7e45a46c6401980b8fcc80085730aedc058814b0... server: Fatal alert sent: 47 server: Read error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Fatal alert received: 47 client: Read error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthContextMismatch (5 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthBadSignature Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [132] 0804008074025697510edf5694b1c0f43f4ba7ef1c4cdae3f74af4a42d0ec2ff... handshake new: [132] 0804498074025697510edf5694b1c0f43f4ba7ef1c4cdae3f74af4a42d0ec2ff... record old: [639] 0b0001cf10cfbd4870248a48e7efd6cb8a0931c15f0001bb0001b6308201b230... record new: [639] 0b0001cf10cfbd4870248a48e7efd6cb8a0931c15f0001bb0001b6308201b230... client: Filtered packet: [661] 170303029053001ed5f71a5ef4138601a336f46b989cf8a5458b4e3a23a9c7f4... server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthBadSignature (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthDecline Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Fatal alert sent: 116 server: Read error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthDecline (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthWithSessionTicketsEnabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthWithSessionTicketsEnabled (8 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthDisjointSchemes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthDisjointSchemes (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionAllNoopClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionAllNoopClient (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionAllNoopServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionAllNoopServer (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionEmptyWriterClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionEmptyWriterClient (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionEmptyWriterServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionEmptyWriterServer (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionWriterDisable Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionWriterDisable (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOverride Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionOverride (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientToServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionClientToServer (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerToClientSH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionServerToClientSH (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerToClientEE Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionServerToClientEE (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionUnsolicitedServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionUnsolicitedServer (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerReject Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionServerReject (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientReject Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionClientReject (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerRejectAlert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 246 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 246 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionServerRejectAlert (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientRejectAlert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 246 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionClientRejectAlert (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOnlyWriter Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CustomExtensionOnlyWriter (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOnlyHandler Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CustomExtensionOnlyHandler (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOverrunBuffer Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SEC_ERROR_APPLICATION_CALLBACK_ERROR: The certificate was rejected by extra checks in the application. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionOverrunBuffer (2 ms) [ RUN ] TlsConnectStreamTls13.RetryCallbackWithSessionTicketToken Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.RetryCallbackWithSessionTicketToken (8 ms) [ RUN ] TlsConnectStreamTls13.RetryStatelessDamageFirstClientHello Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING handshake old: [180] 0303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf66e2ba29364e0eee2f... handshake new: [184] 0303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf66e2ba29364e0eee2f... record old: [184] 010000b40303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf66e2ba2936... record new: [188] 010000b80303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf66e2ba2936... client: Filtered packet: [193] 16030100bc010000b80303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf... server: Changing state from INIT to CONNECTING handshake old: [508] 0303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf66e2ba29364e0eee2f... handshake new: [512] 0303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf66e2ba29364e0eee2f... record old: [512] 010001fc0303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf66e2ba2936... record new: [516] 010002000303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf66e2ba2936... client: Filtered packet: [521] 1603030204010002000303f147f0a5864f97d14a6d43b5cfd9edc317da90bbcf... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryStatelessDamageFirstClientHello (6 ms) [ RUN ] TlsConnectStreamTls13.RetryStatelessDamageSecondClientHello Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING handshake old: [508] 03032bdaaeb7f83ba6a0cabcbe206df8b4cde802a6829591cf9f9d1d7332cf15... handshake new: [512] 03032bdaaeb7f83ba6a0cabcbe206df8b4cde802a6829591cf9f9d1d7332cf15... record old: [512] 010001fc03032bdaaeb7f83ba6a0cabcbe206df8b4cde802a6829591cf9f9d1d... record new: [516] 0100020003032bdaaeb7f83ba6a0cabcbe206df8b4cde802a6829591cf9f9d1d... client: Filtered packet: [521] 16030302040100020003032bdaaeb7f83ba6a0cabcbe206df8b4cde802a68295... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryStatelessDamageSecondClientHello (7 ms) [ RUN ] TlsConnectStreamTls13.SecondClientHelloSendSameTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SecondClientHelloSendSameTicket (9 ms) [ RUN ] TlsConnectStreamTls13.RetryWithDifferentCipherSuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [151] 0303e261be9cf281689c8bea07757f97e21d1c8bbd3c6d3c44c45838a430c453... handshake new: [151] 0303e261be9cf281689c8bea07757f97e21d1c8bbd3c6d3c44c45838a430c453... record old: [155] 020000970303e261be9cf281689c8bea07757f97e21d1c8bbd3c6d3c44c45838... record new: [155] 020000970303e261be9cf281689c8bea07757f97e21d1c8bbd3c6d3c44c45838... server: Filtered packet: [823] 160303009b020000970303e261be9cf281689c8bea07757f97e21d1c8bbd3c6d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryWithDifferentCipherSuite (15 ms) [ RUN ] TlsConnectStreamTls13.HrrThenTls12 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.HrrThenTls12 (2 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttHrrThenTls12 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. [ OK ] TlsConnectStreamTls13.ZeroRttHrrThenTls12 (7 ms) [ RUN ] TlsConnectStreamTls13.HrrThenTls12SupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303c4a7f1c959f2d972166459c98a2c4b50f09220407fb5eafca6c4b95e4997... handshake new: [194] 0303c4a7f1c959f2d972166459c98a2c4b50f09220407fb5eafca6c4b95e4997... record old: [191] 010000bb0303c4a7f1c959f2d972166459c98a2c4b50f09220407fb5eafca6c4... record new: [198] 010000c20303c4a7f1c959f2d972166459c98a2c4b50f09220407fb5eafca6c4... client: Filtered packet: [203] 16030100c6010000c20303c4a7f1c959f2d972166459c98a2c4b50f09220407f... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.HrrThenTls12SupportedVersions (7 ms) [ RUN ] TlsConnectStreamTls13.KeyUpdateTooEarly_Client Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [774] 160303005a0200005603031072246337763c80c1916a0c5d3170760fe300e1af... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.KeyUpdateTooEarly_Client (4 ms) [ RUN ] TlsConnectStreamTls13.KeyUpdateTooEarly_Server Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [58] 1703030035db4faaadf99d1b6daa8b752408719bb23ef084abe0681d321899d4... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.KeyUpdateTooEarly_Server (4 ms) [ RUN ] TlsConnectStreamTls13.DecryptRecordClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DecryptRecordClient (4 ms) [ RUN ] TlsConnectStreamTls13.DecryptRecordServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DecryptRecordServer (4 ms) [ RUN ] TlsConnectStreamTls13.DropRecordServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record drop: TLS 1.2 Data 3000000000000:[40] 3e5b0257d1d248ee08137b48977cf670e2e8ddc50be8fdf8a0496c08b8d891c5... server: Drop packet server: Filtered packet: [72] 17030300433e5b0257d1d248ee08137b48977cf670e2e8ddc50be8fdf85cfb38... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DropRecordServer (4 ms) [ RUN ] TlsConnectStreamTls13.DropRecordClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record drop: TLS 1.2 Data 3000000000000:[43] d418954d34703eb6a526efd310b047200131355933a3c9dfab87368edb1fd02b... client: Drop packet client: Filtered packet: [72] 1703030043d418954d34703eb6a526efd310b047200131355933a3c9dfab873b... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DropRecordClient (4 ms) [ RUN ] TlsConnectStreamTls13.Tls13FailedWriteSecondFlight Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SOCKET_WRITE_FAILURE: Attempt to write encrypted data to underlying socket failed. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Tls13FailedWriteSecondFlight (4 ms) [ RUN ] TlsConnectStreamTls13.LargeRecord Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [10] 00010203040506070809 record new: [16384] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... client: Filtered packet: [16406] 1703034011e89733c529605c27bc6ef4cb2508bd4e6645d31c9d2d8c40d3580a... client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.LargeRecord (4 ms) [ RUN ] TlsConnectStreamTls13.TooLargeRecord Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [10] 00010203040506070809 record new: [16385] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... client: Filtered packet: [16407] 1703034012168db5d360a3bdba1e6b92ac8e8de618b7c8a55227e23a8f4a8af1... server: Fatal alert sent: 22 client: Fatal alert received: 22 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TooLargeRecord (4 ms) [ RUN ] TlsConnectStreamTls13.UnencryptedFinishedMessage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [41] 160303002414000020bcad1f436df9b7629d1b0e3046d83a81a1a298a9d920d4... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.UnencryptedFinishedMessage (4 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerZeroRtt (8 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncPostHandshake Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncPostHandshake (4 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncEarlyAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncEarlyAuth (5 ms) [ RUN ] TlsConnectStreamTls13.ForwardInvalidData Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.ForwardInvalidData (2 ms) [ RUN ] TlsConnectStreamTls13.SuppressEndOfEarlyData Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SuppressEndOfEarlyData (8 ms) [ RUN ] TlsConnectStreamTls13.ClientHelloF5Padding Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] TlsConnectStreamTls13.ClientHelloF5Padding (2 ms) [ RUN ] TlsConnectStreamTls13.RecordSizeClientExtensionInvalid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [180] 0303b003d43e34b6b49cf0c8d23161a734d632c505cf91dcc78efc3504835bc3... handshake new: [180] 0303b003d43e34b6b49cf0c8d23161a734d632c505cf91dcc78efc3504835bc3... record old: [184] 010000b40303b003d43e34b6b49cf0c8d23161a734d632c505cf91dcc78efc35... record new: [184] 010000b40303b003d43e34b6b49cf0c8d23161a734d632c505cf91dcc78efc35... client: Filtered packet: [189] 16030100b8010000b40303b003d43e34b6b49cf0c8d23161a734d632c505cf91... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RecordSizeClientExtensionInvalid (4 ms) [ RUN ] TlsConnectStreamTls13.ExternalResumptionUseSecondTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalResumptionUseSecondTicket (10 ms) [ RUN ] TlsConnectStreamTls13.ExternalTokenAfterHrr Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalTokenAfterHrr (22 ms) [ RUN ] TlsConnectStreamTls13.ExternalTokenWithPeerId Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client client: setting external resumption token server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalTokenWithPeerId (10 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello13 Version: TLS 1.3 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello13 (2 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHelloTwice Version: TLS 1.3 client: Send Direct [6] 140303000101 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHelloTwice (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterClientHelloEmptySid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [6] 140303000101 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterClientHelloEmptySid (4 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterServerHelloEmptySid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [32] eeb4fb3684ec49b27ed2615d2e218ffd98ee0dc0fc7ea319baefcdd47c1ec6c0 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [621] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [738] 160303005a020000560303a4ceba1810b26491e89a674beefad9f2666ec14c32... server: Send Direct [6] 140303000101 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterServerHelloEmptySid (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello12 Version: TLS 1.3 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello12 (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterFinished13 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [6] 140303000101 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterFinished13 (4 ms) [ RUN ] TlsConnectStreamTls13.Tls14ClientHelloWithSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303e1a93f74ee0be0639cdd0e65fe09dc453361c08a3411594ebb48f4950906... handshake new: [180] 0305e1a93f74ee0be0639cdd0e65fe09dc453361c08a3411594ebb48f4950906... record old: [184] 010000b40303e1a93f74ee0be0639cdd0e65fe09dc453361c08a3411594ebb48... record new: [184] 010000b40305e1a93f74ee0be0639cdd0e65fe09dc453361c08a3411594ebb48... client: Filtered packet: [189] 16030100b8010000b40305e1a93f74ee0be0639cdd0e65fe09dc453361c08a34... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Tls14ClientHelloWithSupportedVersions (3 ms) [ RUN ] TlsConnectStreamTls13.Ssl30ClientHelloWithSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 03038ea9582c43c6aa7236b94ed013659afcb43cadceeb7196cd3011fc303058... handshake new: [180] 03008ea9582c43c6aa7236b94ed013659afcb43cadceeb7196cd3011fc303058... record old: [184] 010000b403038ea9582c43c6aa7236b94ed013659afcb43cadceeb7196cd3011... record new: [184] 010000b403008ea9582c43c6aa7236b94ed013659afcb43cadceeb7196cd3011... client: Filtered packet: [189] 16030100b8010000b403008ea9582c43c6aa7236b94ed013659afcb43cadceeb... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Ssl30ClientHelloWithSupportedVersions (3 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptIgnoreSingleUnknownSuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptIgnoreSingleUnknownSuite (5 ms) [ RUN ] TlsConnectStreamTls13.OuterWithEchAndEchIsInner Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [508] 0303852da59237bcfe70ba69264602d94634ec8a9b3f15eec78cd366c82caef3... handshake new: [512] 0303852da59237bcfe70ba69264602d94634ec8a9b3f15eec78cd366c82caef3... record old: [512] 010001fc0303852da59237bcfe70ba69264602d94634ec8a9b3f15eec78cd366... record new: [516] 010002000303852da59237bcfe70ba69264602d94634ec8a9b3f15eec78cd366... client: Filtered packet: [521] 1603010204010002000303852da59237bcfe70ba69264602d94634ec8a9b3f15... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.OuterWithEchAndEchIsInner (2 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithResume Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithResume (9 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithExternalPsk Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithExternalPsk (5 ms) [ RUN ] TlsConnectStreamTls13.EchDowngradeNoFalseStart Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [213] 000100034d00205e3e283fd159074f48098c27e74dc6239207e6c8ed91796091... handshake old: [512] 03032c2b24b20aee77832f23ede8ce8db91ee9377d3bf6a1a2f3213876108c3e... handshake new: [295] 03032c2b24b20aee77832f23ede8ce8db91ee9377d3bf6a1a2f3213876108c3e... record old: [516] 0100020003032c2b24b20aee77832f23ede8ce8db91ee9377d3bf6a1a2f32138... record new: [299] 0100012703032c2b24b20aee77832f23ede8ce8db91ee9377d3bf6a1a2f32138... client: Filtered packet: [304] 160301012b0100012703032c2b24b20aee77832f23ede8ce8db91ee9377d3bf6... [ OK ] TlsConnectStreamTls13.EchDowngradeNoFalseStart (4 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithHrr (8 ms) [ RUN ] TlsConnectStreamTls13.GreaseEchHrrMatches Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.GreaseEchHrrMatches (7 ms) [ RUN ] TlsConnectStreamTls13.EchFailDecryptCH2 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [117] 000100034d0000006cb67621fd2e8e9ec9fa3fd268a5d6e311edb6dcf370dafd... extension new: [117] 000100034d0000006cb67621fd2e8e9ec9fa3fd268a5d6e311edb6dcf370dafd... handshake old: [570] 0303dce10a2f81b6604c88a22d73c7caa56f2134c52d8d356f3ff078885fee17... handshake new: [570] 0303dce10a2f81b6604c88a22d73c7caa56f2134c52d8d356f3ff078885fee17... record old: [574] 0100023a0303dce10a2f81b6604c88a22d73c7caa56f2134c52d8d356f3ff078... record new: [574] 0100023a0303dce10a2f81b6604c88a22d73c7caa56f2134c52d8d356f3ff078... client: Filtered packet: [579] 160303023e0100023a0303dce10a2f81b6604c88a22d73c7caa56f2134c52d8d... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchFailDecryptCH2 (3 ms) [ RUN ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingYN Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingYN (6 ms) [ RUN ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingNY Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [147] 000100034d002012bebd546dd75eee73c6eeb7a65403d702d258de362595e8e8... handshake old: [512] 0303ae34acfa2b0c429ce3adbaaa0579e08b3d96da74af6402600b92251e641d... handshake new: [361] 0303ae34acfa2b0c429ce3adbaaa0579e08b3d96da74af6402600b92251e641d... record old: [516] 010002000303ae34acfa2b0c429ce3adbaaa0579e08b3d96da74af6402600b92... record new: [365] 010001690303ae34acfa2b0c429ce3adbaaa0579e08b3d96da74af6402600b92... client: Filtered packet: [370] 160301016d010001690303ae34acfa2b0c429ce3adbaaa0579e08b3d96da74af... server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingNY (6 ms) [ RUN ] TlsConnectStreamTls13.EchHrrChangeCipherSuite Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [117] 000100034d0000006c405a05006631ddc0e2203dbd0e72b3f8c4ee6cbefc9173... extension new: [117] 490100034d0000006c405a05006631ddc0e2203dbd0e72b3f8c4ee6cbefc9173... handshake old: [570] 03036a0b1a3503a4b85a9c4f35f74bb3562ae59015a5576d2aeca16c8f9b4dbb... handshake new: [570] 03036a0b1a3503a4b85a9c4f35f74bb3562ae59015a5576d2aeca16c8f9b4dbb... record old: [574] 0100023a03036a0b1a3503a4b85a9c4f35f74bb3562ae59015a5576d2aeca16c... record new: [574] 0100023a03036a0b1a3503a4b85a9c4f35f74bb3562ae59015a5576d2aeca16c... client: Filtered packet: [579] 160303023e0100023a03036a0b1a3503a4b85a9c4f35f74bb3562ae59015a557... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchHrrChangeCipherSuite (7 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithHrrAndPsk Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithHrrAndPsk (7 ms) [ RUN ] TlsConnectStreamTls13.EchRejectWithHrrAndPsk Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.EchRejectWithHrrAndPsk (8 ms) [ RUN ] TlsConnectStreamTls13.EchRejectResume Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchRejectResume (10 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttBoth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchZeroRttBoth (9 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttFirst Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchZeroRttFirst (8 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttSecond Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchZeroRttSecond (9 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttRejectSecond Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED [ OK ] TlsConnectStreamTls13.EchZeroRttRejectSecond (9 ms) [ RUN ] TlsConnectStreamTls13.EchRejectUnknownCriticalExtension Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] TlsConnectStreamTls13.EchRejectUnknownCriticalExtension (6 ms) [ RUN ] TlsConnectStreamTls13.EchRejectAuthCertSuccessNoRetries Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED [ OK ] TlsConnectStreamTls13.EchRejectAuthCertSuccessNoRetries (4 ms) [ RUN ] TlsConnectStreamTls13.EchRejectSuppressClientCert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchRejectSuppressClientCert (5 ms) [ RUN ] TlsConnectStreamTls13.EchRejectAuthCertSuccessIncompatibleRetries Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.EchRejectAuthCertSuccessIncompatibleRetries (4 ms) [ RUN ] TlsConnectStreamTls13.EchRejectAuthCertFail Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchRejectAuthCertFail (5 ms) [ RUN ] TlsConnectStreamTls13.EchValidateGreaseResponse Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [70] 0044fe0a00404d00200020b05f91ed099c665f6914de1078018368189307f073... extension new: [70] 4944fe0a00404d00200020b05f91ed099c665f6914de1078018368189307f073... handshake old: [110] 006cfe0a00460044fe0a00404d00200020b05f91ed099c665f6914de10780183... handshake new: [110] 006cfe0a00464944fe0a00404d00200020b05f91ed099c665f6914de10780183... record old: [731] 0800006e006cfe0a00460044fe0a00404d00200020b05f91ed099c665f6914de... record new: [731] 0800006e006cfe0a00464944fe0a00404d00200020b05f91ed099c665f6914de... server: Filtered packet: [848] 160303005a020000560303507abcee9dcafe7728faf7d2563e98fa7f80694e89... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_KEYS: SSL received a malformed ESNI keys structure client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchValidateGreaseResponse (11 ms) [ RUN ] TlsConnectStreamTls13.EchBadCiphertext Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100034d00204ab080f31d4ad199ac9d7a99d1f336eec8bed182532547b533... extension new: [147] 000100034d00204ab080f31d4ad199ac9d7a99d1f336eec8bed182532547b533... handshake old: [512] 030387141b11a00559b2c658d194c2ebf527d5a620e061cbb84bef5968e6c5fc... handshake new: [512] 030387141b11a00559b2c658d194c2ebf527d5a620e061cbb84bef5968e6c5fc... record old: [516] 01000200030387141b11a00559b2c658d194c2ebf527d5a620e061cbb84bef59... record new: [516] 01000200030387141b11a00559b2c658d194c2ebf527d5a620e061cbb84bef59... client: Filtered packet: [521] 160301020401000200030387141b11a00559b2c658d194c2ebf527d5a620e061... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchBadCiphertext (5 ms) [ RUN ] TlsConnectStreamTls13.EchOuterBinding Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020304 handshake old: [512] 030322a2500ecf2ea7960a813d26132fdfd91ae72eff57c54bd4c67b7e8ab6d1... handshake new: [510] 030322a2500ecf2ea7960a813d26132fdfd91ae72eff57c54bd4c67b7e8ab6d1... record old: [516] 01000200030322a2500ecf2ea7960a813d26132fdfd91ae72eff57c54bd4c67b... record new: [514] 010001fe030322a2500ecf2ea7960a813d26132fdfd91ae72eff57c54bd4c67b... client: Filtered packet: [519] 1603010202010001fe030322a2500ecf2ea7960a813d26132fdfd91ae72eff57... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchOuterBinding (5 ms) [ RUN ] TlsConnectStreamTls13.EchBadCiphersuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100034d0020a3e2dd2ac62d5dcc792811c4f17e48d8633ef9889d5cb8e99e... extension new: [147] 490100034d0020a3e2dd2ac62d5dcc792811c4f17e48d8633ef9889d5cb8e99e... handshake old: [512] 030314362692f148a6ff6632f92e29cefef08f7274f19a11a60979062f7254ce... handshake new: [512] 030314362692f148a6ff6632f92e29cefef08f7274f19a11a60979062f7254ce... record old: [516] 01000200030314362692f148a6ff6632f92e29cefef08f7274f19a11a6097906... record new: [516] 01000200030314362692f148a6ff6632f92e29cefef08f7274f19a11a6097906... client: Filtered packet: [521] 160301020401000200030314362692f148a6ff6632f92e29cefef08f7274f19a... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100034d00205824b6e5a89e1cd7fb67fe93aeacb7f2387763c9072e519e09... extension new: [147] 0001004c4d00205824b6e5a89e1cd7fb67fe93aeacb7f2387763c9072e519e09... handshake old: [512] 03034cd2c5cffa039505ec6fbdec924b59edcb9d5b6445a48166e36d4f8849e6... handshake new: [512] 03034cd2c5cffa039505ec6fbdec924b59edcb9d5b6445a48166e36d4f8849e6... record old: [516] 0100020003034cd2c5cffa039505ec6fbdec924b59edcb9d5b6445a48166e36d... record new: [516] 0100020003034cd2c5cffa039505ec6fbdec924b59edcb9d5b6445a48166e36d... client: Filtered packet: [521] 16030102040100020003034cd2c5cffa039505ec6fbdec924b59edcb9d5b6445... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchBadCiphersuite (8 ms) [ RUN ] TlsConnectStreamTls13.EchToTls12Server Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchToTls12Server (4 ms) [ RUN ] TlsConnectStreamTls13.NoEchFromTls12Client Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.NoEchFromTls12Client (4 ms) [ RUN ] TlsConnectStreamTls13.EchOuterWith12Max Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020303 handshake old: [512] 03033528cfbe5cfec13bca5ff06f2db124ca373eeb2e499cacfc9678eb7b3ac2... handshake new: [510] 03033528cfbe5cfec13bca5ff06f2db124ca373eeb2e499cacfc9678eb7b3ac2... record old: [516] 0100020003033528cfbe5cfec13bca5ff06f2db124ca373eeb2e499cacfc9678... record new: [514] 010001fe03033528cfbe5cfec13bca5ff06f2db124ca373eeb2e499cacfc9678... client: Filtered packet: [519] 1603010202010001fe03033528cfbe5cfec13bca5ff06f2db124ca373eeb2e49... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchOuterWith12Max (4 ms) [ RUN ] TlsConnectStreamTls13.EchOuterExtensionsInCHOuter Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303ac7da15d494891e9777ddfde33be0edd0f9c5c0ba5bf916f5549f6457b5b... handshake new: [186] 0303ac7da15d494891e9777ddfde33be0edd0f9c5c0ba5bf916f5549f6457b5b... record old: [184] 010000b40303ac7da15d494891e9777ddfde33be0edd0f9c5c0ba5bf916f5549... record new: [190] 010000ba0303ac7da15d494891e9777ddfde33be0edd0f9c5c0ba5bf916f5549... client: Filtered packet: [195] 16030100be010000ba0303ac7da15d494891e9777ddfde33be0edd0f9c5c0ba5... server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchOuterExtensionsInCHOuter (3 ms) [ RUN ] TlsConnectStreamTls13.EchBackendAcceptance Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303ef71eaffece15a12c5495603838d0f5b9ba370186c6b7d35ddda672cbda4... handshake new: [184] 0303ef71eaffece15a12c5495603838d0f5b9ba370186c6b7d35ddda672cbda4... record old: [184] 010000b40303ef71eaffece15a12c5495603838d0f5b9ba370186c6b7d35ddda... record new: [188] 010000b80303ef71eaffece15a12c5495603838d0f5b9ba370186c6b7d35ddda... client: Filtered packet: [193] 16030100bc010000b80303ef71eaffece15a12c5495603838d0f5b9ba370186c... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchBackendAcceptance (4 ms) [ RUN ] TlsConnectStreamTls13.ClientRejectHandshakeCertReq Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [199] 16030300600200005c030391d7f74988d82e8912a89084206143821d051e794c... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_REQUEST: SSL received an unexpected Certificate Request handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ClientRejectHandshakeCertReq (3 ms) [ RUN ] TlsConnectStreamTls13.RejectPha Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [199] 16030300600200005c030342d55adbfa38396a126fefc684cc2ebc1a756794b0... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Filtered packet: [27] 17030300161c91781680697bc57ce42d1fc7a62e21462601995045 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_REQUEST: SSL received an unexpected Certificate Request handshake message. client: Changing state from CONNECTED to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.RejectPha (3 ms) [----------] 108 tests from TlsConnectStreamTls13 (1609 ms total) [----------] 19 tests from TlsConnectDatagram13 [ RUN ] TlsConnectDatagram13.ZeroRttLateReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttLateReadDtls (22 ms) [ RUN ] TlsConnectDatagram13.ZeroRttLateArrivalDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Send Direct [25] 2d33c10014387386fabbac2d644c87bb168f646ba22683b121 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttLateArrivalDtls (8 ms) [ RUN ] TlsConnectDatagram13.ZeroRttNoCoalesceReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttNoCoalesceReadDtls (7 ms) [ RUN ] TlsConnectDatagram13.ZeroRttShortReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttShortReadDtls (8 ms) [ RUN ] TlsConnectDatagram13.AuthCompleteBeforeFinished Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.AuthCompleteBeforeFinished (55 ms) [ RUN ] TlsConnectDatagram13.SendOutOfOrderAppWithHandshakeKey Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Send Direct [25] 2e074a0014d0dfc74043f6fd8586d02604053677f47b7117df server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendOutOfOrderAppWithHandshakeKey (4 ms) [ RUN ] TlsConnectDatagram13.SendOutOfOrderHsNonsenseWithHandshakeKey Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Send Direct [25] 2e2032001418da28772e9afb582fbfa2af05ef648611ab95a7 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendOutOfOrderHsNonsenseWithHandshakeKey (4 ms) [ RUN ] TlsConnectDatagram13.UnderflowSequenceNumber Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.UnderflowSequenceNumber (4 ms) [ RUN ] TlsConnectDatagram13.Dtls13RejectLegacyCookie Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd287da370fd6f8b1f6b0f0af33c626920467cde926d5345599b60e4dfe272... handshake new: [184] fefd287da370fd6f8b1f6b0f0af33c626920467cde926d5345599b60e4dfe272... record old: [193] 010000b500000000000000b5fefd287da370fd6f8b1f6b0f0af33c626920467c... record new: [196] 010000b800000000000000b8fefd287da370fd6f8b1f6b0f0af33c626920467c... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd287da370fd... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.Dtls13RejectLegacyCookie (3 ms) [ RUN ] TlsConnectDatagram13.DropClientSecondFlightWithHelloRetry Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DropClientSecondFlightWithHelloRetry (23 ms) [ RUN ] TlsConnectDatagram13.MessageSeq1ClientHello Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record old: [193] 010000b500000000000000b5fefdf041714d3bbcc9e14befb32ff91790f79ecd... record new: [193] 010000b500010000000000b5fefdf041714d3bbcc9e14befb32ff91790f79ecd... client: Filtered packet: [206] 16feff000000000000000000c1010000b500010000000000b5fefdf041714d3b... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.MessageSeq1ClientHello (3 ms) [ RUN ] TlsConnectDatagram13.AeadLimit Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked record old: [27] 8686a43dfa8af6eb3fd040716802991ed1156a5fe8fe05600357ec record new: [27] 8686a43dfa8af6eb3fd040716802991ed1156a5fe8fe05600357ed client: Filtered packet: [32] 2f0000001b8686a43dfa8af6eb3fd040716802991ed1156a5fe8fe05600357ed server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked record old: [27] 53ec12528bbddb000914494ef9ca1ed4ed40f7caf40e44bc5b7b78 record new: [27] 53ec12528bbddb000914494ef9ca1ed4ed40f7caf40e44bc5b7b79 client: Filtered packet: [32] 2f0000001b53ec12528bbddb000914494ef9ca1ed4ed40f7caf40e44bc5b7b79 server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.AeadLimit (4 ms) [ RUN ] TlsConnectDatagram13.ShortHeadersClient Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ShortHeadersClient (4 ms) [ RUN ] TlsConnectDatagram13.ShortHeadersServer Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ShortHeadersServer (4 ms) [ RUN ] TlsConnectDatagram13.DtlsAlternateShortHeader Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [23] 2b076ee1dc821da35676d778d03779ae22cae42f9b8fda client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DtlsAlternateShortHeader (4 ms) [ RUN ] TlsConnectDatagram13.ForwardDataDtls Version: DTLS 1.3 [ OK ] TlsConnectDatagram13.ForwardDataDtls (2 ms) [ RUN ] TlsConnectDatagram13.SendSessionTicketDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendSessionTicketDtls (6 ms) [ RUN ] TlsConnectDatagram13.CompatModeDtlsClient Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.CompatModeDtlsClient (4 ms) [ RUN ] TlsConnectDatagram13.CompatModeDtlsServer Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefdf007fd27ac3ac93d238337dc8ef07bcccfa7107ecc44b5c6a98d2271431f... handshake new: [213] fefdf007fd27ac3ac93d238337dc8ef07bcccfa7107ecc44b5c6a98d2271431f... record old: [193] 010000b500000000000000b5fefdf007fd27ac3ac93d238337dc8ef07bcccfa7... record new: [225] 010000d500000000000000d5fefdf007fd27ac3ac93d238337dc8ef07bcccfa7... client: Filtered packet: [238] 16feff000000000000000000e1010000d500000000000000d5fefdf007fd27ac... [ OK ] TlsConnectDatagram13.CompatModeDtlsServer (4 ms) [----------] 19 tests from TlsConnectDatagram13 (173 ms total) [----------] 9 tests from AeadTest [ RUN ] AeadTest.AeadBadVersion [ OK ] AeadTest.AeadBadVersion (0 ms) [ RUN ] AeadTest.AeadUnsupportedCipher [ OK ] AeadTest.AeadUnsupportedCipher (0 ms) [ RUN ] AeadTest.AeadOlderCipher [ OK ] AeadTest.AeadOlderCipher (0 ms) [ RUN ] AeadTest.AeadNoLabel [ OK ] AeadTest.AeadNoLabel (0 ms) [ RUN ] AeadTest.AeadLongLabel [ OK ] AeadTest.AeadLongLabel (0 ms) [ RUN ] AeadTest.AeadNoPointer [ OK ] AeadTest.AeadNoPointer (0 ms) [ RUN ] AeadTest.AeadAes128Gcm [ OK ] AeadTest.AeadAes128Gcm (0 ms) [ RUN ] AeadTest.AeadAes256Gcm [ OK ] AeadTest.AeadAes256Gcm (0 ms) [ RUN ] AeadTest.AeadChaCha20Poly1305 [ OK ] AeadTest.AeadChaCha20Poly1305 (0 ms) [----------] 9 tests from AeadTest (0 ms total) [----------] 3 tests from TlsAgentStreamTestClient [ RUN ] TlsAgentStreamTestClient.EncryptedExtensionsInClearTwoPieces client: Changing state from INIT to CONNECTING Process message: [25] 16030400140200005603039cbc149b0e2efa0df3f05c707ae0 Process message: [79] 160304004ad19b3e5a446bdfe5c22864f700c19c08760800130100002e003300... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestClient.EncryptedExtensionsInClearTwoPieces (1 ms) [ RUN ] TlsAgentStreamTestClient.Set0RttOptionThenWrite client: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestClient.Set0RttOptionThenWrite (0 ms) [ RUN ] TlsAgentStreamTestClient.Set0RttOptionThenRead client: Changing state from INIT to CONNECTING Process message: [11] 1703040006414243444546 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestClient.Set0RttOptionThenRead (0 ms) [----------] 3 tests from TlsAgentStreamTestClient (1 ms total) [----------] 3 tests from TlsAgentDgramTestClient [ RUN ] TlsAgentDgramTestClient.EncryptedExtensionsInClearTwoPieces client: Changing state from INIT to CONNECTING Process message: [45] 16030400000000000000000020020000560000000000000014fefd9cbc149b0e... Process message: [103] 1603040000000000000001005a020000560000000014000042446bdfe5c22864... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.EncryptedExtensionsInClearTwoPieces (1 ms) [ RUN ] TlsAgentDgramTestClient.AckWithBogusLengthField client: Changing state from INIT to CONNECTING Process message: [16] 1afefd00000000000000000003000800 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DTLS_ACK: SSL received a malformed DTLS ACK client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.AckWithBogusLengthField (0 ms) [ RUN ] TlsAgentDgramTestClient.AckWithNonEvenLength client: Changing state from INIT to CONNECTING Process message: [16] 1afefd00000000000000000003000100 client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_BAD_SERVER: The client has encountered bad data from the server. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.AckWithNonEvenLength (0 ms) [----------] 3 tests from TlsAgentDgramTestClient (1 ms total) [----------] 5 tests from TlsAgentStreamTestServer [ RUN ] TlsAgentStreamTestServer.Set0RttOptionClientHelloThenRead server: Changing state from INIT to CONNECTING Process message: [216] 16030400d3010000cf03036cb34681c81af9d20597487ca831031c06a862b190... Process message: [216] 17030400064142434445466cb34681c81af9d20597487ca831031c06a862b190... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestServer.Set0RttOptionClientHelloThenRead (6 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1SignAndKEX server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1SignAndKEX (5 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1Sign server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1Sign (4 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1KEX server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1KEX (5 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPss server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPss (4 ms) [----------] 5 tests from TlsAgentStreamTestServer (24 ms total) [----------] 5 tests from TlsCipherOrderTest [ RUN ] TlsCipherOrderTest.CipherOrderGet Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsCipherOrderTest.CipherOrderGet (4 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSet Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] TlsCipherOrderTest.CipherOrderSet (4 ms) [ RUN ] TlsCipherOrderTest.CipherOrderCopySocket Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderCopySocket (2 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSetLower Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderSetLower (2 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSetControls Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderSetControls (2 ms) [----------] 5 tests from TlsCipherOrderTest (14 ms total) [----------] 44 tests from TlsConnectTest [ RUN ] TlsConnectTest.DamageSecretHandleClientFinished Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Damaging HS secret client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectTest.DamageSecretHandleClientFinished (4 ms) [ RUN ] TlsConnectTest.DamageSecretHandleServerFinished Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [95] 160303005a020000560303199550b6b366f4d7558b5294ab0d769492e725db16... record drop: TLS 1.2 Handshake 2000000000000:[90] 020000560303199550b6b366f4d7558b5294ab0d769492e725db16533643dfaf... server: Filtered packet: [679] 17030302a2173c9fe09f0baa19c0e94c0a4b80124e56f66ce983ac052202aec6... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.DamageSecretHandleServerFinished (4 ms) [ RUN ] TlsConnectTest.GatherEmptyV3Record Version: TLS (no version) client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.GatherEmptyV3Record (4 ms) [ RUN ] TlsConnectTest.GatherExcessiveV3Record Version: TLS (no version) client: Send Direct [5] 1603014801 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 22 server: Handshake failed with error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.GatherExcessiveV3Record (2 ms) [ RUN ] TlsConnectTest.Select12AfterHelloRetryRequest Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.Select12AfterHelloRetryRequest (11 ms) [ RUN ] TlsConnectTest.KeyUpdateClient Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateClient (4 ms) [ RUN ] TlsConnectTest.KeyUpdateClientRequestUpdate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateClientRequestUpdate (4 ms) [ RUN ] TlsConnectTest.KeyUpdateServer Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateServer (4 ms) [ RUN ] TlsConnectTest.KeyUpdateServerRequestUpdate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateServerRequestUpdate (4 ms) [ RUN ] TlsConnectTest.KeyUpdateConsecutiveRequests Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateConsecutiveRequests (4 ms) [ RUN ] TlsConnectTest.KeyUpdateLocalUpdateThenConsecutiveRequests Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateLocalUpdateThenConsecutiveRequests (4 ms) [ RUN ] TlsConnectTest.KeyUpdateMultiple Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateMultiple (5 ms) [ RUN ] TlsConnectTest.KeyUpdateBothRequest Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateBothRequest (4 ms) [ RUN ] TlsConnectTest.KeyUpdateAutomaticOnWrite Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateAutomaticOnWrite (4 ms) [ RUN ] TlsConnectTest.KeyUpdateAutomaticOnRead Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateAutomaticOnRead (4 ms) [ RUN ] TlsConnectTest.ConnectSSLv3 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsConnectTest.ConnectSSLv3 (3 ms) [ RUN ] TlsConnectTest.ConnectSSLv3ClientAuth Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsConnectTest.ConnectSSLv3ClientAuth (5 ms) [ RUN ] TlsConnectTest.OneNRecordSplitting Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.OneNRecordSplitting (3 ms) [ RUN ] TlsConnectTest.HandshakeSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.HandshakeSecrets (4 ms) [ RUN ] TlsConnectTest.ZeroRttSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.ZeroRttSecrets (8 ms) [ RUN ] TlsConnectTest.KeyUpdateSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateSecrets (4 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionTwice Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionTwice (12 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDuplicateNST Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDuplicateNST (9 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDuplicateNSTWithToken Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDuplicateNSTWithToken (8 ms) [ RUN ] TlsConnectTest.SendSessionTicketWithTicketsDisabled Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketWithTicketsDisabled (9 ms) [ RUN ] TlsConnectTest.SendTicketAfterResumption Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendTicketAfterResumption (12 ms) [ RUN ] TlsConnectTest.SendSessionTicketInappropriate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketInappropriate (5 ms) [ RUN ] TlsConnectTest.SendSessionTicketMassiveToken Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketMassiveToken (5 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDowngrade Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDowngrade (9 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionForcedDowngrade Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... handshake new: [92] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... record old: [96] 0200005c03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... record new: [96] 0200005c03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... handshake old: [92] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... handshake new: [92] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... record old: [96] 0200005c03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... record new: [96] 0200005c03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... extension drop: [2] 0304 handshake old: [92] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... handshake new: [86] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... record old: [96] 0200005c03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... record new: [90] 0200005603035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... extension drop: [36] 001d00208f2366a3361c3b9116ba7160570dff0dde81b2b3f7ba06ef9b81d6cc... handshake old: [86] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... handshake new: [46] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... record old: [90] 0200005603035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... record new: [50] 0200002e03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... extension drop: [2] 0000 handshake old: [46] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... handshake new: [40] 03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28dcc292c75... record old: [50] 0200002e03035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... record new: [44] 0200002803035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6fb7922ef28d... server: Filtered packet: [147] 160303002c0200002803035feaf0f0ec2d398c05b96c975a09bf67ec00ff3f6f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestTls13ResumptionForcedDowngrade (9 ms) [ RUN ] TlsConnectTest.RenegotiationConfigTls13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.RenegotiationConfigTls13 (4 ms) [ RUN ] TlsConnectTest.Tls13RejectsRehandshakeClient Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.Tls13RejectsRehandshakeClient (4 ms) [ RUN ] TlsConnectTest.Tls13RejectsRehandshakeServer Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.Tls13RejectsRehandshakeServer (3 ms) [ RUN ] TlsConnectTest.EchoTLS13CompatibilitySessionID Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 030361db91c1d88f9dbcd9fed5389509557ce3cf07c5cfd92288ed0928c004ab... handshake new: [93] 030361db91c1d88f9dbcd9fed5389509557ce3cf07c5cfd92288ed0928c004ab... record old: [715] 0200005d030361db91c1d88f9dbcd9fed5389509557ce3cf07c5cfd92288ed09... record new: [715] 0200005d030361db91c1d88f9dbcd9fed5389509557ce3cf07c5cfd92288ed09... server: Filtered packet: [720] 16030302cb0200005d030361db91c1d88f9dbcd9fed5389509557ce3cf07c5cf... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.EchoTLS13CompatibilitySessionID (3 ms) [ RUN ] TlsConnectTest.TLS13NonCompatModeSessionID Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 0303e98df575b1e84d4981ff53ca9e96c908ec89d9f55eca248baa1e6d5fa27e... handshake new: [118] 0303e98df575b1e84d4981ff53ca9e96c908ec89d9f55eca248baa1e6d5fa27e... record old: [90] 020000560303e98df575b1e84d4981ff53ca9e96c908ec89d9f55eca248baa1e... record new: [122] 020000760303e98df575b1e84d4981ff53ca9e96c908ec89d9f55eca248baa1e... server: Filtered packet: [806] 160303007a020000760303e98df575b1e84d4981ff53ca9e96c908ec89d9f55e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TLS13NonCompatModeSessionID (3 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls11 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 030388cfe12a93f76e17b219d86fcf93cc35994e71ed323dfaeb3ad840565658... handshake new: [187] 030288cfe12a93f76e17b219d86fcf93cc35994e71ed323dfaeb3ad840565658... record old: [191] 010000bb030388cfe12a93f76e17b219d86fcf93cc35994e71ed323dfaeb3ad8... record new: [191] 010000bb030288cfe12a93f76e17b219d86fcf93cc35994e71ed323dfaeb3ad8... client: Filtered packet: [196] 16030100bf010000bb030288cfe12a93f76e17b219d86fcf93cc35994e71ed32... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls11 (3 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls12 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [5] 0403040303 handshake old: [508] 03035795d20adf58e5fd269d9761627d6cf9a4a9fd810c622e53cb1e7a52acf4... handshake new: [499] 03035795d20adf58e5fd269d9761627d6cf9a4a9fd810c622e53cb1e7a52acf4... record old: [512] 010001fc03035795d20adf58e5fd269d9761627d6cf9a4a9fd810c622e53cb1e... record new: [503] 010001f303035795d20adf58e5fd269d9761627d6cf9a4a9fd810c622e53cb1e... client: Filtered packet: [508] 16030101f7010001f303035795d20adf58e5fd269d9761627d6cf9a4a9fd810c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls12 (3 ms) [ RUN ] TlsConnectTest.TestDisableDowngradeDetection Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [5] 0403040303 handshake old: [508] 0303aaadd31e17be79bae0062e29c754e5b6b4ffef30d11bb9c977aa4c81dd95... handshake new: [499] 0303aaadd31e17be79bae0062e29c754e5b6b4ffef30d11bb9c977aa4c81dd95... record old: [512] 010001fc0303aaadd31e17be79bae0062e29c754e5b6b4ffef30d11bb9c977aa... record new: [503] 010001f30303aaadd31e17be79bae0062e29c754e5b6b4ffef30d11bb9c977aa... client: Filtered packet: [508] 16030101f7010001f30303aaadd31e17be79bae0062e29c754e5b6b4ffef30d1... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDisableDowngradeDetection (4 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls10 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0302a0c5ef3fc240d13e518e9d6fcbc0e274f9f70ab34f0c7db65082e43b705b... handshake new: [117] 0301a0c5ef3fc240d13e518e9d6fcbc0e274f9f70ab34f0c7db65082e43b705b... record old: [121] 010000750302a0c5ef3fc240d13e518e9d6fcbc0e274f9f70ab34f0c7db65082... record new: [121] 010000750301a0c5ef3fc240d13e518e9d6fcbc0e274f9f70ab34f0c7db65082... client: Filtered packet: [126] 1603010079010000750301a0c5ef3fc240d13e518e9d6fcbc0e274f9f70ab34f... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls10 (3 ms) [ RUN ] TlsConnectTest.TestFallbackFromTls12 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestFallbackFromTls12 (3 ms) [ RUN ] TlsConnectTest.DisableFalseStartOnFallback Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.DisableFalseStartOnFallback (4 ms) [ RUN ] TlsConnectTest.TestFallbackFromTls13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestFallbackFromTls13 (3 ms) [ RUN ] TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled Version: TLS (no version) [ OK ] TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled (2 ms) [ RUN ] TlsConnectTest.TlsSupportedVersionsEncoding Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.TlsSupportedVersionsEncoding (4 ms) [----------] 44 tests from TlsConnectTest (218 ms total) [----------] 15 tests from TlsExtensionTest13Stream [ RUN ] TlsExtensionTest13Stream.SignatureAlgorithmsPrecedingGarbage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [66] 0040ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... handshake old: [180] 030311cbb64fc5e125e8df0e87b7e7529bb507c83feab3fc17db1de0df25188d... handshake new: [222] 030311cbb64fc5e125e8df0e87b7e7529bb507c83feab3fc17db1de0df25188d... record old: [184] 010000b4030311cbb64fc5e125e8df0e87b7e7529bb507c83feab3fc17db1de0... record new: [226] 010000de030311cbb64fc5e125e8df0e87b7e7529bb507c83feab3fc17db1de0... client: Filtered packet: [231] 16030100e2010000de030311cbb64fc5e125e8df0e87b7e7529bb507c83feab3... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.SignatureAlgorithmsPrecedingGarbage (4 ms) [ RUN ] TlsExtensionTest13Stream.DropServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d0020b12723e77aea15a57c4754b7069ff1bad6dc5d42a69ba659ea47f9d5... handshake old: [86] 0303a61f0d3a923edf8dd4d1e148d3d42ae584a3af05c741c6a92b5987698722... handshake new: [46] 0303a61f0d3a923edf8dd4d1e148d3d42ae584a3af05c741c6a92b5987698722... record old: [90] 020000560303a61f0d3a923edf8dd4d1e148d3d42ae584a3af05c741c6a92b59... record new: [50] 0200002e0303a61f0d3a923edf8dd4d1e148d3d42ae584a3af05c741c6a92b59... server: Filtered packet: [734] 16030300320200002e0303a61f0d3a923edf8dd4d1e148d3d42ae584a3af05c7... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.DropServerKeyShare (4 ms) [ RUN ] TlsExtensionTest13Stream.WrongServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [36] 001d0020b1b08c038ef9c02f906ff97b1e9ceeba15097c354eeb23a6a5c8b40e... extension new: [6] 001800020102 handshake old: [86] 0303b11d30753077e871ac6276b3972fa75dd61128bb8e904721ce23a14feb3b... handshake new: [56] 0303b11d30753077e871ac6276b3972fa75dd61128bb8e904721ce23a14feb3b... record old: [90] 020000560303b11d30753077e871ac6276b3972fa75dd61128bb8e904721ce23... record new: [60] 020000380303b11d30753077e871ac6276b3972fa75dd61128bb8e904721ce23... server: Filtered packet: [744] 160303003c020000380303b11d30753077e871ac6276b3972fa75dd61128bb8e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_KEY_SHARE: SSL received a malformed Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.WrongServerKeyShare (4 ms) [ RUN ] TlsExtensionTest13Stream.UnknownServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [36] 001d002061ff6a093f6ca6c6126dbbdf8395fdab7c0f79748afc7d794955da3b... extension new: [6] ffff00020102 handshake old: [86] 0303eaf2f35fac9514e780232a21456179a4497da1c2048a693a06f2a69953d2... handshake new: [56] 0303eaf2f35fac9514e780232a21456179a4497da1c2048a693a06f2a69953d2... record old: [90] 020000560303eaf2f35fac9514e780232a21456179a4497da1c2048a693a06f2... record new: [60] 020000380303eaf2f35fac9514e780232a21456179a4497da1c2048a693a06f2... server: Filtered packet: [744] 160303003c020000380303eaf2f35fac9514e780232a21456179a4497da1c204... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_KEY_SHARE: SSL received a malformed Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.UnknownServerKeyShare (3 ms) [ RUN ] TlsExtensionTest13Stream.AddServerSignatureAlgorithmsOnResumption Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 0303f5b70b2b138a9925dcfcfee52e1a46d94be3bdcc99086357ddfe87486d1d... handshake new: [96] 0303f5b70b2b138a9925dcfcfee52e1a46d94be3bdcc99086357ddfe87486d1d... record old: [96] 0200005c0303f5b70b2b138a9925dcfcfee52e1a46d94be3bdcc99086357ddfe... record new: [100] 020000600303f5b70b2b138a9925dcfcfee52e1a46d94be3bdcc99086357ddfe... server: Filtered packet: [203] 1603030064020000600303f5b70b2b138a9925dcfcfee52e1a46d94be3bdcc99... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.AddServerSignatureAlgorithmsOnResumption (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeEmptyPskLabel Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2fe7595a9ddd1f355a137fe7300000000a7e1fa3bf22b48791840dfce... extension new: [43] 00060000e9ef916800212071f765e5240e3c105dfae5a4b8b2c669754613106d... handshake old: [508] 03039febb08d801a4b1e1e822e5d5c1490ba8d3f895bfc566ad92def62f553e7... handshake new: [330] 03039febb08d801a4b1e1e822e5d5c1490ba8d3f895bfc566ad92def62f553e7... record old: [512] 010001fc03039febb08d801a4b1e1e822e5d5c1490ba8d3f895bfc566ad92def... record new: [334] 0100014a03039febb08d801a4b1e1e822e5d5c1490ba8d3f895bfc566ad92def... client: Filtered packet: [339] 160301014e0100014a03039febb08d801a4b1e1e822e5d5c1490ba8d3f895bfc... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeEmptyPskLabel (6 ms) [ RUN ] TlsExtensionTest13Stream.ResumeIncorrectBinderValue Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2a1b11b530cde87800bd61b9e00000000e92cacee76e0a1f9ef93c15d... extension new: [221] 00b800b2a1b11b530cde87800bd61b9e00000000e92cacee76e0a1f9ef93c15d... handshake old: [508] 0303c1659c503e5f1ab230810ae6d21f4aea1fec986f6f28c98373ba29428029... handshake new: [508] 0303c1659c503e5f1ab230810ae6d21f4aea1fec986f6f28c98373ba29428029... record old: [512] 010001fc0303c1659c503e5f1ab230810ae6d21f4aea1fec986f6f28c98373ba... record new: [512] 010001fc0303c1659c503e5f1ab230810ae6d21f4aea1fec986f6f28c98373ba... client: Filtered packet: [517] 1603010200010001fc0303c1659c503e5f1ab230810ae6d21f4aea1fec986f6f... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeIncorrectBinderValue (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeIncorrectBinderLength Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b22f1ec05f977961cdd0be5e9c00000000456d22bce96623452a38b806... extension new: [222] 00b800b22f1ec05f977961cdd0be5e9c00000000456d22bce96623452a38b806... handshake old: [508] 0303cd90a8e26e26dcdb115737bc1ac89b334ca2a40fd88e03108a46a1f4cc24... handshake new: [509] 0303cd90a8e26e26dcdb115737bc1ac89b334ca2a40fd88e03108a46a1f4cc24... record old: [512] 010001fc0303cd90a8e26e26dcdb115737bc1ac89b334ca2a40fd88e03108a46... record new: [513] 010001fd0303cd90a8e26e26dcdb115737bc1ac89b334ca2a40fd88e03108a46... client: Filtered packet: [518] 1603010201010001fd0303cd90a8e26e26dcdb115737bc1ac89b334ca2a40fd8... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeIncorrectBinderLength (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeBinderTooShort Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b29c9a48bc54950ddaae648e1e00000000a09484cd5fe91f22b69377ea... extension new: [220] 00b800b29c9a48bc54950ddaae648e1e00000000a09484cd5fe91f22b69377ea... handshake old: [508] 03032b357ae5bc7a5483bd542b9069582308988e203c6e476eb2501248a77736... handshake new: [507] 03032b357ae5bc7a5483bd542b9069582308988e203c6e476eb2501248a77736... record old: [512] 010001fc03032b357ae5bc7a5483bd542b9069582308988e203c6e476eb25012... record new: [511] 010001fb03032b357ae5bc7a5483bd542b9069582308988e203c6e476eb25012... client: Filtered packet: [516] 16030101ff010001fb03032b357ae5bc7a5483bd542b9069582308988e203c6e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeBinderTooShort (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeTwoPsks Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2865b871dd8d93dbf79d78df4000000009b17aff5ed7626c342c46403... extension new: [438] 017000b2865b871dd8d93dbf79d78df4000000009b17aff5ed7626c342c46403... handshake old: [508] 03032ccc13e715ed4b0cc5c63696a4fd2b1a4b250aa71fbf2bc837cd50561d37... handshake new: [725] 03032ccc13e715ed4b0cc5c63696a4fd2b1a4b250aa71fbf2bc837cd50561d37... record old: [512] 010001fc03032ccc13e715ed4b0cc5c63696a4fd2b1a4b250aa71fbf2bc837cd... record new: [729] 010002d503032ccc13e715ed4b0cc5c63696a4fd2b1a4b250aa71fbf2bc837cd... client: Filtered packet: [734] 16030102d9010002d503032ccc13e715ed4b0cc5c63696a4fd2b1a4b250aa71f... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeTwoPsks (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeTwoIdentitiesOneBinder Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2c3eff93cc765e9777db9e06200000000816940dc6f67cc43bae9c094... extension new: [405] 017000b2c3eff93cc765e9777db9e06200000000816940dc6f67cc43bae9c094... handshake old: [508] 03039b07f2e68b1acca49540fe2f75035550c836942d3f65acdc61ffece3cca7... handshake new: [692] 03039b07f2e68b1acca49540fe2f75035550c836942d3f65acdc61ffece3cca7... record old: [512] 010001fc03039b07f2e68b1acca49540fe2f75035550c836942d3f65acdc61ff... record new: [696] 010002b403039b07f2e68b1acca49540fe2f75035550c836942d3f65acdc61ff... client: Filtered packet: [701] 16030102b8010002b403039b07f2e68b1acca49540fe2f75035550c836942d3f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeTwoIdentitiesOneBinder (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeOneIdentityTwoBinders Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b27e8cf48cfb6b01124d46fd930000000056a58d7b34e86961263cdac2... extension new: [254] 00b800b27e8cf48cfb6b01124d46fd930000000056a58d7b34e86961263cdac2... handshake old: [508] 0303de74761870bf5e6690ce204a0260368bea68afbb078de0118ebaabbb9142... handshake new: [541] 0303de74761870bf5e6690ce204a0260368bea68afbb078de0118ebaabbb9142... record old: [512] 010001fc0303de74761870bf5e6690ce204a0260368bea68afbb078de0118eba... record new: [545] 0100021d0303de74761870bf5e6690ce204a0260368bea68afbb078de0118eba... client: Filtered packet: [550] 16030102210100021d0303de74761870bf5e6690ce204a0260368bea68afbb07... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeOneIdentityTwoBinders (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumePskExtensionNotLast Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [508] 03036014fe2bea52bb0606b2cc16ad0412e4bfb7dff6abfbe29c00e64bf18cf7... handshake new: [512] 03036014fe2bea52bb0606b2cc16ad0412e4bfb7dff6abfbe29c00e64bf18cf7... record old: [512] 010001fc03036014fe2bea52bb0606b2cc16ad0412e4bfb7dff6abfbe29c00e6... record new: [516] 0100020003036014fe2bea52bb0606b2cc16ad0412e4bfb7dff6abfbe29c00e6... client: Filtered packet: [521] 16030102040100020003036014fe2bea52bb0606b2cc16ad0412e4bfb7dff6ab... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumePskExtensionNotLast (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeNoKeModes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [508] 0303afc039e1bedc024cecfeaa6eeadada18cc5f4f34c9b9525a330415156375... handshake new: [502] 0303afc039e1bedc024cecfeaa6eeadada18cc5f4f34c9b9525a330415156375... record old: [512] 010001fc0303afc039e1bedc024cecfeaa6eeadada18cc5f4f34c9b9525a3304... record new: [506] 010001f60303afc039e1bedc024cecfeaa6eeadada18cc5f4f34c9b9525a3304... client: Filtered packet: [511] 16030101fa010001f60303afc039e1bedc024cecfeaa6eeadada18cc5f4f34c9... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeNoKeModes (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeBogusKeModes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0101 extension new: [2] 0100 handshake old: [508] 03035fe6a300bd57fe10ef2fefe2122d0d4dc4967c6aa55df9384e0d9acc0b98... handshake new: [508] 03035fe6a300bd57fe10ef2fefe2122d0d4dc4967c6aa55df9384e0d9acc0b98... record old: [512] 010001fc03035fe6a300bd57fe10ef2fefe2122d0d4dc4967c6aa55df9384e0d... record new: [512] 010001fc03035fe6a300bd57fe10ef2fefe2122d0d4dc4967c6aa55df9384e0d... client: Filtered packet: [517] 1603010200010001fc03035fe6a300bd57fe10ef2fefe2122d0d4dc4967c6aa5... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeBogusKeModes (8 ms) [----------] 15 tests from TlsExtensionTest13Stream (93 ms total) [----------] 7 tests from GatherV2ClientHelloTest [ RUN ] GatherV2ClientHelloTest.GatherV2RecordLongHeader Version: TLS (no version) client: Send Direct [5] 0002000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordLongHeader (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherV2RecordLongHeader2 Version: TLS (no version) client: Send Direct [5] 0001000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordLongHeader2 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordLongHeader Version: TLS (no version) client: Send Direct [5] 0000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordLongHeader (3 ms) [ RUN ] GatherV2ClientHelloTest.GatherV2RecordShortHeader Version: TLS (no version) client: Send Direct [5] 8003000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordShortHeader (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader2 Version: TLS (no version) client: Send Direct [5] 8002000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader2 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader3 Version: TLS (no version) client: Send Direct [5] 8001000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader3 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader Version: TLS (no version) client: Send Direct [5] 8000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader (3 ms) [----------] 7 tests from GatherV2ClientHelloTest (16 ms total) [----------] 1 test from MiscTest [ RUN ] MiscTest.NonExistentExperimentalAPI [ OK ] MiscTest.NonExistentExperimentalAPI (0 ms) [----------] 1 test from MiscTest (0 ms total) [----------] 2 tests from RecordSizeDefaultsTest [ RUN ] RecordSizeDefaultsTest.RecordSizeBadValues [ OK ] RecordSizeDefaultsTest.RecordSizeBadValues (0 ms) [ RUN ] RecordSizeDefaultsTest.RecordSizeGetValue [ OK ] RecordSizeDefaultsTest.RecordSizeGetValue (0 ms) [----------] 2 tests from RecordSizeDefaultsTest (0 ms total) [----------] 11 tests from Tls13CompatTest [ RUN ] Tls13CompatTest.Disabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.Disabled (4 ms) [ RUN ] Tls13CompatTest.Enabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.Enabled (4 ms) [ RUN ] Tls13CompatTest.EnabledZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledZeroRtt (7 ms) [ RUN ] Tls13CompatTest.EnabledHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledHrr (18 ms) [ RUN ] Tls13CompatTest.EnabledStatelessHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledStatelessHrr (20 ms) [ RUN ] Tls13CompatTest.EnabledHrrZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledHrrZeroRtt (21 ms) [ RUN ] Tls13CompatTest.EnabledAcceptedEch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledAcceptedEch (5 ms) [ RUN ] Tls13CompatTest.EnabledRejectedEch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.EnabledRejectedEch (4 ms) [ RUN ] Tls13CompatTest.ChangeCipherSpecAfterClientHelloTwice Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [6] 140303000101 client: Send Direct [6] 140303000101 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. server: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.ChangeCipherSpecAfterClientHelloTwice (4 ms) [ RUN ] Tls13CompatTest.ChangeCipherSpecAfterServerHelloTwice Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [32] 061be2e9b223810c8519def29f613547472857fb785a453460c0e6387e0d12eb record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [621] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [776] 160303007a020000760303733c46686967b10ef6c1c3a63c765edd93e1e72a4d... server: Send Direct [6] 140303000101 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. client: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.ChangeCipherSpecAfterServerHelloTwice (3 ms) [ RUN ] Tls13CompatTest.ConnectWith12ThenAttemptToResume13CompatMode Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.ConnectWith12ThenAttemptToResume13CompatMode (7 ms) [----------] 11 tests from Tls13CompatTest (97 ms total) [----------] 3 tests from SSLv2ClientHelloTestF [ RUN ] SSLv2ClientHelloTestF.Connect13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030400030000001000c02f1d32a2397924fe041c779070633a26b3 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] SSLv2ClientHelloTestF.Connect13 (3 ms) [ RUN ] SSLv2ClientHelloTestF.FallbackSCSV Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103020006000000100000330056003948282dedcab381d49957b6cc1614... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] SSLv2ClientHelloTestF.FallbackSCSV (7 ms) [ RUN ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f010302000600000010000033005600f2074a744127561803666775459f82... server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV (3 ms) [----------] 3 tests from SSLv2ClientHelloTestF (13 ms total) [----------] 3 tests from DtlsConnectTest [ RUN ] DtlsConnectTest.TestDtlsVersion11 Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefd4aed4fe2f117cd10d7ddd952fa41ec37ab89bc0eba127bfd74e8d3726d32... handshake new: [184] fefe4aed4fe2f117cd10d7ddd952fa41ec37ab89bc0eba127bfd74e8d3726d32... record old: [196] 010000b800000000000000b8fefd4aed4fe2f117cd10d7ddd952fa41ec37ab89... record new: [196] 010000b800000000000000b8fefe4aed4fe2f117cd10d7ddd952fa41ec37ab89... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefe4aed4fe2f1... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] DtlsConnectTest.TestDtlsVersion11 (2 ms) [ RUN ] DtlsConnectTest.DtlsSupportedVersionsEncoding Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DtlsConnectTest.DtlsSupportedVersionsEncoding (4 ms) [ RUN ] DtlsConnectTest.Dtls13VersionWorkaround Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DtlsConnectTest.Dtls13VersionWorkaround (4 ms) [----------] 3 tests from DtlsConnectTest (10 ms total) [----------] 3 tests from Tls13NoSupportedVersions [ RUN ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer12 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 030396968bf52120ea971fbce88e2e93e1bcfb2a48503a6f1bb229c632450036... handshake new: [187] 030496968bf52120ea971fbce88e2e93e1bcfb2a48503a6f1bb229c632450036... record old: [191] 010000bb030396968bf52120ea971fbce88e2e93e1bcfb2a48503a6f1bb229c6... record new: [191] 010000bb030496968bf52120ea971fbce88e2e93e1bcfb2a48503a6f1bb229c6... client: Filtered packet: [196] 16030100bf010000bb030496968bf52120ea971fbce88e2e93e1bcfb2a48503a... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer12 (4 ms) [ RUN ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer13 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03031f8c00fe2e755213a5423ee1735ba37a3a62c58277000e2402c050ce5c23... handshake new: [187] 03041f8c00fe2e755213a5423ee1735ba37a3a62c58277000e2402c050ce5c23... record old: [191] 010000bb03031f8c00fe2e755213a5423ee1735ba37a3a62c58277000e2402c0... record new: [191] 010000bb03041f8c00fe2e755213a5423ee1735ba37a3a62c58277000e2402c0... client: Filtered packet: [196] 16030100bf010000bb03041f8c00fe2e755213a5423ee1735ba37a3a62c58277... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer13 (3 ms) [ RUN ] Tls13NoSupportedVersions.Tls14ClientHelloWithoutSupportedVersionsServer13 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303debda842552bb33f817ac5f3b3c06fc95c1743ae3941ba4ef52a7070478d... handshake new: [187] 0305debda842552bb33f817ac5f3b3c06fc95c1743ae3941ba4ef52a7070478d... record old: [191] 010000bb0303debda842552bb33f817ac5f3b3c06fc95c1743ae3941ba4ef52a... record new: [191] 010000bb0305debda842552bb33f817ac5f3b3c06fc95c1743ae3941ba4ef52a... client: Filtered packet: [196] 16030100bf010000bb0305debda842552bb33f817ac5f3b3c06fc95c1743ae39... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls14ClientHelloWithoutSupportedVersionsServer13 (4 ms) [----------] 3 tests from Tls13NoSupportedVersions (11 ms total) [----------] 16 tests from TlsConnectStreamTls13Ech [ RUN ] TlsConnectStreamTls13Ech.EchFixedConfig Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchFixedConfig (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchOuterExtensionsReferencesMissing Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 160304020401000200030341a6813ccf3eefc2deb9c78f7627715ae343f5236e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchOuterExtensionsReferencesMissing (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchVersion12Inner Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 1603040204010002000303baf30ea25e5056b659a4d55233922c4ee261a04e6d... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchVersion12Inner (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchVersion12InnerSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 16030402040100020003036c4a7f6f6b5479a5c1f769c7b04c082ba40b514522... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchVersion12InnerSupportedVersions (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchInnerMissing Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 1603040204010002000303912d293136b843248ffeecdde6ef0d5bc5d0adb4d3... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_MISSING_ESNI_EXTENSION: SSL did not receive an ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchInnerMissing (3 ms) [ RUN ] TlsConnectStreamTls13Ech.InnerWithEchAndEchIsInner Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 1603040204010002000303b690bc4090ecfd7ad167de639b1d1ea7682588ffef... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.InnerWithEchAndEchIsInner (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchConfigsTrialDecrypt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchConfigsTrialDecrypt (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchAcceptBasic Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchAcceptBasic (5 ms) [ RUN ] TlsConnectStreamTls13Ech.EchRejectWithHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13Ech.EchRejectWithHrr (8 ms) [ RUN ] TlsConnectStreamTls13Ech.EchShortClientEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100014d0020a68b18e187f6fe4e249bf81f8931a373302493f37bd9a5ec02... extension new: [1] 00 handshake old: [512] 0303c0e75c0b674dcf7722f351ba40857e41432a9a76c696af3f547f87ca1bc2... handshake new: [366] 0303c0e75c0b674dcf7722f351ba40857e41432a9a76c696af3f547f87ca1bc2... record old: [516] 010002000303c0e75c0b674dcf7722f351ba40857e41432a9a76c696af3f547f... record new: [370] 0100016e0303c0e75c0b674dcf7722f351ba40857e41432a9a76c696af3f547f... client: Filtered packet: [375] 16030101720100016e0303c0e75c0b674dcf7722f351ba40857e41432a9a76c6... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchShortClientEncryptedCH (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchLongClientEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100014d0020ae590c6d5290d5eba34bc042f2745a882157e47b21c16c8d9f... extension new: [853] 0000000000000000000000000000000000000000000000000000000000000000... handshake old: [512] 030359f77b39cff3caa4941c9f255576a96714a357c427fc3e26505c185aa065... handshake new: [1218] 030359f77b39cff3caa4941c9f255576a96714a357c427fc3e26505c185aa065... record old: [516] 01000200030359f77b39cff3caa4941c9f255576a96714a357c427fc3e26505c... record new: [1222] 010004c2030359f77b39cff3caa4941c9f255576a96714a357c427fc3e26505c... client: Filtered packet: [1227] 16030104c6010004c2030359f77b39cff3caa4941c9f255576a96714a357c427... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchLongClientEncryptedCH (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchShortServerEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [66] 0040fe0a003c4d00200020c1cc7793c52cf8b4f4dc0b7d7b8426de327b6edb22... extension new: [1] 00 handshake old: [106] 0068fe0a00420040fe0a003c4d00200020c1cc7793c52cf8b4f4dc0b7d7b8426... handshake new: [41] 0027fe0a000100000a00140012001d0017001800190100010101020103010400... record old: [727] 0800006a0068fe0a00420040fe0a003c4d00200020c1cc7793c52cf8b4f4dc0b... record new: [662] 080000290027fe0a000100000a00140012001d00170018001901000101010201... server: Filtered packet: [779] 160303005a0200005603038f22505655c5b44b2797bd29e13f64326293097d7b... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_KEYS: SSL received a malformed ESNI keys structure client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchShortServerEncryptedCH (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchLongServerEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [66] 0040fe0a003c4d00200020f46c35cf644ea8dc8a9b16963b5697d7d6a4ecaa0f... extension new: [934] 0000000000000000000000000000000000000000000000000000000000000000... handshake old: [106] 0068fe0a00420040fe0a003c4d00200020f46c35cf644ea8dc8a9b16963b5697... handshake new: [974] 03ccfe0a03a60000000000000000000000000000000000000000000000000000... record old: [727] 0800006a0068fe0a00420040fe0a003c4d00200020f46c35cf644ea8dc8a9b16... record new: [1595] 080003ce03ccfe0a03a600000000000000000000000000000000000000000000... server: Filtered packet: [1712] 160303005a020000560303a9bfbef4e0c75fb97a9a13f47ed9b394f9b83f68e0... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_KEYS: SSL received a malformed ESNI keys structure client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchLongServerEncryptedCH (5 ms) [ RUN ] TlsConnectStreamTls13Ech.EchInsecureFallbackNoRetries Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchInsecureFallbackNoRetries (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchMismatchHpkeCiphersRetry Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITH_ECH: TLS ECH was rejected, but verification succeeded and compatible retry_configs are available. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchMismatchHpkeCiphersRetry (9 ms) [ RUN ] TlsConnectStreamTls13Ech.EchMismatchKeysRetry Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITH_ECH: TLS ECH was rejected, but verification succeeded and compatible retry_configs are available. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchMismatchKeysRetry (9 ms) [----------] 16 tests from TlsConnectStreamTls13Ech (75 ms total) [----------] 1 test from DCDelegation [ RUN ] DCDelegation.DCDelegations [ OK ] DCDelegation.DCDelegations (5 ms) [----------] 1 test from DCDelegation (5 ms total) [----------] 60 tests from BloomFilterConfigurations/BloomFilterTest [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/9 (0 ms) [----------] 60 tests from BloomFilterConfigurations/BloomFilterTest (0 ms total) [----------] 56 tests from VariousSizes/SelfEncryptTestVariable [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/0 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/1 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/2 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/3 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/4 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/5 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/6 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/4 (1 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/0 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/1 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/2 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/3 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/4 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/5 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/6 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/0 (1 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/6 (0 ms) [----------] 56 tests from VariousSizes/SelfEncryptTestVariable (2 ms total) [----------] 244 tests from Version13Only/TlsConnectTls13 [ RUN ] Version13Only/TlsConnectTls13.ZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRtt/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRtt/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_TOO_MUCH_EARLY_DATA: SSL received more early data than permitted. server: Changing state from CONNECTING to ERROR client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOrdering/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Drop packet client: Send Direct [135] 1703030014b75018a0f472a7cc61c03750c469622aa934bf73170303001592b1... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Drop packet client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOrdering/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOrdering/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Drop packet client: Send Direct [151] 2dbe230014902740a4bbf3a40c2a2c742360fae1acedebf0ed2d5d44001d03b6... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Drop packet client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOrdering/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete SEC_ERROR_REVOKED_CERTIFICATE client: Fatal alert sent: 44 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 44 server: Handshake failed with error SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete SEC_ERROR_REVOKED_CERTIFICATE client: Fatal alert sent: 44 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 44 server: Handshake failed with error SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/0 Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/1 Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/0 Version: TLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/1 Version: DTLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/0 Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/1 Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/0 (1 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [180] 030321204fa01e1c0a5b0678826ff713ad8b6d6da5dc59f60e81f8e785e1fb6b... handshake new: [152] 030321204fa01e1c0a5b0678826ff713ad8b6d6da5dc59f60e81f8e785e1fb6b... record old: [184] 010000b4030321204fa01e1c0a5b0678826ff713ad8b6d6da5dc59f60e81f8e7... record new: [156] 01000098030321204fa01e1c0a5b0678826ff713ad8b6d6da5dc59f60e81f8e7... client: Filtered packet: [161] 160301009c01000098030321204fa01e1c0a5b0678826ff713ad8b6d6da5dc59... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [181] fefd734f21ac0de9d1c7298459b61a9291e65e10836c9b4041bd4ce0fb094f92... handshake new: [153] fefd734f21ac0de9d1c7298459b61a9291e65e10836c9b4041bd4ce0fb094f92... record old: [193] 010000b500000000000000b5fefd734f21ac0de9d1c7298459b61a9291e65e10... record new: [165] 010000990000000000000099fefd734f21ac0de9d1c7298459b61a9291e65e10... client: Filtered packet: [178] 16feff000000000000000000a5010000990000000000000099fefd734f21ac0d... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400802dd3879abe09090fb6e526c4b7426883149ba9c4ae334aa12c05d8df... handshake new: [132] 000000802dd3879abe09090fb6e526c4b7426883149ba9c4ae334aa12c05d8df... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a0200005603038b39f3de5251c89a4fb501a006086e244088a0634f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008080bb384d4630c9a06431b22f0dbab3891d797b5778f011f0acd07dab... handshake new: [132] 0000008080bb384d4630c9a06431b22f0dbab3891d797b5778f011f0acd07dab... record old: [144] 0f00008400030000000000840804008080bb384d4630c9a06431b22f0dbab389... record new: [144] 0f00008400030000000000840000008080bb384d4630c9a06431b22f0dbab389... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefdbdbd0dc079... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400800d2fb5173e5ad3fd83ae19c318398accf6c9dae54ef38f1afcb8f778... handshake new: [132] 040300800d2fb5173e5ad3fd83ae19c318398accf6c9dae54ef38f1afcb8f778... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a020000560303f15f55c49e4f3e0eb902f87b8606d70a1e79390f08... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08040080a6fbdc36e3b7fa9801bcb06da747309ddeee5b40f7ce9790ca3cbe6a... handshake new: [132] 04030080a6fbdc36e3b7fa9801bcb06da747309ddeee5b40f7ce9790ca3cbe6a... record old: [144] 0f000084000300000000008408040080a6fbdc36e3b7fa9801bcb06da747309d... record new: [144] 0f000084000300000000008404030080a6fbdc36e3b7fa9801bcb06da747309d... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefd6334111b8e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete no error client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete no error client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/0 Version: TLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/1 Version: DTLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DamageServerSignature/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08040080df564eefbdfd62279564c2665e07dfc38567e74aca6e54209348512a... handshake new: [132] 08040080df564eefbdfd62279564c2665e07dfc38567e74aca6e54209348512a... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a020000560303c912fcdf054f7e95d781f5c20b709370d60be2a7c9... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DamageServerSignature/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DamageServerSignature/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08040080649770b439b4e309c4e0c0a7090fd896bd8dd973c298e57b132bcb9a... handshake new: [132] 08040080649770b439b4e309c4e0c0a7090fd896bd8dd973c298e57b132bcb9a... record old: [144] 0f000084000300000000008408040080649770b439b4e309c4e0c0a7090fd896... record new: [144] 0f000084000300000000008408040080649770b439b4e309c4e0c0a7090fd896... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefd5a8c9f585e... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DamageServerSignature/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeFfdhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeFfdhe/0 (16 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeFfdhe/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeFfdhe/1 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [180] 030398fef56645fc20d483a44c15568d6f539b26f604957637f159bd7b3b60a8... handshake new: [156] 030398fef56645fc20d483a44c15568d6f539b26f604957637f159bd7b3b60a8... record old: [184] 010000b4030398fef56645fc20d483a44c15568d6f539b26f604957637f159bd... record new: [160] 0100009c030398fef56645fc20d483a44c15568d6f539b26f604957637f159bd... client: Filtered packet: [165] 16030100a00100009c030398fef56645fc20d483a44c15568d6f539b26f60495... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [181] fefd0d68dfe2ed577e85b2073b6061c6db6bcf8c922b978cde271b842a3f8cf9... handshake new: [157] fefd0d68dfe2ed577e85b2073b6061c6db6bcf8c922b978cde271b842a3f8cf9... record old: [193] 010000b500000000000000b5fefd0d68dfe2ed577e85b2073b6061c6db6bcf8c... record new: [169] 0100009d000000000000009dfefd0d68dfe2ed577e85b2073b6061c6db6bcf8c... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefd0d68dfe2ed... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.UseLameGroup/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UseLameGroup/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.UseLameGroup/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UseLameGroup/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterSha384/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterSha384/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterSha384/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterSha384/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporter/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporter/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporter/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporter/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [46] 00090003666f6f00000000002120e880f9761f7abccca94270631abf0dd5b82e... extension new: [46] 00090003666f6f000000000021201780f9761f7abccca94270631abf0dd5b82e... handshake old: [230] 0303985711eec4b0324ded635aea536863eea4a0306c1c41cce3c395ff951dc6... handshake new: [230] 0303985711eec4b0324ded635aea536863eea4a0306c1c41cce3c395ff951dc6... record old: [234] 010000e60303985711eec4b0324ded635aea536863eea4a0306c1c41cce3c395... record new: [234] 010000e60303985711eec4b0324ded635aea536863eea4a0306c1c41cce3c395... client: Filtered packet: [239] 16030100ea010000e60303985711eec4b0324ded635aea536863eea4a0306c1c... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [46] 00090003666f6f000000000021209cdce4755ba2eb5acbdaf175dd557a91ae2f... extension new: [46] 00090003666f6f0000000000212063dce4755ba2eb5acbdaf175dd557a91ae2f... handshake old: [231] fefd4ab1d5f78663ba4f1f7b119fcd47ca7e165063f373c051162f7e7f02b9c4... handshake new: [231] fefd4ab1d5f78663ba4f1f7b119fcd47ca7e165063f373c051162f7e7f02b9c4... record old: [243] 010000e700000000000000e7fefd4ab1d5f78663ba4f1f7b119fcd47ca7e1650... record new: [243] 010000e700000000000000e7fefd4ab1d5f78663ba4f1f7b119fcd47ca7e1650... client: Filtered packet: [256] 16feff000000000000000000f3010000e700000000000000e7fefd4ab1d5f786... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/0 (22 ms) [ RUN ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/1 (21 ms) [ RUN ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/0 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [486] 16feff000000000000000101d9010001cd00010000000001cdfefd9274ac4a45... server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 00650018006104d1aa54ab845c86ccfcb38674c602db2fed7b58096f8b6404f6... extension new: [38] 0024001d00207747d7ee2e804e8bcc8e62bdbfeb222560676e52efd2fea5a243... handshake old: [508] 0303b4fc908a866f6e2f69d7fef2b89047211615434383e0eb65ece8a62c82e9... handshake new: [443] 0303b4fc908a866f6e2f69d7fef2b89047211615434383e0eb65ece8a62c82e9... record old: [512] 010001fc0303b4fc908a866f6e2f69d7fef2b89047211615434383e0eb65ece8... record new: [447] 010001bb0303b4fc908a866f6e2f69d7fef2b89047211615434383e0eb65ece8... client: Filtered packet: [452] 16030301bf010001bb0303b4fc908a866f6e2f69d7fef2b89047211615434383... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 00650018006104cbde4240ccfaf534b160f03fa5052b807e35bba102d5f65ffc... extension new: [38] 0024001d002002a33805132af3a0cf4659430f9c0c514a3f1e16502f9af23985... handshake old: [366] fefdaa35dff1388c3883440fcf1a36e8dc5111e80c26490c95024e0a76ab4a82... handshake new: [301] fefdaa35dff1388c3883440fcf1a36e8dc5111e80c26490c95024e0a76ab4a82... record old: [378] 0100016e000100000000016efefdaa35dff1388c3883440fcf1a36e8dc5111e8... record new: [313] 0100012d000100000000012dfefdaa35dff1388c3883440fcf1a36e8dc5111e8... client: Filtered packet: [326] 16fefd000000000000000101390100012d000100000000012dfefdaa35dff138... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithTwoShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 00650018006104e6d8cc6cdc3a85f34a2b859cab56dcbff1d52ac2960dc0f8ef... extension new: [107] 0069001d002070094f325b836e50cfa4f6c8ebbfe80e2a64cd2af68d6bab0e6a... handshake old: [508] 03030b1bcc8d57c4be147b1b127a8875da36a047a0de518b3c732404bd0d95c2... handshake new: [512] 03030b1bcc8d57c4be147b1b127a8875da36a047a0de518b3c732404bd0d95c2... record old: [512] 010001fc03030b1bcc8d57c4be147b1b127a8875da36a047a0de518b3c732404... record new: [516] 0100020003030b1bcc8d57c4be147b1b127a8875da36a047a0de518b3c732404... client: Filtered packet: [521] 16030302040100020003030b1bcc8d57c4be147b1b127a8875da36a047a0de51... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithTwoShares/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithTwoShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 0065001800610411ebd24ce308b31a6f64c1ece8ce0608c26159fb690e031df2... extension new: [107] 0069001d0020099c626631002aba89a13cbd23945b4513d2a954c721726f7aeb... handshake old: [366] fefd609020830fd39625f3d6b6a24241438f26588baef9aa5d5275fb3f51c189... handshake new: [370] fefd609020830fd39625f3d6b6a24241438f26588baef9aa5d5275fb3f51c189... record old: [378] 0100016e000100000000016efefd609020830fd39625f3d6b6a24241438f2658... record new: [382] 010001720001000000000172fefd609020830fd39625f3d6b6a24241438f2658... client: Filtered packet: [395] 16fefd0000000000000001017e010001720001000000000172fefd609020830f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithTwoShares/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAccept/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAccept/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAccept/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAccept/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/0 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/1 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackFail/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_APPLICATION_ABORT: SSL handshake aborted by the application. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackFail/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackFail/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_APPLICATION_ABORT: SSL handshake aborted by the application. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackFail/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetry/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetry/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetry/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetry/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/0 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/1 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/0 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/1 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStateless/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryStateless/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStateless/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryStateless/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [116] 00723f81ace3ca1477ecb2a2da97000000007fd9491aadb262ec2bd6d83e6acd... handshake old: [508] 03036aa03d1a847f303075c922da95f9cac6c3d62ed40294edb798d0df15b8fc... handshake new: [388] 03036aa03d1a847f303075c922da95f9cac6c3d62ed40294edb798d0df15b8fc... record old: [512] 010001fc03036aa03d1a847f303075c922da95f9cac6c3d62ed40294edb798d0... record new: [392] 0100018403036aa03d1a847f303075c922da95f9cac6c3d62ed40294edb798d0... client: Filtered packet: [397] 16030301880100018403036aa03d1a847f303075c922da95f9cac6c3d62ed402... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [116] 007219f68c264cbe9c66db83f15a0000000022b97e0b2434935421f55677121b... handshake old: [301] fefd0214544c259dec93879a57ac5a65b20975765b0f24c0fe326f28a68829c2... handshake new: [181] fefd0214544c259dec93879a57ac5a65b20975765b0f24c0fe326f28a68829c2... record old: [313] 0100012d000100000000012dfefd0214544c259dec93879a57ac5a65b2097576... record new: [193] 010000b500010000000000b5fefd0214544c259dec93879a57ac5a65b2097576... client: Filtered packet: [206] 16fefd000000000000000000c1010000b500010000000000b5fefd0214544c25... extension drop: [116] 007219f68c264cbe9c66db83f15a0000000022b97e0b2434935421f55677121b... handshake old: [301] fefd0214544c259dec93879a57ac5a65b20975765b0f24c0fe326f28a68829c2... handshake new: [181] fefd0214544c259dec93879a57ac5a65b20975765b0f24c0fe326f28a68829c2... record old: [313] 0100012d000100000000012dfefd0214544c259dec93879a57ac5a65b2097576... record new: [193] 010000b500010000000000b5fefd0214544c259dec93879a57ac5a65b2097576... client: Filtered packet: [206] 16fefd000000000000000200c1010000b500010000000000b5fefd0214544c25... extension drop: [116] 007219f68c264cbe9c66db83f15a0000000022b97e0b2434935421f55677121b... handshake old: [301] fefd0214544c259dec93879a57ac5a65b20975765b0f24c0fe326f28a68829c2... handshake new: [181] fefd0214544c259dec93879a57ac5a65b20975765b0f24c0fe326f28a68829c2... record old: [313] 0100012d000100000000012dfefd0214544c259dec93879a57ac5a65b2097576... record new: [193] 010000b500010000000000b5fefd0214544c259dec93879a57ac5a65b2097576... client: Filtered packet: [206] 16fefd000000000000000300c1010000b500010000000000b5fefd0214544c25... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/1 (157 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieEmpty/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 007257ee839a114cc9b243331869000000007160ff3cbe7787614d83f670e3f3... extension new: [2] 0000 handshake old: [508] 0303d2a3ca57ba274f81b357b905fe22d83a5fbc3a1c82178ce0950993d694fc... handshake new: [394] 0303d2a3ca57ba274f81b357b905fe22d83a5fbc3a1c82178ce0950993d694fc... record old: [512] 010001fc0303d2a3ca57ba274f81b357b905fe22d83a5fbc3a1c82178ce09509... record new: [398] 0100018a0303d2a3ca57ba274f81b357b905fe22d83a5fbc3a1c82178ce09509... client: Filtered packet: [403] 160303018e0100018a0303d2a3ca57ba274f81b357b905fe22d83a5fbc3a1c82... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieEmpty/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieEmpty/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 007299de4762d9545881ae46c9b2000000007976ccef6474ce21e606dfb0caa5... extension new: [2] 0000 handshake old: [301] fefd8e9252827f6df4af37b71938a0ba49a4b7954a374f9abbbe29422c8876d9... handshake new: [187] fefd8e9252827f6df4af37b71938a0ba49a4b7954a374f9abbbe29422c8876d9... record old: [313] 0100012d000100000000012dfefd8e9252827f6df4af37b71938a0ba49a4b795... record new: [199] 010000bb00010000000000bbfefd8e9252827f6df4af37b71938a0ba49a4b795... client: Filtered packet: [212] 16fefd000000000000000000c7010000bb00010000000000bbfefd8e9252827f... extension old: [116] 007299de4762d9545881ae46c9b2000000007976ccef6474ce21e606dfb0caa5... extension new: [2] 0000 handshake old: [301] fefd8e9252827f6df4af37b71938a0ba49a4b7954a374f9abbbe29422c8876d9... handshake new: [187] fefd8e9252827f6df4af37b71938a0ba49a4b7954a374f9abbbe29422c8876d9... record old: [313] 0100012d000100000000012dfefd8e9252827f6df4af37b71938a0ba49a4b795... record new: [199] 010000bb00010000000000bbfefd8e9252827f6df4af37b71938a0ba49a4b795... client: Filtered packet: [212] 16fefd000000000000000200c7010000bb00010000000000bbfefd8e9252827f... extension old: [116] 007299de4762d9545881ae46c9b2000000007976ccef6474ce21e606dfb0caa5... extension new: [2] 0000 handshake old: [301] fefd8e9252827f6df4af37b71938a0ba49a4b7954a374f9abbbe29422c8876d9... handshake new: [187] fefd8e9252827f6df4af37b71938a0ba49a4b7954a374f9abbbe29422c8876d9... record old: [313] 0100012d000100000000012dfefd8e9252827f6df4af37b71938a0ba49a4b795... record new: [199] 010000bb00010000000000bbfefd8e9252827f6df4af37b71938a0ba49a4b795... client: Filtered packet: [212] 16fefd000000000000000300c7010000bb00010000000000bbfefd8e9252827f... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieEmpty/1 (157 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 0072358c309a650f324e0510bbfb0000000015779577b7417a7f1e63bd15d043... extension new: [118] 0072358c309a650f324e0510bbfb0000000015779577b7417a7f1e63bd15d043... handshake old: [508] 0303ba715978d308d7b5b865dc5fe8bd9661910b5d3636fd9425d67f100db0da... handshake new: [510] 0303ba715978d308d7b5b865dc5fe8bd9661910b5d3636fd9425d67f100db0da... record old: [512] 010001fc0303ba715978d308d7b5b865dc5fe8bd9661910b5d3636fd9425d67f... record new: [514] 010001fe0303ba715978d308d7b5b865dc5fe8bd9661910b5d3636fd9425d67f... client: Filtered packet: [519] 1603030202010001fe0303ba715978d308d7b5b865dc5fe8bd9661910b5d3636... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 0072eeb3e5e7ab1e7e8c8d5a31a4000000008b947d99dedf8f991bce08b12064... extension new: [118] 0072eeb3e5e7ab1e7e8c8d5a31a4000000008b947d99dedf8f991bce08b12064... handshake old: [301] fefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e182e319dff1bde23a73946473... handshake new: [303] fefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e182e319dff1bde23a73946473... record old: [313] 0100012d000100000000012dfefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e1... record new: [315] 0100012f000100000000012ffefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e1... client: Filtered packet: [328] 16fefd0000000000000000013b0100012f000100000000012ffefd8bc08e4400... extension old: [116] 0072eeb3e5e7ab1e7e8c8d5a31a4000000008b947d99dedf8f991bce08b12064... extension new: [118] 0072eeb3e5e7ab1e7e8c8d5a31a4000000008b947d99dedf8f991bce08b12064... handshake old: [301] fefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e182e319dff1bde23a73946473... handshake new: [303] fefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e182e319dff1bde23a73946473... record old: [313] 0100012d000100000000012dfefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e1... record new: [315] 0100012f000100000000012ffefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e1... client: Filtered packet: [328] 16fefd0000000000000002013b0100012f000100000000012ffefd8bc08e4400... extension old: [116] 0072eeb3e5e7ab1e7e8c8d5a31a4000000008b947d99dedf8f991bce08b12064... extension new: [118] 0072eeb3e5e7ab1e7e8c8d5a31a4000000008b947d99dedf8f991bce08b12064... handshake old: [301] fefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e182e319dff1bde23a73946473... handshake new: [303] fefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e182e319dff1bde23a73946473... record old: [313] 0100012d000100000000012dfefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e1... record new: [315] 0100012f000100000000012ffefd8bc08e44008dc7fd3dc9158b8cd96c8fa8e1... client: Filtered packet: [328] 16fefd0000000000000003013b0100012f000100000000012ffefd8bc08e4400... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/1 (157 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.CaptureAlertClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 030366202bdcc0f67167443518e5f5a7d418df29951cac2e59b7abf32aafd873... handshake new: [85] 030366202bdcc0f67167443518e5f5a7d418df29951cac2e59b7abf32aafd873... record old: [90] 02000056030366202bdcc0f67167443518e5f5a7d418df29951cac2e59b7abf3... record new: [89] 02000055030366202bdcc0f67167443518e5f5a7d418df29951cac2e59b7abf3... server: Filtered packet: [773] 160303005902000055030366202bdcc0f67167443518e5f5a7d418df29951cac... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.CaptureAlertClient/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.CaptureAlertClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] fefdcc34eeea8e5da3121d055828b34296af6c2579fd5c94159c85ad3299dda1... handshake new: [85] fefdcc34eeea8e5da3121d055828b34296af6c2579fd5c94159c85ad3299dda1... record old: [98] 020000560000000000000056fefdcc34eeea8e5da3121d055828b34296af6c25... record new: [97] 020000550000000000000055fefdcc34eeea8e5da3121d055828b34296af6c25... server: Filtered packet: [887] 16fefd00000000000000000061020000550000000000000055fefdcc34eeea8e... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.CaptureAlertClient/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 255 client: Warning alert received: 255 client: Read error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownAlert/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 255 client: Warning alert received: 255 client: Read error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownAlert/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AlertWrongLevel/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 10 client: Warning alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AlertWrongLevel/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AlertWrongLevel/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 10 client: Warning alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AlertWrongLevel/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownRecord/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Send Direct [5] ff03030000 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownRecord/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownRecord/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Send Direct [5] ff03030000 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownRecord/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [63] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... record new: [64] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... server: Filtered packet: [86] 1703030051b6bee24b704ee64530b505a99b99400e400e16e48f13bb570da57f... record old: [37] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... record new: [38] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... server: Filtered packet: [60] 1703030037e6099e9c4d054dc2291e721b5396413ed450cd4019e44fe283c9c1... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [63] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... record new: [64] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... server: Filtered packet: [86] 2fedde0051b5f80be829906b098f7caa471aae3cb68293448af91d3193d83cae... record old: [37] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... record new: [38] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... server: Filtered packet: [60] 2f4a5200370a713c4fa65571ea219c5e9166531bfcd70c679218a8066e476f6e... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [80] 07989aca8044fc4176959ace71f1ffd33dd1b84d979d917f50ee69dca4c4a0ad... record new: [416] 07989aca8044fc4176959ace71f1ffd33dd1b84d979d917f50ee69dca4c4a0ad... server: Filtered packet: [421] 17030301a007989aca8044fc4176959ace71f1ffd33dd1b84d979d917f50ee69... record old: [54] 6a4870584e681fa785af9adb321470c085323d79993d4b7ce55b18a92835914d... record new: [390] 6a4870584e681fa785af9adb321470c085323d79993d4b7ce55b18a92835914d... server: Filtered packet: [395] 17030301866a4870584e681fa785af9adb321470c085323d79993d4b7ce55b18... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [80] e36c9b81588d49ca76289a3fa283b3ff9b01e7e764e59a882223ee588197c835... record new: [416] e36c9b81588d49ca76289a3fa283b3ff9b01e7e764e59a882223ee588197c835... server: Filtered packet: [421] 2f000001a0e36c9b81588d49ca76289a3fa283b3ff9b01e7e764e59a882223ee... record old: [54] deccc29e8b3723f5a16d36c6d59361a3683bd89cce764652efcdd34295c32c4b... record new: [390] deccc29e8b3723f5a16d36c6d59361a3683bd89cce764652efcdd34295c32c4b... server: Filtered packet: [395] 2f00010186deccc29e8b3723f5a16d36c6d59361a3683bd89cce764652efcdd3... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [90] 02000056030315576426763751d53adfbbc473778b5fe60bcb78bbf2e4544683... max: [80] 81c0709d4e03a0d29ca62a9276b51bf969fb6232415141bb6d5c8d77c7e4e316... max: [80] 88799dfbe22bfa5a90a8102ee7781d03400abdf49c896f702a2b9506104aae8a... max: [80] 3b61b793b4d1bf7f2c0b70a69093d446c7719028186685187069a88c417605f3... max: [80] c137d7e57b4775f528d2afe3f4b1f9378b6363000c853e04600a746f7dbb900d... max: [80] 7ed2cede7e142010ca26ae9f376a0263230a68e36571a44f15cd88f586595fc5... max: [80] 03b460fa4aa961a574d120b8228be7bfc548ff6c24efad9507751aaedb373208... max: [80] d33c4e6ca3845e9b3f6b3233d9f05e6969c7e6815e6d326c5c56fef7cb504d5b... max: [80] b1a60151e5fbee54bb728971e2f67ad59f4fb126d12bbe4bc52e01eadb8927a5... max: [80] eef2108160e9f990d4b9576eb9b19e66cd5cbe143c110c1e37a61e88df243f1b... max: [80] 8b9796504e4ec4facdbeaa253edb63229393da40313ddb53eade7f39503f30ad... max: [44] 8a707a98bd492751b82d52289ea7787552fd2de59ddcd7057b2d6fb69582b5b6... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] c6fd6f100bb90b62f4a326bca947a9ce3f0156f4cd06a12836a5cb6b5046eb7d... server: Filtered packet: [86] 1703030051c6fd6f100bb90b62f4a326bca947a9ce3f0156f4cd06a12836a5cb... max: [54] 8b776aa98a06bd4416a8e0c13a09f8ca73819b1efc1f419220c7080bef510a7e... server: Filtered packet: [60] 17030300378b776aa98a06bd4416a8e0c13a09f8ca73819b1efc1f419220c708... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [98] 020000560000000000000056fefdda5d46954fff1f0e8ac2571dd6a79dfc5499... max: [65] 862b6b2126c4b591bd4189f794c388a65b080ea61ab0808abf52c02bc85ae5b1... max: [80] 8393ba8d3ff78eca51be8007e6d15e4bea2e1e50340a6e3bb7e6a578853e37a3... max: [80] ea12ea67168ad3efadd6288ea0f5b3b40ca0cf57e79fa3e7f4cfe547750e4e3b... max: [80] be419e39d46625512f65d3725352b9bd319f797407863c8b70fda3555bd80c3d... max: [80] 3e0403d6deec09507cbfedb58fc48a124bb34c037b472d42c3c8d4ab56cd88ff... max: [80] 4fd2830239a3524a9c605fc7e3c913585dd0e75db39fe1b5e96103c39d6e3e35... max: [80] aa53b0561694f0acec7698bd923efdc90182d78a9dcaf6b042590dc48d42fe80... max: [80] 29c0125f0f686016643cbbd8f0b10b9bb81c9eb09b099d39aa9b3d430b6a90ce... max: [80] c36935ea6fb5b4082cafd3840a54341054ea2a4942f55913b03ad51e0e96291c... max: [62] 740b4780a178840ce941060593756d3b9d9897888e9b15bef2ec6a21c3a8e2fc... max: [80] 9c77e7e45843b393c6aa5c52196c95caa6b16921069fadb9ec3412ae9a1ba724... max: [80] ae3dd030b871c26e9409387155b0d8fae8af157b9a86f3b4d88269bc51a0cf77... max: [59] 23196e25e050c332c552361cd50b411165a8c5e007e0526c4b5a27eb5de27aa6... max: [61] d4f179c2d510f3c46787bcebf5a9ea3d83c6b17619ab995b9f6b458101fec53a... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] 8618b94d4ad7a6b8e05c4dc3f1df83dd01b5b17219db37e9427685 Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] e044891727ff81423ed5007173fd0cb2b4cfcefe9900f487e362179c0c833945... server: Filtered packet: [86] 2fe05e0051e044891727ff81423ed5007173fd0cb2b4cfcefe9900f487e36217... max: [54] 52a2734bd61bde60f4598c6744ed43d6a821865a88cc6ded80220eebf0b98f2e... server: Filtered packet: [60] 2fab4f003752a2734bd61bde60f4598c6744ed43d6a821865a88cc6ded80220e... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/0 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/1 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCNotConfigured/0 Version: TLS 1.3 [ OK ] Version13Only/TlsConnectTls13.DCNotConfigured/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCNotConfigured/1 Version: DTLS 1.3 [ OK ] Version13Only/TlsConnectTls13.DCNotConfigured/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/0 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/1 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/1 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCWeakKey/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 71 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 71 server: Handshake failed with error SSL_ERROR_INSUFFICIENT_SECURITY_ALERT: Server requires ciphers more secure than those supported by client. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCWeakKey/0 (20 ms) [ RUN ] Version13Only/TlsConnectTls13.DCWeakKey/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 71 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 71 server: Handshake failed with error SSL_ERROR_INSUFFICIENT_SECURITY_ALERT: Server requires ciphers more secure than those supported by client. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCWeakKey/1 (21 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [76] 040300483046022100f49d8cb296e10a564438629e47d54b5a8ff65c0f813475... handshake new: [76] 050300483046022100f49d8cb296e10a564438629e47d54b5a8ff65c0f813475... record old: [689] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [689] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [806] 160303005a020000560303e5bcf1d5a7d3490cdc5d8bd01dc411a4194186d175... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [75] 04030047304502204f442704fb328fe44cafee1025cbbb5a0603ee5461f15ce7... handshake new: [75] 05030047304502204f442704fb328fe44cafee1025cbbb5a0603ee5461f15ce7... record old: [87] 0f00004b000300000000004b04030047304502204f442704fb328fe44cafee10... record new: [87] 0f00004b000300000000004b05030047304502204f442704fb328fe44cafee10... server: Filtered packet: [920] 16fefd00000000000000000062020000560000000000000056fefdfa6cb8edb7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadSignature/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_BAD_SIGNATURE: SSL received a delegated credential with an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadSignature/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadSignature/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_BAD_SIGNATURE: SSL received a delegated credential with an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadSignature/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExpired/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_EXPIRED: SSL received a delegated credential that expired. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExpired/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExpired/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_EXPIRED: SSL received a delegated credential that expired. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExpired/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INAPPROPRIATE_VALIDITY_PERIOD: SSL received a delegated credential with excessive TTL. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INAPPROPRIATE_VALIDITY_PERIOD: SSL received a delegated credential with excessive TTL. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INVALID_KEY_USAGE: SSL received a delegated credential from a certificate with invalid key usage. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INVALID_KEY_USAGE: SSL received a delegated credential from a certificate with invalid key usage. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [74] 04030046304402206b897c66662af5e998b080142abb8dd7959f6517daf017e5... handshake drop: [32] 666a976914d1bf3e57801464118ab75014b79902cbeab621c76520aca596810c record old: [688] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [574] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [691] 160303005a020000560303b76c58f9994d39bf6e1638314a6bf33c1cb7526a6f... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [75] 0403004730450221009d981dfb70b2073707dca560a62f10e8baf998b463863b... record drop: DTLS 1.3 <46> 2000000000002:[104] ab84da716a71fcb8893d79959d68687ce4fef0519f0a69623e44ea692c83fd27... handshake drop: [32] afcc15e0a599baa6af4e52895b5483e1e26ea603ec2ff87dae49cada2e8aaac2 record drop: DTLS 1.3 <46> 2000000000003:[61] 1caf9c102d9e01b0a50d0670ee0027c353b77963a9272f93e109724eb3bdbb70... server: Filtered packet: [746] 16fefd00000000000000000062020000560000000000000056fefd0336a60d74... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [74] 0403004630440220183095c1fd44010359989d12f2907e53c881e4c0e573e728... handshake drop: [32] cd15aa4c4bb4c445157b219c2f0d9882ff20acb241dadf1bc896c57e15f5ba2b record old: [509] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [395] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [512] 160303005a0200005603033396857c528fef270a47356bc54cbd246024146f81... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [75] 04030047304502206dde70039915c6baa1e87bad927a71e7def85e8d55a46988... record drop: DTLS 1.3 <46> 2000000000002:[104] 87e8ae3412c8c923aca179102047019bbc321a418e8f0a311fbba117dbfbc93d... handshake drop: [32] 36566bb3893a22ee788857f5d78adfa77a0fac06e26f5bf21e98a242f25860a6 record drop: DTLS 1.3 <46> 2000000000003:[61] fb1cbbe80ebd032e5ab4922c6dbf27b43d69d59f199c72e2152552f0a3b89f09... server: Filtered packet: [566] 16fefd00000000000000000062020000560000000000000056fefd2036419859... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/1 (9 ms) [----------] 244 tests from Version13Only/TlsConnectTls13 (2037 ms total) [----------] 6 tests from Tls13ZeroRttReplayTest/TlsZeroRttReplayTest [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/0 (10 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/1 (10 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/0 (6 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/1 (7 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/0 (10 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/1 (10 ms) [----------] 6 tests from Tls13ZeroRttReplayTest/TlsZeroRttReplayTest (53 ms total) [----------] 292 tests from GenericStream/TlsConnectGeneric [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/2 Version: TLS 1.1 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/3 Version: TLS 1.0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/0 Version: TLS 1.3 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/1 Version: TLS 1.2 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/2 Version: TLS 1.1 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/3 Version: TLS 1.0 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/0 Version: TLS 1.3 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/1 Version: TLS 1.2 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/2 Version: TLS 1.1 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/3 Version: TLS 1.0 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 Version: TLS 1.3 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 Version: TLS 1.2 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 Version: TLS 1.1 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/3 Version: TLS 1.0 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/1 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/0 Version: TLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/1 Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/2 Version: TLS 1.1 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/3 Version: TLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (26 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/3 (23 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/3 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/3 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400805bab60147874602867e2b5ebafd5ce35396e0ae7f9db6a920f60b368... handshake new: [132] 080400805bab60147874602867e2b5ebafd5ce35396e0ae7f9db6a920f60b368... record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... client: Filtered packet: [645] 1703030280693173eac05072290759bbf9519f6f3bd4c643a179d37318ee9e8f... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 02010080a4832143c87ce81b702f3980f255c483367afa74c0858533927deffd... handshake new: [132] 02010080a4832143c87ce81b702f3980f255c483367afa74c0858533927deffd... record old: [621] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [621] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [677] 160303026d0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00802c32750928048996c1cd97b005107545f2e2483b34e2aab6ffb73be4ce9b... handshake new: [130] 00802c32750928048996c1cd97b005107545f2e2483b34e2aab6ffb73be4ce9b... record old: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [699] 160302026b0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080b65a06b003e4ba2091479c2e179ed7edc8d7a5ec4e04987dc287b8be6043... handshake new: [130] 0080b65a06b003e4ba2091479c2e179ed7edc8d7a5ec4e04987dc287b8be6043... record old: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [683] 160301026b0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 (14 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/0 (17 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/1 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/2 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/3 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/0 (18 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/1 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/2 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/3 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/0 Version: TLS 1.3 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/0 (1 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/1 Version: TLS 1.2 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/1 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/2 Version: TLS 1.1 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/2 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/3 Version: TLS 1.0 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 03035f5e8aeaf1f53a4f0c4a32a704fd14b21a76c317c62fed02df14a9dd7906... handshake new: [179] 03035f5e8aeaf1f53a4f0c4a32a704fd14b21a76c317c62fed02df14a9dd7906... record old: [184] 010000b403035f5e8aeaf1f53a4f0c4a32a704fd14b21a76c317c62fed02df14... record new: [183] 010000b303035f5e8aeaf1f53a4f0c4a32a704fd14b21a76c317c62fed02df14... client: Filtered packet: [188] 16030100b7010000b303035f5e8aeaf1f53a4f0c4a32a704fd14b21a76c317c6... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/0 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 030307916bb1bde70f71a081589ac667a722fa7a19acb7835bfe352512e66ac4... handshake new: [186] 030307916bb1bde70f71a081589ac667a722fa7a19acb7835bfe352512e66ac4... record old: [191] 010000bb030307916bb1bde70f71a081589ac667a722fa7a19acb7835bfe3525... record new: [190] 010000ba030307916bb1bde70f71a081589ac667a722fa7a19acb7835bfe3525... client: Filtered packet: [195] 16030100be010000ba030307916bb1bde70f71a081589ac667a722fa7a19acb7... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0302741aa6706a25544583b26388fabab2e6be97f05e9ec62ff60bfa221feaec... handshake new: [116] 0302741aa6706a25544583b26388fabab2e6be97f05e9ec62ff60bfa221feaec... record old: [121] 010000750302741aa6706a25544583b26388fabab2e6be97f05e9ec62ff60bfa... record new: [120] 010000740302741aa6706a25544583b26388fabab2e6be97f05e9ec62ff60bfa... client: Filtered packet: [125] 1603010078010000740302741aa6706a25544583b26388fabab2e6be97f05e9e... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0301ba6a31bde5c2962f4cd9f29bc0bbdfb1542ddb06571a9df44ad2dffd5d86... handshake new: [116] 0301ba6a31bde5c2962f4cd9f29bc0bbdfb1542ddb06571a9df44ad2dffd5d86... record old: [121] 010000750301ba6a31bde5c2962f4cd9f29bc0bbdfb1542ddb06571a9df44ad2... record new: [120] 010000740301ba6a31bde5c2962f4cd9f29bc0bbdfb1542ddb06571a9df44ad2... client: Filtered packet: [125] 1603010078010000740301ba6a31bde5c2962f4cd9f29bc0bbdfb1542ddb0657... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [184] 010000b403036a93fda9c4da0e2e25abf49a0fad877d64a0f725738e7d33bfe5... max: [90] 0200005603032c7b598b9bba44b62cf5c093283cbf13c29b6929016f1dc22579... max: [674] 337291b1d931ba2d173b74c21e8703ff17f92c032f3383cdf80761e171fa6821... max: [53] ed15f40972b80001c191312975493f906c9c289493c8d7996b0f5cd6909eca57... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [16401] f1216e9121ddd267a266220a22f28aa90cc1f68e15d4603566b79837a9ca6b24... max: [18] 80904d6ec9c819f7c3b9fc9af472919ebbcb max: [16401] ebc898d1d3f57cdfa1015ee767c30905753e208dd85c3d7029bd2f6bc1f34f82... max: [18] 2ff0d638bb4c27cb47b70e7be73237968f2a client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb03031c96b79706995db82a0c4b6540e4ed0f8c1e8d1b1b2ee4d99041... max: [715] 0200005d030332b99edb9f4f69c479185b5ea5935ce28984ce1cd7d46d48dd9c... max: [37] 1000002120bbb56433e7e5b72026a963da1e7c3d034ab8ec54e1f471bfe7801d... max: [1] 01 max: [40] 000000000000000025025705939d63cd578394b24700e26d47e637d07541295b... max: [1] 01 max: [40] 0000000000000000644813346ed027f478bfe9e550f5e7ef24f57c8d06281c1a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [16408] 00000000000000014590e758e860d14a3e275cd8c7debaf6faf79f3149ec2ba3... max: [25] 0000000000000002ef4ce9383f9a1a2ace429b2b6a0cc038db max: [16408] 000000000000000195288a4706f7e478c8ed15aab9fca83fcf532aa9cf5be903... max: [25] 00000000000000027754a3232123e96e48aa2b1ca1656008e5 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750302d8ec0ed3f4cc7eb33add8fb98130cdf5a3bcbc58ce31e5a44f5d... max: [713] 0200005d0302f8d8889842fea70bd27b916492fe1eca1d8137d3f0e05b63d5cd... max: [37] 1000002120ae6ce5a254d2ea4007f5051ad8ebf83eef7bc91b6e1df3a2b7fa64... max: [1] 01 max: [64] ecfac5f389a37b2121a0940602269b6f9ecf1ccd03ccd34db25401aff069f77d... max: [1] 01 max: [64] 0ccba95f706d404384087ce8c998326290c6ff5d63ba31d5be25db8b3cd07a70... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [16432] 8a45f1f65d251a1c5c313a8b2f15068c006c2ec40a6380c54af3b26fe7c91831... max: [48] 94bb6e1034eb393da27717a567c60b29da9cef8b00cd125fc084bc6c8bec4ba1... max: [16432] a9b66f6263e31196c11d22222a486aa5657bcb7ce453e0f61fabb87bad74d597... max: [48] 4c206699bd84ec5d39a6ac2e9bbda39bfea4e4eb8e9cac34a3d531bfa10b0a84... client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750301eaa886c7d5884d3127a73a9bf4785bbcf3c17439b4dddfe04700... max: [713] 0200005d03015f5d3515498406d364a82324bbbda7724a5e71cc1788c3f99ecf... max: [37] 1000002120357fd91667cce6d877d17a1901defe07b063cae56363f2cf5e623c... max: [1] 01 max: [48] 54455cbf0ee6e8c691bb1be3cca3900e4969912fb4780f85e860d059e43729d1... max: [1] 01 max: [48] b03da0b9309ad804c72b47001de90bd9910a989e82d53a2980668c24575122af... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 0ce601be361a30396737d6f8080f6d50e39339565366c8b8eb417babec844f9d max: [16416] 102f6fb607ec5b9e1938271aaef94cc991d7e384948bb942ffe4cdd0cc02c3ff... max: [32] 6661a5f97fef661392c74bfbf35d1f2ac2066cc009bc31ab63ece9a93c51b199 max: [16416] 5c385e2430f1095447be2eb0cbc90feba5aea867501ff91f00ae5b03812b8a5a... client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [90] 020000560303f78e9b4736cfd2985cb17128b2e6c2dae4777ce1d4e70d09e3ed... max: [80] 2fa0c32d5773a77baa78565db5694d08d5e257f912883569a0addc872f7e427e... max: [80] f1195b01c5d4a2e12dddcb00adfc026e4958ea2299a2d4e612a27ba9ec1c1b61... max: [80] 5740efb226d53cc5112cddd4249ed01c71d695fcc1dc45d5a1474ab24c69d4bd... max: [80] 0df05218f5bab5f48d23161bc8092033dfdd3d0689081b7b607564996220edcc... max: [80] e8d07824953bd53ec178f8eb79e51209ef1c2b0487e487ec0edfe5d04e829018... max: [80] ed52c415a7dd774143d69b70f7e5d6439747bed3eb564aa4e978f7499d287a59... max: [80] 543c3be1b9bf6c24a89c1efbb5971de90f76bb717a3d84a52ed1542dc4d25529... max: [80] 02276349ae843587a27f8feaa2e24720c7e06b8c1db749dc3d8596f6339ba9f9... max: [80] 0390c89623b70d49770f7373ac63fd4ae05c510edf87acd0ab7549a4327e3f50... max: [80] fb336b9918aa5e4de980a8df6168408b19d9b6d482c33a68c6d3a57c321029c1... max: [44] d4ef785254490485d6fa685657b2b4e290cc03accdcd8133064d28bd26e8b47a... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] c34b9da0933b689016284996a082ae7deee06cffeebbe8ed2fb737de0bc7d12c... max: [80] d79dcebfd6b67968bd31b7659b61bb2258077c7dea138adab0189c896dc2b52e... max: [18] 3f2f88d32362abdf079882668ad8e8acce2a client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [715] 0200005d03030c7481f7ed61693318e426aa0d22e0b678d6b9ff2fd5c15cf7af... max: [1] 01 max: [40] 0000000000000000d5e58886f3b9d5cbcb3bc5974af7c201148030cc82be9a9b... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 000000000000000195dbd763a81e3c97bce517a469c6b7d1bd15774d7cf1fecb... max: [87] 000000000000000287a7d251c450645fd63f3b0ae1b89dce9e8c2cea4352c630... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [713] 0200005d030202961665f78c2bfb2450660668ebd42e19f803dcad3de5aa396e... max: [1] 01 max: [64] e22add787577a414265907d9603f97a9461ff3cd7417d1d9d2763f65ef2bd0cd... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 46454d0d4a079485a5c5d7061c876852826cc425adf00a2f7efd82801dcbbd59... max: [112] 2986a467f3545e6f0bcdb3161ac704ae6ddaf8b7f636cd648b5dfa036d51de59... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [713] 0200005d03013d47fed902ee2cf06cd830172264542d1ce3642f5b279bf424e5... max: [1] 01 max: [48] d8750db4c4621c4928dd896cba63b0a901bb401318ba25f0d0f9398eee6caa68... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 1586337d57684a2071eaca998f2b02dd666fefbdf5aec5e4d7faa951f75e18a0 max: [96] b2476bb8d8c57a7c4e142a484dee457f575de79895e6da067c9e8d3ddbd772c1... max: [96] 7e79c14c6822725e5186202218e4faf659fe1a42a176eafe8a96d10c51c85543... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [184] 010000b403037b4d650f62df41294caf1f028505c8ea0b01bcbd9c75d704996c... max: [53] 417870c2dfa34260ba031f7091a10e6e0e0a2a4899282892e1ce7cbee415568d... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] b7be82d2b516c9bb3e079024f3e928b0c234d6348f0ae11c6d6c9109ae148207... max: [80] f746b5c12ee6a5769e1034b9f84cd4430b88e29932d5e08848e2ef79a202caa3... max: [18] a1421714f12fa3a130e76e854c4c5dc8e052 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb0303fc246bce1d3f74fa4155f430fe81cf20f3c107f37318e8647adb... max: [37] 1000002120ebe16e83234529d29c4f2a8b621a915c0a6273dccb11d19b6f95b8... max: [1] 01 max: [40] 0000000000000000e0bfe26bc199de2317d88e19cf0a0276422d1edc03f9ee2c... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 0000000000000001f50e74d2b1e79faaee278a16bf5f8dce1ad676787b17f852... max: [87] 0000000000000002016ddb54dc2b80693e00824089ff950a81ae1c15557c5e8c... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750302330193df0133b3c5e3e5a8beb0aff3d2a78ae8280128f4e645bc... max: [37] 10000021204fa6345664fc454afc2d295f3d1656d8395d8bac826334812361a3... max: [1] 01 max: [64] 0b8a642cec10fb88b838ab867e2d14277a7c108b087105b69e961983a727730d... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] df01140c705168bb3f31555db5d7365cdec836760b716cdc9ad49f8b8e1a0561... max: [112] e3aa6ca7ffb3915c36718f0b3ada21289c08ab6a4fc9fd8e2961173139fa18a3... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750301248e6c0c55c3f74c529a6c340a82144513a72e3f1af65bafd0da... max: [37] 1000002120bcf937c773d10a3dd144e646e3531660a879e008b507b5fcb04331... max: [1] 01 max: [48] ec09a7ba6cc30e29dd02034b1d51dabbcd3701577aac04ffcfaa604d39a3d38c... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 581db7ee6bfb2a2185f078c1fb388ea3d5ccebf125564c13647938721a326d74 max: [96] edf23ea46ee3fc73e41d2e4dab182cf2d9f8fb52f2fd3a0d3d70cf2047ce5579... max: [96] 33bfc4801d5eca05c964317b2e95dbba8ed3919a686a3e4694049adb4674990a... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [184] 010000b403039a476134066e7bc1a5014b6c31d8fcec0c78a0f1088af944d65b... max: [90] 020000560303a17205a921764be334ebbfe2cc6be69a81530211e4f843406a03... max: [80] d91012e2e5897e7afbde8fbda33106391ce13d6d24a8bf45fcfe4133fadfec4b... max: [80] 637a29d4d33ca4cf7baa9ce9864e24ee2f61db94e6bc9d02afd3b04f5aaefcd0... max: [80] b0c2d6ee7d6892c2fc3f0dfad0ab1ce0841300fbb50c4d67d94dd0a64d45ed2a... max: [80] fb268753ebb79f246e8c1d5031782202ae9cd8584bc07b7b842518acb4b06eab... max: [80] 666daaa5c1a05b2038800ce64d4012b0f15f061723985b048718df586c664699... max: [80] cd8b129ee466679af59b77fd20ef7ea729153e4dc79ab75fa6d9f916aaa4017b... max: [80] 81bf3a1c4fce734b82f5bace8ff7432131c30cf2ffb098f1ce9e42e0bdd5c278... max: [80] cbdcd264f25a068c4941ad43b97281428f0cf2aaff6690c04387b201ef46630c... max: [80] 3fb61f41d265d059e16dea003a7b6cd669830fa79ada9de22f6cd43d35e60c9c... max: [80] 408addb48417d3764985ae628d0ff17798c52318cc5b9e8fa7227c7ef3194188... max: [44] 93a6f314619fb8573fafa20787a72818fffeb0ef14a5c3366a621bebe2105797... max: [53] f00efdc2d5b5e462457cc5654295e4098bddc3d5507a79178facebe3e28988e9... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [116] b33a6e3cc0ef3597a25febb4341aca647b559dc3afff90805c6d38b51fe2fe97... max: [45] 1d013a13bc9b3e940a3089ddeeb8ccdf33d4d9b67216c0513d592109f85ba434... max: [80] 928c5405306ae1f47bf09fcae4342cfabc30180be644b9b895cdcc384ee93e4a... max: [80] 95115145459150af0d241d5ceea21fd46f2b511f5056028475d1faaef1bdf157... max: [18] f0979375ba61b324045a69f8d5cf00a48971 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb03031fe89b66c97d71786cb23aa0dcceee7b998212e7ec490628ecdc... max: [715] 0200005d0303bbc5802f1d9600ddaa52e2fc2909ea467f2b7b5b82d07cd81913... max: [37] 10000021200e040a1f89ccea645d02b7b5a295b893997bc3358964a47f81f7ac... max: [1] 01 max: [40] 000000000000000086f5bfe1aed3347e74d83547aa7d69c4f70f3aece6ee867e... max: [1] 01 max: [40] 0000000000000000114af6a366f2d71dbc9f58a263b0da67fb4985c7aad5d305... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [124] 0000000000000001018b8cbf7c281541b42b974f4371e20e20d9a39a7e5585a7... max: [51] 0000000000000002a11356174b2287fceee9e1b52cca5c219c6908039dc84746... max: [88] 0000000000000001b012dfe279d13c8781e41dac425d195825c5d3b458f12c67... max: [87] 0000000000000002b5e7a57a8875d19f92bdea592273e01c10642cdba2074da2... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750302a8452a1713a8b5aa27b6af2d2daebdc63591934eed090adc0674... max: [713] 0200005d0302820d613e8d2a104fa0f1fdb75b9eda69370d14082180595d2126... max: [37] 100000212003826b22d6495a51be962e7fc80298f0160c6c88f41950561bc58c... max: [1] 01 max: [64] 607e5cb82aa197e912f987ad1aad96bd1a4c0b190255a1c4e9ebc2c72d3f12d3... max: [1] 01 max: [64] 4a1f05cd17560df6b46bcd5d632dee8a4b0a5abd1fb1c5e82ba87243f3aa160f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [144] 6454762d47d945d5fcbee1660da2cf8d9381207c634bfc63002e2e3b5536c562... max: [64] 2a1676c2e7aba7a1a97f8b470756c94f381aa5f6d33cfdb620c48cd9b49b1af4... max: [112] d40514abe7816996650971c81298a2909858a907e4b9e10fcb50abdea56600d9... max: [112] e1f8942bfe4d24c34f9eb45a87caa5106a25b4bb7a3e5a7dc146093c0ccd8073... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 0100007503014de03c0ddfdd86d0d9054769ffb399289a1d4af6493841b439b4... max: [713] 0200005d0301b19514b1e5d083ff1e4ef78a01a0564ba77a07d2e108bf9c67b9... max: [37] 10000021204bc52706eac871a2dd8647f0e4ca3df89a823b541ce611a6c3ebef... max: [1] 01 max: [48] b13d367fcf81220f5f6e42e4e1e3e1ff0c11832c1428e57f40fdb8bb80379e6a... max: [1] 01 max: [48] d990d1cb57f99b5a2013e4fad26a7e92c88f0ec1a41aa3d7dd68df13e488b63f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] b673cb28c3ec584dd1603f4b0b4d9ccaa80cd2f44f86361fca60933f7ef9b34a max: [128] 725ef274d8c798cbcef72c94e10bcb9d78774a260406516b4a89a75c2e16cf86... max: [48] d786aa7a4a7d0692ae06a1d3bdb5cc5eca93b103b5fb527cc99d8808e792df0f... max: [32] 59c42ba5298cf15c9bc7211f71ea7134fed038d336d64f5efa9f304e1995c285 max: [96] 93c2b40b2768f6a3a26f3dbb3684ad2eac86ee73146c416693df2b762e4e4ff2... max: [96] c5e4fc831f42243ad726dd6ce15db46632b9d599b2b508af0d28121a6205d33f... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [36] 0022000a00140012001d00170018001901000101010201030104001c0002f41f... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a02000056030353695fff703e8885959c53564cc68108795eab4609... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 0303d0e2d65d5c3e7d773a8bd821ce7bc6b809b55ef8fe23a1fe6c1db52e86c8... handshake new: [93] 0303d0e2d65d5c3e7d773a8bd821ce7bc6b809b55ef8fe23a1fe6c1db52e86c8... record old: [715] 0200005d0303d0e2d65d5c3e7d773a8bd821ce7bc6b809b55ef8fe23a1fe6c1d... record new: [715] 0200005d0303d0e2d65d5c3e7d773a8bd821ce7bc6b809b55ef8fe23a1fe6c1d... server: Filtered packet: [720] 16030302cb0200005d0303d0e2d65d5c3e7d773a8bd821ce7bc6b809b55ef8fe... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 0302be889f04724b46603c798041ee75b1d8f6e1dcade29815248bc90d1b66e2... handshake new: [93] 0302be889f04724b46603c798041ee75b1d8f6e1dcade29815248bc90d1b66e2... record old: [713] 0200005d0302be889f04724b46603c798041ee75b1d8f6e1dcade29815248bc9... record new: [713] 0200005d0302be889f04724b46603c798041ee75b1d8f6e1dcade29815248bc9... server: Filtered packet: [718] 16030202c90200005d0302be889f04724b46603c798041ee75b1d8f6e1dcade2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 0301c033e89176300a5fd6684a9a8386ab1bfec5d7db5ea6ddccf3fd388aa938... handshake new: [93] 0301c033e89176300a5fd6684a9a8386ab1bfec5d7db5ea6ddccf3fd388aa938... record old: [713] 0200005d0301c033e89176300a5fd6684a9a8386ab1bfec5d7db5ea6ddccf3fd... record new: [713] 0200005d0301c033e89176300a5fd6684a9a8386ab1bfec5d7db5ea6ddccf3fd... server: Filtered packet: [718] 16030102c90200005d0301c033e89176300a5fd6684a9a8386ab1bfec5d7db5e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [37] 0023000a00140012001d00170018001901000101010201030104001c00030100... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [658] 080000250023000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [775] 160303005a020000560303c49981ea1e8ae117aa787b2a96f8d5c7c5d5ff899e... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 03039fe5d452073ab845e6624c53f30510d6c57cf85a64c76769f0a9d4c7f56a... handshake new: [94] 03039fe5d452073ab845e6624c53f30510d6c57cf85a64c76769f0a9d4c7f56a... record old: [715] 0200005d03039fe5d452073ab845e6624c53f30510d6c57cf85a64c76769f0a9... record new: [716] 0200005e03039fe5d452073ab845e6624c53f30510d6c57cf85a64c76769f0a9... server: Filtered packet: [721] 16030302cc0200005e03039fe5d452073ab845e6624c53f30510d6c57cf85a64... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 0302aa5a04fd403a32287192a9c3cfb9e1f5214dd79b09833a158da59a16c7c5... handshake new: [94] 0302aa5a04fd403a32287192a9c3cfb9e1f5214dd79b09833a158da59a16c7c5... record old: [713] 0200005d0302aa5a04fd403a32287192a9c3cfb9e1f5214dd79b09833a158da5... record new: [714] 0200005e0302aa5a04fd403a32287192a9c3cfb9e1f5214dd79b09833a158da5... server: Filtered packet: [719] 16030202ca0200005e0302aa5a04fd403a32287192a9c3cfb9e1f5214dd79b09... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 03019ef4d476ee5416984a7a9a04ac1e732e2d67b5d81c2405b4985bd96ef921... handshake new: [94] 03019ef4d476ee5416984a7a9a04ac1e732e2d67b5d81c2405b4985bd96ef921... record old: [713] 0200005d03019ef4d476ee5416984a7a9a04ac1e732e2d67b5d81c2405b4985b... record new: [714] 0200005e03019ef4d476ee5416984a7a9a04ac1e732e2d67b5d81c2405b4985b... server: Filtered packet: [719] 16030102ca0200005e03019ef4d476ee5416984a7a9a04ac1e732e2d67b5d81c... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (10 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/3 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/0 Version: TLS 1.3 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/0 (139 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/1 Version: TLS 1.2 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/1 (104 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/2 Version: TLS 1.1 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/2 (103 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/3 Version: TLS 1.0 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/3 (103 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 Version: TLS 1.0 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 Version: TLS 1.1 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 Version: TLS 1.0 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/3 (3 ms) [----------] 292 tests from GenericStream/TlsConnectGeneric (2013 ms total) [----------] 219 tests from GenericDatagram/TlsConnectGeneric [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/0 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/1 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/2 Version: DTLS 1.0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/0 Version: DTLS 1.3 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/1 Version: DTLS 1.2 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/2 Version: DTLS 1.0 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/0 Version: DTLS 1.3 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/1 Version: DTLS 1.2 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/2 Version: DTLS 1.0 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 Version: DTLS 1.3 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 Version: DTLS 1.2 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 Version: DTLS 1.0 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuth/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuth/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/0 Version: DTLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/1 Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/2 Version: DTLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08040080c451603120d1ce8543e911a0580c1ecb865785b83542ac1b65e44b5d... handshake new: [132] 08040080c451603120d1ce8543e911a0580c1ecb865785b83542ac1b65e44b5d... record old: [144] 0f000084000200000000008408040080c451603120d1ce8543e911a0580c1ecb... record new: [144] 0f000084000200000000008408040080c451603120d1ce8543e911a0580c1ecb... client: Filtered packet: [713] 2e5f3001dc3aa0f6960c85ecbbf3e96907976c83a1fb5514a4025c672fe0db90... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 02010080ad31476ecae8207d16078d11d633a433f6263a39ea94f4a86ad13495... handshake new: [132] 02010080ad31476ecae8207d16078d11d633a433f6263a39ea94f4a86ad13495... record old: [144] 0f000084000300000000008402010080ad31476ecae8207d16078d11d633a433... record new: [144] 0f000084000300000000008402010080ad31476ecae8207d16078d11d633a433... client: Filtered packet: [759] 16fefd000000000000000101c80b0001bc00010000000001bc0001b90001b630... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080452f91ea6bd6ea4dc96064d3883c8c99fb038f12595707f5d03e41c36b30... handshake new: [130] 0080452f91ea6bd6ea4dc96064d3883c8c99fb038f12595707f5d03e41c36b30... record old: [142] 0f00008200030000000000820080452f91ea6bd6ea4dc96064d3883c8c99fb03... record new: [142] 0f00008200030000000000820080452f91ea6bd6ea4dc96064d3883c8c99fb03... client: Filtered packet: [773] 16feff000000000000000101c80b0001bc00010000000001bc0001b90001b630... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 (15 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/0 (17 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/0 (17 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 Version: DTLS 1.3 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 Version: DTLS 1.2 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/2 Version: DTLS 1.0 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/2 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/0 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd61057f09bab2aa67ec08960b61d4f5b0ebea47eccea6c68a96a726bad7e4... handshake new: [180] fefd61057f09bab2aa67ec08960b61d4f5b0ebea47eccea6c68a96a726bad7e4... record old: [193] 010000b500000000000000b5fefd61057f09bab2aa67ec08960b61d4f5b0ebea... record new: [192] 010000b400000000000000b4fefd61057f09bab2aa67ec08960b61d4f5b0ebea... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefd61057f09ba... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefd139e69f99b1ddaeef9a0b6b098c54605d228f1d918f21f761deb4c2a8200... handshake new: [183] fefd139e69f99b1ddaeef9a0b6b098c54605d228f1d918f21f761deb4c2a8200... record old: [196] 010000b800000000000000b8fefd139e69f99b1ddaeef9a0b6b098c54605d228... record new: [195] 010000b700000000000000b7fefd139e69f99b1ddaeef9a0b6b098c54605d228... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd139e69f99b... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [114] feffcabb39fffac28380ab7c2ef04a8adc108cf310246b622bab50b8ec7193ce... handshake new: [113] feffcabb39fffac28380ab7c2ef04a8adc108cf310246b622bab50b8ec7193ce... record old: [126] 010000720000000000000072feffcabb39fffac28380ab7c2ef04a8adc108cf3... record new: [125] 010000710000000000000071feffcabb39fffac28380ab7c2ef04a8adc108cf3... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feffcabb39fffa... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [193] 010000b500000000000000b5fefdba824165413788dd87a3890a9f51001b5ec7... max: [98] 020000560000000000000056fefd2dc05fc6d465204b531db0a162cc731e9064... max: [65] 673b9751d8649f8ac5529e13d8c60f00659e5caa53db4ab4e51e4185f849f4a9... max: [470] b1535095daf2f00ff5db34517e6afeaeefbca32996c42fb3e91147fb06d9d43e... max: [161] ab876af434d6066ca71370acac3816cffee36093c84a5de3396bd01805bd1b30... max: [61] 5a665ac6637a3de1290b198c091a84f12c63739095803f1319dbfd8a06c8780a... max: [61] 2ae0a08e8b3de8dcacff71a641a34b60ee9cfbcd29d9347aaf590503baf77222... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] 6a8472ba75abf94cf3669470f01923b37dfbf3fd1283c5f24e523f client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [16401] ae07017839ad1d146cd427258c62251c6ff67f9f01398f4a673ba4116a4e8650... max: [18] 13fcc3d3cbed88942bd9156b8dcc52acbdae max: [16401] 2bcbe4c4f7b7c448468c4a7dee9c5f5a57a71f9e1d8b32f68d9a257a1ef9a5d8... max: [18] 7d735c4fc742fb2eb42d8c530e0dd73dcb36 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefdc3d85ec044944c7bafa4ae2f3aafc183d8b0... max: [105] 0200005d000000000000005dfefd468ca208b4501a8da091d60db48ef3b2219f... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... max: [12] 0e0000000003000000000000 max: [45] 10000021000100000000002120193ca8385e046b6db68f3cbe15ba5eb384ba2d... max: [1] 01 max: [48] 000100000000000006c8ac0b6b399686b88f10165a0849c9550faa8f978ba780... max: [1] 01 max: [48] 0001000000000000713b1a61ce3c335d3e1c385bea3dcb61cbdd167e33ef0a48... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [16408] 0001000000000001bc1089adba2290ced623a494dd9b3982f4d169097de2484c... max: [25] 000100000000000248ce1314fabdf2f725369cf81a73d94e9f max: [16408] 0001000000000001e632605893e1e3801f00e7c7e188874ca31aa7dff0a670c8... max: [25] 0001000000000002d92b83eb3b975b8f386f9d72be88a4462a client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feff5f30dfbf08e81c1d7470f5b6787bd53e70f6... max: [105] 0200005d000000000000005dfeff76e42936cca7fbc3923f18cfd6f96e4f5e5f... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... max: [12] 0e0000000003000000000000 max: [45] 100000210001000000000021208b512bf6ff307dd01d1fe844a62e4e25dbf3c4... max: [1] 01 max: [64] 6d506aa94f56fbbd949ff920775c0db4844a9c9b439b30b84045d2f9bc975df1... max: [1] 01 max: [64] 470ede662c3582085b42e7eff65b375b9ce5fa85301ad051ab4f86ab158ad358... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [16432] 4095caa41773a2459cb491c72970792b044a0336a405355326d5b3ce3fc46088... max: [48] 45061452d42d8b6ce86728e6c173377576a7cfbd88d4f94ada0cadf4990c67f5... max: [16432] ede8f824c904ef3f309cdf88af0164ac2ee55c807634035607f3b7f6322a3434... max: [48] 276167f01a2ca3352dee9f7910a2cc360e64abb2dd5091bd01a28dbf71ad5071... client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [98] 020000560000000000000056fefd9f48e56f1e831d0421e6011e0d670d056b14... max: [65] 38f3d21cb5cfa3103e41a466f3f2b6f2f35d0d0322b454da634bc2a2ccec0105... max: [80] 2939610df722f084603a0b96a9657983dc3ed48689c7e5431f96ca17357a6e40... max: [80] 19cb0db9598b8f98f80ee551f40bbaa059965bba5a3cd5a4fc780727be855b39... max: [80] 30c64655c4049d18a42192667dcc32d75cffe04ed769b12971f61597d7b0e936... max: [80] 68aa2e9cae088a643fe655a1fa080bb6795dd8edc96861c41410d9a1387e91f6... max: [80] d2b1a21bb72d660da867ed432d2a5e06feea899e8985a49900ae055bd9145dff... max: [80] f5ca20420bc268c2b3fb764531d9c03cc12e64b6cd0c6a2c4e7eeed6a7df27aa... max: [80] 07d69524fa04e5411918c61444975a1061693df0c4197e5af512e1054629c181... max: [80] f4b539917dc0336159dd5735c09afcfc41b8f2d2df8a338341197a6c05c29a3b... max: [62] 32c875abdc57b40b9087338c21cd0081b7e043b63e7739b0fe874711269d10ac... max: [80] 55b58c6cbf1313d808265a7f82f049876d3074686eb18cce4766f182dd56e020... max: [80] baaac4288b2e1465fa9b1fd931f85e13e1edc816e132dd2aa77e8979b9858395... max: [59] d4b10547b25d25cf6e9de6a490bed8355700c8ba39f5181a9f10e471ef0d777f... max: [61] 3b0e283b2b83a94531eab88020480b6a3affdbe09c20e34c4490b086cd968231... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] ba66cd2218f61d2cb64642c84133e85514390901c6b24b8803bf0d client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] f2a59d8be2af3443c3c68521375b189f6715912775dd713942c1937d136b323b... max: [80] ab2943801beab14fe712941e31a5df46dfc2a101767b5b76fc634e4f9c2581ac... max: [18] bd5f2ba4b5a9c1c5cc83059c31feb77b2684 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [105] 0200005d000000000000005dfefd61937de9e1338330842ed3feaa036c40328a... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... max: [12] 0e0000000003000000000000 max: [1] 01 max: [48] 0001000000000000f50d56249d6c91b0473593332a5ae0bbf17900cf82863157... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 0001000000000001f68287e07f297ddce278d246c9c4809a6a2d4cadc509e7a6... max: [87] 0001000000000002eff5aa54d82852c8afe3aa175c22098cb961012bae53f0fb... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [105] 0200005d000000000000005dfeff805182b8ccb4c19949b966847169a463ba43... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... max: [12] 0e0000000003000000000000 max: [1] 01 max: [64] 04d0f2586a0275103766710cbc0d4692809f977a75f09023582bb024ee586274... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 4c15dc3808acb4c9e729184fd9afe9daa08030edeccd3103d0d7bf6989d6c44d... max: [112] 5aa95da947db543e7ae1a9ddac64bd266cd4d3cc4aa3373d44703ac91298a359... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [193] 010000b500000000000000b5fefdecb0c05b1c8f9d18c6cc66480949b5492b29... max: [61] a3f5ad031d64e24c663c8669d9f436af648d1d372782aff071fbb861da56a0b1... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 0d552161862e6be821fa32a138cad545e4659ac8adce797640d1c9c96f49706c... max: [80] 123afc9c3e10e78e82954033f30af5eba1571bce41f0d1fbe2d116e89ef2cae4... max: [18] 0925104e98e2829b1c6ddf9c953e876212d0 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefd71b3beb23db2b62baddef814e8c8408b5344... max: [45] 10000021000100000000002120d16610a2a43915d71745153c16008895bb578b... max: [1] 01 max: [48] 00010000000000008a4492f18c78170c493ad688a52b771fa79cce1e1521e95c... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 000100000000000147acbce6f5368d2ced106b91204849f9d45032103b86271d... max: [87] 0001000000000002437caa2988118e64e40674aa1429414db0b3fafef3802da8... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feffd8f9f0f3234c3f0c86fc4c9a62942fd799c5... max: [45] 100000210001000000000021207c5c14fd204d717f1af653176e0cf9fb64d579... max: [1] 01 max: [64] 56a8dfa209befca6326df1d89ab671eae342b3103787ed883ab78f7daec07f08... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 69aa9556252fa58206300df5f3fbe8ea63ec7109ec513a1af7e7943b27a87ff7... max: [112] a9d5a8438053fe04933781357b4456b7fcfea2bf0c17f3a28f86e2f819fec3a1... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [193] 010000b500000000000000b5fefd98ef2f02ea0fe5288122779f6800ac8ce7b4... max: [98] 020000560000000000000056fefdc938064e052d84a6d389ecb26aa47ab026e0... max: [65] 42ce12f07bc34fb802880506c90d55351b6db099b0163a8b5c5081085a617b16... max: [80] 7d497d5ccc804b679e8a81e7bb39d5b573db70271caec06384d6b8850cdec93a... max: [80] fab883ef266031cd19d2dd774974cb54374e31bf49274cc3299b2a6a624fd112... max: [80] 4feddb7fe9bcc26fe279de52b738ac4d6845e7a8fe9af5fe05739774982866d6... max: [80] ce183d9e90cacc471fc9801893ee71ad065340f292d93abaa47a1d439a8b9b26... max: [80] 031034efcc67539b54055b7baca7d52fffca0b282a3883858461f4402c44be43... max: [80] 5c0558925c5240dd3e1f3287a02b05ead6b4ff041392be4bf5504b6c9852705b... max: [80] db2707f6755855e8cb5ed3498f79c33ef46283ccb75df8e864285df90d1e9170... max: [80] dbbbc2fdc84e4fe7642464acd64b9114ca6015f3c89d4719708c6d52c96ff714... max: [62] 122e3e9ad09d2f4619d718405be2c48ee7f23d6abdbf9f4ecf80c56b889143fd... max: [80] dcdaef341071728a07a3e6e4ad394a09c546949981525ea480ea9ca609666901... max: [80] 3e6a09506edb8dd466f6ace0d1db5b9a51897d314568923f0265e85c85df155b... max: [59] db9639ecf06de982ddfdc16c53f0ab025ecec74163db6a3c3042c1f93924dd75... max: [61] a351711c1b385bcb7a8a2fed91549f767c334a439c3d5b1595efb5f483291f12... max: [61] 735be63ba612bb21e74ed62e8a6f5fd9303b6f3d37765f008c21d67e9b538912... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] 1fa6488b29911a8d40a956a9c02b0f1736f1783cdb51ea1d685668 Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [116] 00b0bea49e89f3f4536d20b8851a80191983fc5bee0c4fcc701f813dd81f76e1... max: [45] dcce71f86d18f8b8b4da19669b468ce40089759de05f4a080f48895d6885cf9d... max: [80] 34ad7e31eb8ca90dd52bafecbd4b4fedcd19d611c023929884d2affafe1357d0... max: [80] 4010d3a8eb5d3dd650eb8060f0d13355e45edf5700169d0906d2e01b2035912c... max: [18] 298432dfadc0d0a8c4997a5aa1ac0c75847f client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefd50c78a8a7e3b8f786f466c3458b429c42453... max: [105] 0200005d000000000000005dfefdfc3b784987887bb2a58f7fadb51d55953d91... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... max: [12] 0e0000000003000000000000 max: [45] 100000210001000000000021209152b2972ae32d86ffb9e77eab6879d8ff48cc... max: [1] 01 max: [48] 00010000000000005def42363d69e92031acf1b1d1a45c7b26ef6ebd5dd469cc... max: [1] 01 max: [48] 0001000000000000d39da3ecab56d79adb6146f4d0441a0ec8056f8c09dd65f5... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [124] 0001000000000001773bbea731902d1612792660a1db745667601a2b991770fc... max: [51] 000100000000000239ce27d0a748ec8eafdb075f5a891a41be8c56450deaebfb... max: [88] 000100000000000178975a7066468036ec47ea5cee3eed376038abe6e380a95c... max: [87] 0001000000000002100da25b38ca199504487d83b6f80fe394e7b472044b10d8... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feff9ff6af1bcae8fbf1913fa5c232334da62067... max: [105] 0200005d000000000000005dfeffe9b478897fe55dc80a9dd408c165fccb1ff0... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... max: [12] 0e0000000003000000000000 max: [45] 100000210001000000000021205d244cc0b4c2eca64b61e3ed0e29224f940105... max: [1] 01 max: [64] 0bcdf91d50e069ff8c7026cee37ce440afff7c048271590cc01105a78692feb3... max: [1] 01 max: [64] bc57f06f45d3a1e4e9b6334ea44788829fc022313fd7b963e8515c8fafdf272d... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [144] 01663730a9f20dd40e5bf7abca29fe4203475b8d402c8d6d2273c73a6cb1d03f... max: [64] 5e28cbc16d3ef3c49b052eb04c45991a6781c8982ef5a5b148b52c6d585d9dab... max: [112] 21df01630c2ea1c7f9d874d97dfc371c97d77010151c3b3effd6d26507bed5d5... max: [112] 6d1e724ff3394e64562e28de21b274cc55317e9530ebc362113aac06f344fb67... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [36] 0022000a00140012001d00170018001901000101010201030104001c0002f41f... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefd4042fd2104... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] fefde1ba913fc05cb33ab2b366bdecf51f6cf80d699c6cd7a71182bd0eb62ae2... handshake new: [93] fefde1ba913fc05cb33ab2b366bdecf51f6cf80d699c6cd7a71182bd0eb62ae2... record old: [105] 0200005d000000000000005dfefde1ba913fc05cb33ab2b366bdecf51f6cf80d... record new: [105] 0200005d000000000000005dfefde1ba913fc05cb33ab2b366bdecf51f6cf80d... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefde1ba913fc0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] feff86d398cbd46979e6a77ed41db2dfa037e2cebef2954d6f11cfb70738d64c... handshake new: [93] feff86d398cbd46979e6a77ed41db2dfa037e2cebef2954d6f11cfb70738d64c... record old: [105] 0200005d000000000000005dfeff86d398cbd46979e6a77ed41db2dfa037e2ce... record new: [105] 0200005d000000000000005dfeff86d398cbd46979e6a77ed41db2dfa037e2ce... server: Filtered packet: [797] 16feff000000000000000000690200005d000000000000005dfeff86d398cbd4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [37] 0023000a00140012001d00170018001901000101010201030104001c00030100... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [49] 0800002500010000000000250023000a00140012001d00170018001901000101... server: Filtered packet: [889] 16fefd00000000000000000062020000560000000000000056fefd17528d9b15... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] fefd874e04dc7a60c972f9bdf8861d5640ddefc0853bc3944a9a7b339400181d... handshake new: [94] fefd874e04dc7a60c972f9bdf8861d5640ddefc0853bc3944a9a7b339400181d... record old: [105] 0200005d000000000000005dfefd874e04dc7a60c972f9bdf8861d5640ddefc0... record new: [106] 0200005e000000000000005efefd874e04dc7a60c972f9bdf8861d5640ddefc0... server: Filtered packet: [800] 16fefd0000000000000000006a0200005e000000000000005efefd874e04dc7a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] feff6f6f0f6c7699166f63b3d02d96559d137390b16895c5b4ef74390dc75104... handshake new: [94] feff6f6f0f6c7699166f63b3d02d96559d137390b16895c5b4ef74390dc75104... record old: [105] 0200005d000000000000005dfeff6f6f0f6c7699166f63b3d02d96559d137390... record new: [106] 0200005e000000000000005efeff6f6f0f6c7699166f63b3d02d96559d137390... server: Filtered packet: [798] 16feff0000000000000000006a0200005e000000000000005efeff6f6f0f6c76... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (11 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/0 Version: DTLS 1.3 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/0 (104 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/1 Version: DTLS 1.2 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/1 (103 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/2 Version: DTLS 1.0 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/2 (103 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 Version: DTLS 1.0 [ SKIPPED ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 (1 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/0 (54 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/1 (54 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/2 (55 ms) [----------] 219 tests from GenericDatagram/TlsConnectGeneric (1635 ms total) [----------] 16 tests from AgentTests/TlsAgentTest [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/0 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/0 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/1 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/1 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/2 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/2 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/3 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/3 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/4 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/4 (3 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/5 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/5 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/6 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/6 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/7 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/7 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 (1 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/2 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/2 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/3 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/3 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/4 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/4 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/5 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/5 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/6 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/6 (3 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/7 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/7 (2 ms) [----------] 16 tests from AgentTests/TlsAgentTest (19 ms total) [----------] 4 tests from ClientTests13/TlsAgentTestClient13 [ RUN ] ClientTests13/TlsAgentTestClient13.CannedHello/0 client: Changing state from INIT to CONNECTING Process message: [95] 160304005a0200005603039cbc149b0e2efa0df3f05c707ae0d19b3e5a446bdf... [ OK ] ClientTests13/TlsAgentTestClient13.CannedHello/0 (0 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.CannedHello/1 client: Changing state from INIT to CONNECTING Process message: [111] 16030400000000000000000062020000560000000000000056fefd9cbc149b0e... [ OK ] ClientTests13/TlsAgentTestClient13.CannedHello/1 (1 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/0 client: Changing state from INIT to CONNECTING Process message: [99] 160304005e0200005603039cbc149b0e2efa0df3f05c707ae0d19b3e5a446bdf... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/0 (0 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/1 client: Changing state from INIT to CONNECTING Process message: [123] 1603040000000000000000006e020000560000000000000056fefd9cbc149b0e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/1 (1 ms) [----------] 4 tests from ClientTests13/TlsAgentTestClient13 (2 ms total) [----------] 20 tests from Version12Plus/TlsConnectTls12Plus [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/0 Version: TLS 1.3 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/0 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/1 Version: TLS 1.2 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/1 (3 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/2 Version: DTLS 1.3 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/2 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/3 Version: DTLS 1.2 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/3 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/0 Version: TLS 1.3 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/0 (9 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/1 Version: TLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/1 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/2 Version: DTLS 1.3 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/2 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/3 Version: DTLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/3 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/0 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/1 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/2 (5 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/3 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/0 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/1 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/2 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/3 (1 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/0 Version: TLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/0 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/1 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/1 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/2 Version: DTLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/2 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/3 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/3 (1 ms) [----------] 20 tests from Version12Plus/TlsConnectTls12Plus (74 ms total) [----------] 10 tests from Pre12Stream/TlsConnectPre12 [ RUN ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/0 Version: TLS 1.0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/0 (2 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/1 Version: TLS 1.1 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/1 (2 ms) [ RUN ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (7 ms) [ RUN ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 (6 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 (4 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/1 (4 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/0 (8 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/1 (9 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 (9 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/1 (8 ms) [----------] 10 tests from Pre12Stream/TlsConnectPre12 (59 ms total) [----------] 5 tests from Pre12Datagram/TlsConnectPre12 [ RUN ] Pre12Datagram/TlsConnectPre12.ServerAuthRsaPssFails/0 Version: DTLS 1.0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Datagram/TlsConnectPre12.ServerAuthRsaPssFails/0 (2 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (6 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 (4 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ResumeWithHigherVersionTls12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ResumeWithHigherVersionTls12/0 (9 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 (8 ms) [----------] 5 tests from Pre12Datagram/TlsConnectPre12 (29 ms total) [----------] 171 tests from Pre13Stream/TlsConnectGenericPre13 [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140301000101 record drop: TLS 1.0 CCS 1000000000000:[1] 01 server: Filtered packet: [53] 16030100308b8e44dd202bae972494c08f62261a4358873b4919be8f36ca4f24... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [37] 170301002003eb0eaac3f64df33a8eb1f42c13347db75c658c3a9b077d69e3cc... server: Filtered packet: [37] 1703010020edb3ec1696eff34a40cabb3f476e770b80260ee77335ee6950b462... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140302000101 record drop: TLS 1.1 CCS 1000000000000:[1] 01 server: Filtered packet: [69] 16030200402a4ea5dae9ab0475433b829c47c95e5415fc881c25effabe0af0b1... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [53] 1703020030f65458138de690ea4490dcbe613f96a21c8f535ef74130af1ce99e... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140303000101 record drop: TLS 1.2 CCS 1000000000000:[1] 01 server: Filtered packet: [45] 160303002800000000000000003964ef85bee47f26b3202714bc310bbaa5c85a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [39] 1703030022000000000000000166dfa837b3e0d7c27451d246d80f895584fd7d... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140301000101 record drop: TLS 1.0 CCS 1000000000000:[1] 01 server: Filtered packet: [53] 160301003029c1f5146870678f72f1b5a0214110932187f124412d5d6fe2e8ee... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [37] 17030100202c42e406e9f8564c4b3938a642008a94b2ce7e57d9993336b8a5e5... server: Filtered packet: [37] 170301002066a39f9ad22239da7b21f985be812ce794bf595f0a6fec805985c4... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140302000101 record drop: TLS 1.1 CCS 1000000000000:[1] 01 server: Filtered packet: [69] 1603020040b28b8d1e3a521011d573c962fa6440302c0fbeda9408304e8dae95... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [53] 1703020030e7a661272a8cc342220552ea7be0fa1bf54d14c0e9a0d303ef60e8... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140303000101 record drop: TLS 1.2 CCS 1000000000000:[1] 01 server: Filtered packet: [45] 16030300280000000000000000177100b759030641053e9f9216ef1b88657596... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [39] 1703030022000000000000000178655142b64ba1c752d0fc65ebb91edb412f7a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 0301c273d2f8cba7484e046fd9145e7402db40c2d90f7decaf427c5d816507d6... handshake new: [98] 0301c273d2f8cba7484e046fd9145e7402db40c2d90f7decaf427c5d816507d6... record old: [731] 020000610301c273d2f8cba7484e046fd9145e7402db40c2d90f7decaf427c5d... record new: [732] 020000620301c273d2f8cba7484e046fd9145e7402db40c2d90f7decaf427c5d... server: Filtered packet: [737] 16030102dc020000620301c273d2f8cba7484e046fd9145e7402db40c2d90f7d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 030211dace00317e2fc81a3534fb2c1ac062fcd928ad1fba755bae18c9879fe8... handshake new: [98] 030211dace00317e2fc81a3534fb2c1ac062fcd928ad1fba755bae18c9879fe8... record old: [731] 02000061030211dace00317e2fc81a3534fb2c1ac062fcd928ad1fba755bae18... record new: [732] 02000062030211dace00317e2fc81a3534fb2c1ac062fcd928ad1fba755bae18... server: Filtered packet: [737] 16030202dc02000062030211dace00317e2fc81a3534fb2c1ac062fcd928ad1f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 030340fd5b4c1361fb06053fb7702bf3c3259993b2daf7efcb7ecf1e3c960815... handshake new: [98] 030340fd5b4c1361fb06053fb7702bf3c3259993b2daf7efcb7ecf1e3c960815... record old: [733] 02000061030340fd5b4c1361fb06053fb7702bf3c3259993b2daf7efcb7ecf1e... record new: [734] 02000062030340fd5b4c1361fb06053fb7702bf3c3259993b2daf7efcb7ecf1e... server: Filtered packet: [739] 16030302de02000062030340fd5b4c1361fb06053fb7702bf3c3259993b2daf7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... record old: [713] 0200005d03014db6f29c740cc16c513d8849b46461adad8967e9cec4325d84a8... record new: [713] 0200005d03014db6f29c740cc16c513d8849b46461adad8967e9cec4325d84a8... server: Filtered packet: [718] 16030102c90200005d03014db6f29c740cc16c513d8849b46461adad8967e9ce... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... record old: [713] 0200005d0302f496933655a45e0a5321c9cbc0e65bceb3a03fa5911f736b448b... record new: [713] 0200005d0302f496933655a45e0a5321c9cbc0e65bceb3a03fa5911f736b448b... server: Filtered packet: [718] 16030202c90200005d0302f496933655a45e0a5321c9cbc0e65bceb3a03fa591... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... record old: [715] 0200005d0303f81477f6e96ea20d49c32217371ebe26556acd96b9a3deae79ad... record new: [715] 0200005d0303f81477f6e96ea20d49c32217371ebe26556acd96b9a3deae79ad... server: Filtered packet: [720] 16030302cb0200005d0303f81477f6e96ea20d49c32217371ebe26556acd96b9... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703010b4b71e6e996623b37c36794b18059f4ddd0f5fb17f02d7dd6f9... record new: [1190] 0200005703010b4b71e6e996623b37c36794b18059f4ddd0f5fb17f02d7dd6f9... server: Filtered packet: [1195] 16030104a60200005703010b4b71e6e996623b37c36794b18059f4ddd0f5fb17... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302d27b308950fe02c158899db20bed0e2ed7a97d25a9f4b6c67713... record new: [1190] 020000570302d27b308950fe02c158899db20bed0e2ed7a97d25a9f4b6c67713... server: Filtered packet: [1195] 16030204a6020000570302d27b308950fe02c158899db20bed0e2ed7a97d25a9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303288fd8b957ebc95a9f875100936518945a06ce142324fc1c8ded... record new: [1192] 020000570303288fd8b957ebc95a9f875100936518945a06ce142324fc1c8ded... server: Filtered packet: [1197] 16030304a8020000570303288fd8b957ebc95a9f875100936518945a06ce1423... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030105675565e327bb4dfa03527f318833385c8873f94e785b3e96d7... record new: [1190] 02000057030105675565e327bb4dfa03527f318833385c8873f94e785b3e96d7... server: Filtered packet: [1195] 16030104a602000057030105675565e327bb4dfa03527f318833385c8873f94e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302763834eeeed56dedde9c2eaf1a99e8bd1dce600dc039c3116663... record new: [1190] 020000570302763834eeeed56dedde9c2eaf1a99e8bd1dce600dc039c3116663... server: Filtered packet: [1195] 16030204a6020000570302763834eeeed56dedde9c2eaf1a99e8bd1dce600dc0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303a0fab7e83041ec942d8a5b10d89c601ae736d0dee28aa0b1c645... record new: [1192] 020000570303a0fab7e83041ec942d8a5b10d89c601ae736d0dee28aa0b1c645... server: Filtered packet: [1197] 16030304a8020000570303a0fab7e83041ec942d8a5b10d89c601ae736d0dee2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1190] 0200005703012c70022f0dc83a56184f323e8ea285720007c794f01426932f07... record new: [1191] 0200005703012c70022f0dc83a56184f323e8ea285720007c794f01426932f07... server: Filtered packet: [1196] 16030104a70200005703012c70022f0dc83a56184f323e8ea285720007c794f0... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1190] 020000570302ea571e6f5f56f48d34469630d3edf2c4a592a4ef03c4a983f47d... record new: [1191] 020000570302ea571e6f5f56f48d34469630d3edf2c4a592a4ef03c4a983f47d... server: Filtered packet: [1196] 16030204a7020000570302ea571e6f5f56f48d34469630d3edf2c4a592a4ef03... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1192] 02000057030301b972cb3310a994d3c4a1a9872f18f526a4574b98974f6c2a3f... record new: [1193] 02000057030301b972cb3310a994d3c4a1a9872f18f526a4574b98974f6c2a3f... server: Filtered packet: [1198] 16030304a902000057030301b972cb3310a994d3c4a1a9872f18f526a4574b98... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 (3561 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/2 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1190] 0200005703010e1d90b159044a17d7c37e92d38749ed87c7c6ef04160632575c... record new: [3622] 0200005703010e1d90b159044a17d7c37e92d38749ed87c7c6ef04160632575c... server: Filtered packet: [3627] 1603010e260200005703010e1d90b159044a17d7c37e92d38749ed87c7c6ef04... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1190] 0200005703020ae1555e6602d8f493631376bf564b963c8539dc3a3c21728f16... record new: [3622] 0200005703020ae1555e6602d8f493631376bf564b963c8539dc3a3c21728f16... server: Filtered packet: [3627] 1603020e260200005703020ae1555e6602d8f493631376bf564b963c8539dc3a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1192] 020000570303f08653ad77984c84a2e1ebe4b63e6b0b6335246b752f741ef959... record new: [3622] 020000570303f08653ad77984c84a2e1ebe4b63e6b0b6335246b752f741ef959... server: Filtered packet: [3627] 1603030e26020000570303f08653ad77984c84a2e1ebe4b63e6b0b6335246b75... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 (15 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 Version: TLS 1.0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1739] 0200005d0301a26ca3e36db7e55d60cee1d9427376ca59744f5b8b954faf2647... record new: [1737] 0200005d0301a26ca3e36db7e55d60cee1d9427376ca59744f5b8b954faf2647... server: Filtered packet: [1742] 16030106c90200005d0301a26ca3e36db7e55d60cee1d9427376ca59744f5b8b... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 Version: TLS 1.1 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [584] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1738] 0200005d0302ecfcab1c6a54e9f6e83d5e172fbf533276b2f3c92b0d3fb2550c... record new: [1737] 0200005d0302ecfcab1c6a54e9f6e83d5e172fbf533276b2f3c92b0d3fb2550c... server: Filtered packet: [1742] 16030206c90200005d0302ecfcab1c6a54e9f6e83d5e172fbf533276b2f3c92b... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/2 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [586] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1740] 0200005d0303d7db62d320b052bc47b695f9d98b069929c7c84429a8327b6030... record new: [1739] 0200005d0303d7db62d320b052bc47b695f9d98b069929c7c84429a8327b6030... server: Filtered packet: [1744] 16030306cb0200005d0303d7db62d320b052bc47b695f9d98b069929c7c84429... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 Version: TLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 Version: TLS 1.1 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 Version: TLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 Version: TLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 Version: TLS 1.1 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 Version: TLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/0 (13 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/1 (13 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/2 (13 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/2 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 0301f22f3b8b85b2cec00469563094c9242552055e2829116448fd38b75e43b2... handshake new: [103] 0301f22f3b8b85b2cec00469563094c9242552055e2829116448fd38b75e43b2... record old: [121] 010000750301f22f3b8b85b2cec00469563094c9242552055e2829116448fd38... record new: [107] 010000670301f22f3b8b85b2cec00469563094c9242552055e2829116448fd38... client: Filtered packet: [112] 160301006b010000670301f22f3b8b85b2cec00469563094c9242552055e2829... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 0302480e060c2d7aecdc363d1b082ed6ba34999b03bbc8bd66fedb4e1ffdc42b... handshake new: [103] 0302480e060c2d7aecdc363d1b082ed6ba34999b03bbc8bd66fedb4e1ffdc42b... record old: [121] 010000750302480e060c2d7aecdc363d1b082ed6ba34999b03bbc8bd66fedb4e... record new: [107] 010000670302480e060c2d7aecdc363d1b082ed6ba34999b03bbc8bd66fedb4e... client: Filtered packet: [112] 160301006b010000670302480e060c2d7aecdc363d1b082ed6ba34999b03bbc8... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [187] 030340746ca4425d0566189506e85d943da9015dd5933ca0ddac8195a6c9df50... handshake new: [173] 030340746ca4425d0566189506e85d943da9015dd5933ca0ddac8195a6c9df50... record old: [191] 010000bb030340746ca4425d0566189506e85d943da9015dd5933ca0ddac8195... record new: [177] 010000ad030340746ca4425d0566189506e85d943da9015dd5933ca0ddac8195... client: Filtered packet: [182] 16030100b1010000ad030340746ca4425d0566189506e85d943da9015dd5933c... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [4] 03001d00 record old: [713] 0200005d0301d7e984b52b021c583461db00b54af52351619deb8446fdf495c0... record new: [551] 0200005d0301d7e984b52b021c583461db00b54af52351619deb8446fdf495c0... server: Filtered packet: [556] 16030102270200005d0301d7e984b52b021c583461db00b54af52351619deb84... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [4] 03001d00 record old: [713] 0200005d0302f9f0a04ab0c292d052314d0f246f2b61fd54218d0c8045cd438e... record new: [551] 0200005d0302f9f0a04ab0c292d052314d0f246f2b61fd54218d0c8045cd438e... server: Filtered packet: [556] 16030202270200005d0302f9f0a04ab0c292d052314d0f246f2b61fd54218d0c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [4] 03001d00 record old: [715] 0200005d030399e8369a02de0f1a397e4f422cde55ef53f0c2a7b94ef50fe1a7... record new: [551] 0200005d030399e8369a02de0f1a397e4f422cde55ef53f0c2a7b94ef50fe1a7... server: Filtered packet: [556] 16030302270200005d030399e8369a02de0f1a397e4f422cde55ef53f0c2a7b9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 20b392c37ec7255b0bc25b256d4cb90c316f0b1528c6fa06b4fee0ca673856d1... handshake new: [1] 00 record old: [37] 1000002120b392c37ec7255b0bc25b256d4cb90c316f0b1528c6fa06b4fee0ca... record new: [5] 1000000100 client: Filtered packet: [69] 1603010005100000010014030100010116030100307cb7dacffa8dfb2a71d20e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 200a5fa7936b319acb27713eb35668fe8d51eb56f9e3a3e3851b3d8dec3a9e82... handshake new: [1] 00 record old: [37] 10000021200a5fa7936b319acb27713eb35668fe8d51eb56f9e3a3e3851b3d8d... record new: [5] 1000000100 client: Filtered packet: [85] 16030200051000000100140302000101160302004036ad602bf9d85cb9f9fa7a... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 208a7e6fd38043e2c5bd757897f329736798705fa9b95bf0785fbb193784380a... handshake new: [1] 00 record old: [37] 10000021208a7e6fd38043e2c5bd757897f329736798705fa9b95bf0785fbb19... record new: [5] 1000000100 client: Filtered packet: [61] 16030300051000000100140303000101160303002800000000000000009e036e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0100010102 record old: [713] 0200005d0301258ba53429dd420ba2a16f84ab14bfaf37173a97aa025e83d492... record new: [552] 0200005d0301258ba53429dd420ba2a16f84ab14bfaf37173a97aa025e83d492... server: Filtered packet: [557] 16030102280200005d0301258ba53429dd420ba2a16f84ab14bfaf37173a97aa... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0100010102 record old: [713] 0200005d03027197369deb4ca63964b7be4c0e6e04e5f8d7aba2b69942574890... record new: [552] 0200005d03027197369deb4ca63964b7be4c0e6e04e5f8d7aba2b69942574890... server: Filtered packet: [557] 16030202280200005d03027197369deb4ca63964b7be4c0e6e04e5f8d7aba2b6... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0100010102 record old: [715] 0200005d03034f404647988ffad990eb20a2ed5a138368d6c7dda73fd82eb857... record new: [552] 0200005d03034f404647988ffad990eb20a2ed5a138368d6c7dda73fd82eb857... server: Filtered packet: [557] 16030302280200005d03034f404647988ffad990eb20a2ed5a138368d6c7dda7... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0301000102 record old: [713] 0200005d03014b311ddc35c1c805e087da6717e0cafd00ee8735a5f50f17e6b0... record new: [552] 0200005d03014b311ddc35c1c805e087da6717e0cafd00ee8735a5f50f17e6b0... server: Filtered packet: [557] 16030102280200005d03014b311ddc35c1c805e087da6717e0cafd00ee8735a5... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0301000102 record old: [713] 0200005d03025dcf27004393ed53fcd0a9e1f8f020e358ad82d72a16a95517c2... record new: [552] 0200005d03025dcf27004393ed53fcd0a9e1f8f020e358ad82d72a16a95517c2... server: Filtered packet: [557] 16030202280200005d03025dcf27004393ed53fcd0a9e1f8f020e358ad82d72a... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0301000102 record old: [715] 0200005d03030bd014f62ccefb35d48e5c6b39689d7614283bc9302a58694835... record new: [552] 0200005d03030bd014f62ccefb35d48e5c6b39689d7614283bc9302a58694835... server: Filtered packet: [557] 16030302280200005d03030bd014f62ccefb35d48e5c6b39689d7614283bc930... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0300170102 record old: [713] 0200005d030185c2e7f3ffb931efc9b18cf7c646a4ef83c04b38d4d3952ae6dc... record new: [552] 0200005d030185c2e7f3ffb931efc9b18cf7c646a4ef83c04b38d4d3952ae6dc... server: Filtered packet: [557] 16030102280200005d030185c2e7f3ffb931efc9b18cf7c646a4ef83c04b38d4... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0300170102 record old: [713] 0200005d030226c0d08ac3ef2c98364c30f192fdd3f96a354dabe381957c342e... record new: [552] 0200005d030226c0d08ac3ef2c98364c30f192fdd3f96a354dabe381957c342e... server: Filtered packet: [557] 16030202280200005d030226c0d08ac3ef2c98364c30f192fdd3f96a354dabe3... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0300170102 record old: [715] 0200005d0303a7cfc3664da5c1b3e32220ddbd46a6eac3031a7979e487216fd9... record new: [552] 0200005d0303a7cfc3664da5c1b3e32220ddbd46a6eac3031a7979e487216fd9... server: Filtered packet: [557] 16030302280200005d0303a7cfc3664da5c1b3e32220ddbd46a6eac3031a7979... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0301cc81c8f229d9151dea1b3d1c9dfeb32835bb74f7276d70b92750e76359a5... handshake new: [92] 0301cc81c8f229d9151dea1b3d1c9dfeb32835bb74f7276d70b92750e76359a5... record old: [713] 0200005d0301cc81c8f229d9151dea1b3d1c9dfeb32835bb74f7276d70b92750... record new: [712] 0200005c0301cc81c8f229d9151dea1b3d1c9dfeb32835bb74f7276d70b92750... server: Filtered packet: [717] 16030102c80200005c0301cc81c8f229d9151dea1b3d1c9dfeb32835bb74f727... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03026b04a6b3290ab46e656d62087f8767cd914be5584c751fb8bcb79516bc1c... handshake new: [92] 03026b04a6b3290ab46e656d62087f8767cd914be5584c751fb8bcb79516bc1c... record old: [713] 0200005d03026b04a6b3290ab46e656d62087f8767cd914be5584c751fb8bcb7... record new: [712] 0200005c03026b04a6b3290ab46e656d62087f8767cd914be5584c751fb8bcb7... server: Filtered packet: [717] 16030202c80200005c03026b04a6b3290ab46e656d62087f8767cd914be5584c... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0303a0aff83815afcd7f1a4b52229962ee9853add9d91b2d98c174ac4e1825b4... handshake new: [92] 0303a0aff83815afcd7f1a4b52229962ee9853add9d91b2d98c174ac4e1825b4... record old: [715] 0200005d0303a0aff83815afcd7f1a4b52229962ee9853add9d91b2d98c174ac... record new: [714] 0200005c0303a0aff83815afcd7f1a4b52229962ee9853add9d91b2d98c174ac... server: Filtered packet: [719] 16030302ca0200005c0303a0aff83815afcd7f1a4b52229962ee9853add9d91b... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [117] 0301b92e3522da194ef1168e937ab0dba1b0f27d2260dbf7961896bca94b4e37... handshake new: [117] 0301b92e3522da194ef1168e937ab0dba1b0f27d2260dbf7961896bca94b4e37... record old: [121] 010000750301b92e3522da194ef1168e937ab0dba1b0f27d2260dbf7961896bc... record new: [121] 010000750301b92e3522da194ef1168e937ab0dba1b0f27d2260dbf7961896bc... client: Filtered packet: [126] 1603010079010000750301b92e3522da194ef1168e937ab0dba1b0f27d2260db... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [117] 03022c69d5fac403a85350bb34af8c1f76b00ed83f30a211049f478724b04d6b... handshake new: [117] 03022c69d5fac403a85350bb34af8c1f76b00ed83f30a211049f478724b04d6b... record old: [121] 0100007503022c69d5fac403a85350bb34af8c1f76b00ed83f30a211049f4787... record new: [121] 0100007503022c69d5fac403a85350bb34af8c1f76b00ed83f30a211049f4787... client: Filtered packet: [126] 16030100790100007503022c69d5fac403a85350bb34af8c1f76b00ed83f30a2... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [187] 03033c88f35f47bd905c6692396c4a7088a01a11b966ef61c4294822b287bead... handshake new: [187] 03033c88f35f47bd905c6692396c4a7088a01a11b966ef61c4294822b287bead... record old: [191] 010000bb03033c88f35f47bd905c6692396c4a7088a01a11b966ef61c4294822... record new: [191] 010000bb03033c88f35f47bd905c6692396c4a7088a01a11b966ef61c4294822... client: Filtered packet: [196] 16030100bf010000bb03033c88f35f47bd905c6692396c4a7088a01a11b966ef... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 Version: TLS 1.0 [ SKIPPED ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 (0 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03029dd95b23488c67614b3a31d4aff6bad36a212954645bb72f17e4e18da706... handshake new: [89] 03019dd95b23488c67614b3a31d4aff6bad36a212954645bb72f17e4e18da706... record old: [93] 0200005903029dd95b23488c67614b3a31d4aff6bad36a212954645bb72f17e4... record new: [93] 0200005903019dd95b23488c67614b3a31d4aff6bad36a212954645bb72f17e4... server: Filtered packet: [173] 160302005d0200005903019dd95b23488c67614b3a31d4aff6bad36a21295464... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 0303819371c21ff53990719d29170be3552e8b4ecf874c022ebeb0bc60de1b70... handshake new: [89] 0302819371c21ff53990719d29170be3552e8b4ecf874c022ebeb0bc60de1b70... record old: [93] 020000590303819371c21ff53990719d29170be3552e8b4ecf874c022ebeb0bc... record new: [93] 020000590302819371c21ff53990719d29170be3552e8b4ecf874c022ebeb0bc... server: Filtered packet: [173] 160303005d020000590302819371c21ff53990719d29170be3552e8b4ecf874c... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 020000570301aa6a7b645bfd39a005f028e4d104eeb3c2f0509f4afd15f8aded... record new: [2510] 020000570301aa6a7b645bfd39a005f028e4d104eeb3c2f0509f4afd15f8aded... server: Filtered packet: [2515] 16030109ce020000570301aa6a7b645bfd39a005f028e4d104eeb3c2f0509f4a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 020000570302a84d9377144f170bc454692566fb1de51d32471c5783cf1b13f4... record new: [2510] 020000570302a84d9377144f170bc454692566fb1de51d32471c5783cf1b13f4... server: Filtered packet: [2515] 16030209ce020000570302a84d9377144f170bc454692566fb1de51d32471c57... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 0200005703030f9cb9a0b1a1b802cb70aa68a1e82a24f1b630632b58d95e6e7a... record new: [2510] 0200005703030f9cb9a0b1a1b802cb70aa68a1e82a24f1b630632b58d95e6e7a... server: Filtered packet: [2515] 16030309ce0200005703030f9cb9a0b1a1b802cb70aa68a1e82a24f1b630632b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/2 (2 ms) [----------] 171 tests from Pre13Stream/TlsConnectGenericPre13 (4428 ms total) [----------] 114 tests from Pre13Datagram/TlsConnectGenericPre13 [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [14] 14feff0000000000000004000101 record drop: DTLS 1.0 CCS 4:[1] 01 server: Filtered packet: [77] 16feff000100000000000000405ea762cf04fc5765bde63e54d5548d7da7cb1b... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [14] 14fefd0000000000000004000101 record drop: DTLS 1.2 CCS 4:[1] 01 server: Filtered packet: [61] 16fefd000100000000000000300001000000000000638a73df830942217e68c7... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [14] 14feff0000000000000004000101 record drop: DTLS 1.0 CCS 4:[1] 01 server: Filtered packet: [77] 16feff0001000000000000004054dab0fa538913425898b8a391ecd9c54c2270... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [14] 14fefd0000000000000004000101 record drop: DTLS 1.2 CCS 4:[1] 01 server: Filtered packet: [61] 16fefd0001000000000000003000010000000000009825ffd696ea2237784120... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] feff2a0f9d7d8ec37eb64d402f09e0f883b0da3c9d06dae8b0d6a55a1b8ed844... handshake new: [98] feff2a0f9d7d8ec37eb64d402f09e0f883b0da3c9d06dae8b0d6a55a1b8ed844... record old: [109] 020000610000000000000061feff2a0f9d7d8ec37eb64d402f09e0f883b0da3c... record new: [110] 020000620000000000000062feff2a0f9d7d8ec37eb64d402f09e0f883b0da3c... server: Filtered packet: [837] 16feff0000000000000000006e020000620000000000000062feff2a0f9d7d8e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] fefddae94981952b3bf3811da9f86efd39e6eda53d5a4d7fb8f3575cdf06e574... handshake new: [98] fefddae94981952b3bf3811da9f86efd39e6eda53d5a4d7fb8f3575cdf06e574... record old: [109] 020000610000000000000061fefddae94981952b3bf3811da9f86efd39e6eda5... record new: [110] 020000620000000000000062fefddae94981952b3bf3811da9f86efd39e6eda5... server: Filtered packet: [839] 16fefd0000000000000000006e020000620000000000000062fefddae9498195... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... record old: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... server: Filtered packet: [797] 16feff000000000000000000690200005d000000000000005dfeff1e0556a35f... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefd01f9ef40e7... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffb6ffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff776b20b0d9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffb6ffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd4fb3d82d4f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff198d02f721... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdc6720ff810... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a010100ffffffffffffffffadf85458a2bb4a9aaf... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff27cdd5f846... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c010100ffffffffffffffffadf85458a2bb4a9aaf... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd44b57aee39... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 (15 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [3093] 0c000c090002000000000c090401800000000000000000000000000000000000... server: Filtered packet: [3706] 16feff00000000000000000063020000570000000000000057feff60bd8f8634... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [3093] 0c000c090002000000000c090401800000000000000000000000000000000000... server: Filtered packet: [3706] 16fefd00000000000000000063020000570000000000000057fefd6a93a93c02... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 Version: DTLS 1.0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 2:[207] 0c00024700020000000000c30100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1188] 16feff000000000000000000690200005d000000000000005dfeff7a545679c4... handshake old: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [400] 0c00024700020000c300018472fe9ce98583ff8e4f1232eef28183c3fe3b1b4c... record new: [595] 0c00024700020000000002470100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [633] 16feff000000000000000202530c00024700020000000002470100ffffffffff... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 2:[207] 0c00024900020000000000c30100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1188] 16fefd000000000000000000690200005d000000000000005dfefd74a22ae039... handshake old: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [402] 0c00024900020000c300018672fe9ce98583ff8e4f1232eef28183c3fe3b1b4c... record new: [597] 0c00024900020000000002490100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [635] 16fefd000000000000000202550c00024900020000000002490100ffffffffff... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 Version: DTLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 Version: DTLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 Version: DTLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 Version: DTLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/0 (13 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/1 (13 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 (15 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [114] feff347493da5baba8aaf35205820354356a7789931b2b32e60e441da6d359e1... handshake new: [100] feff347493da5baba8aaf35205820354356a7789931b2b32e60e441da6d359e1... record old: [126] 010000720000000000000072feff347493da5baba8aaf35205820354356a7789... record new: [112] 010000640000000000000064feff347493da5baba8aaf35205820354356a7789... client: Filtered packet: [125] 16feff00000000000000000070010000640000000000000064feff347493da5b... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [184] fefd6b290c456cb7197c0c3cb7a179c56ae7fdfd9e5def33df667c549b199489... handshake new: [170] fefd6b290c456cb7197c0c3cb7a179c56ae7fdfd9e5def33df667c549b199489... record old: [196] 010000b800000000000000b8fefd6b290c456cb7197c0c3cb7a179c56ae7fdfd... record new: [182] 010000aa00000000000000aafefd6b290c456cb7197c0c3cb7a179c56ae7fdfd... client: Filtered packet: [195] 16feff000000000000000000b6010000aa00000000000000aafefd6b290c456c... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [4] 03001d00 record old: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [16] 0c000004000200000000000403001d00 server: Filtered packet: [635] 16feff000000000000000000690200005d000000000000005dfeffe90fc1343f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [4] 03001d00 record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [16] 0c000004000200000000000403001d00 server: Filtered packet: [635] 16fefd000000000000000000690200005d000000000000005dfefda71d83ba86... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 2082a64ea2b6806a15216024b414d7e5bd990e36daec62480e53f8477eeced50... handshake new: [1] 00 record old: [45] 1000002100010000000000212082a64ea2b6806a15216024b414d7e5bd990e36... record new: [13] 10000001000100000000000100 client: Filtered packet: [117] 16feff0000000000000001000d1000000100010000000000010014feff000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 20617ac7b042b27f369c1750d48762bc0cf04a065aee76b4ca77aea301922874... handshake new: [1] 00 record old: [45] 10000021000100000000002120617ac7b042b27f369c1750d48762bc0cf04a06... record new: [13] 10000001000100000000000100 client: Filtered packet: [101] 16fefd0000000000000001000d1000000100010000000000010014fefd000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0100010102 record old: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [17] 0c00000500020000000000050100010102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff5a093cc2b2... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0100010102 record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [17] 0c00000500020000000000050100010102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefddc51c021f1... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0301000102 record old: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [17] 0c00000500020000000000050301000102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff7015a57a2e... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0301000102 record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [17] 0c00000500020000000000050301000102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefd40c99e4fec... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0300170102 record old: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [17] 0c00000500020000000000050300170102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff6c2037cbdb... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [5] 0300170102 record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [17] 0c00000500020000000000050300170102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefd49d270595c... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] feffb75116a5bf27a96de2cba70f23615f9f522814a0e7e488ee7a77fbc6a5d0... handshake new: [92] feffb75116a5bf27a96de2cba70f23615f9f522814a0e7e488ee7a77fbc6a5d0... record old: [105] 0200005d000000000000005dfeffb75116a5bf27a96de2cba70f23615f9f5228... record new: [104] 0200005c000000000000005cfeffb75116a5bf27a96de2cba70f23615f9f5228... server: Filtered packet: [796] 16feff000000000000000000680200005c000000000000005cfeffb75116a5bf... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] fefdcfa41a1cc17222fe767a82c1a35bae9e903fea48580c05ef2b914aba9a3b... handshake new: [92] fefdcfa41a1cc17222fe767a82c1a35bae9e903fea48580c05ef2b914aba9a3b... record old: [105] 0200005d000000000000005dfefdcfa41a1cc17222fe767a82c1a35bae9e903f... record new: [104] 0200005c000000000000005cfefdcfa41a1cc17222fe767a82c1a35bae9e903f... server: Filtered packet: [798] 16fefd000000000000000000680200005c000000000000005cfefdcfa41a1cc1... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [114] feffa34966528b312a7e0d310eebf4ace46db1ee79975d317f21524799ec3dc4... handshake new: [114] feffa34966528b312a7e0d310eebf4ace46db1ee79975d317f21524799ec3dc4... record old: [126] 010000720000000000000072feffa34966528b312a7e0d310eebf4ace46db1ee... record new: [126] 010000720000000000000072feffa34966528b312a7e0d310eebf4ace46db1ee... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feffa34966528b... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [184] fefde1ac59ab6db6e983418b414ea5edddd7934906b4de9c9f5c219f89f2eab3... handshake new: [184] fefde1ac59ab6db6e983418b414ea5edddd7934906b4de9c9f5c219f89f2eab3... record old: [196] 010000b800000000000000b8fefde1ac59ab6db6e983418b414ea5edddd79349... record new: [196] 010000b800000000000000b8fefde1ac59ab6db6e983418b414ea5edddd79349... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefde1ac59ab6d... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 Version: DTLS 1.0 [ SKIPPED ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 (0 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] fefdb5fa16b12f2b8d3a4481c8fa2e4ee3397d480d44494d59dcd4e875a14238... handshake new: [89] feffb5fa16b12f2b8d3a4481c8fa2e4ee3397d480d44494d59dcd4e875a14238... record old: [101] 020000590000000000000059fefdb5fa16b12f2b8d3a4481c8fa2e4ee3397d48... record new: [101] 020000590000000000000059feffb5fa16b12f2b8d3a4481c8fa2e4ee3397d48... server: Filtered packet: [205] 16fefd00000000000000000065020000590000000000000059feffb5fa16b12f... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [2423] 0b00096b000100000000096b0009680009653082096130820548a00302010202... server: Filtered packet: [2573] 16feff00000000000000000063020000570000000000000057feffd51ed8f633... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [2423] 0b00096b000100000000096b0009680009653082096130820548a00302010202... server: Filtered packet: [2573] 16fefd00000000000000000063020000570000000000000057fefd0ed5dea66c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 (2 ms) [----------] 114 tests from Pre13Datagram/TlsConnectGenericPre13 (585 ms total) [----------] 40 tests from Version12Only/TlsConnectTls12 [ RUN ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/0 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/0 Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/0 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/1 Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/1 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/0 Version: TLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080900808ae4f88c1ceb1c6099bc563cad6a418d0c85fafaeea93ffc13616541... handshake new: [132] 080400808ae4f88c1ceb1c6099bc563cad6a418d0c85fafaeea93ffc13616541... record old: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... record new: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... client: Filtered packet: [835] 160303030b0b00025a0002570002543082025030820185a00302010202010630... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/1 Version: DTLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0809008065890ab1792dc739e476f0a5d631b740a61ed101d6000cf7617135b2... handshake new: [132] 0804008065890ab1792dc739e476f0a5d631b740a61ed101d6000cf7617135b2... record old: [144] 0f00008400030000000000840809008065890ab1792dc739e476f0a5d631b740... record new: [144] 0f00008400030000000000840804008065890ab1792dc739e476f0a5d631b740... client: Filtered packet: [917] 16fefd000000000000000102660b00025a000100000000025a00025700025430... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/0 Version: TLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400809e99587b098550e7fa610fd7f2e7816cc29ae96442e857e7bc90034c... handshake new: [132] 080900809e99587b098550e7fa610fd7f2e7816cc29ae96442e857e7bc90034c... record old: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... record new: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... client: Filtered packet: [671] 16030302670b0001b60001b30001b0308201ac30820115a00302010202010230... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/1 Version: DTLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400803bf0a61903da31d2a50c5c3484bbe1901347b1f17f657a7188d98d3b... handshake new: [132] 080900803bf0a61903da31d2a50c5c3484bbe1901347b1f17f657a7188d98d3b... record old: [144] 0f0000840003000000000084080400803bf0a61903da31d2a50c5c3484bbe190... record new: [144] 0f0000840003000000000084080900803bf0a61903da31d2a50c5c3484bbe190... client: Filtered packet: [753] 16fefd000000000000000101c20b0001b600010000000001b60001b30001b030... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [757] 0200005d0303f2ea7bb2357416d6cccf7ecb14ae7d1612a66c72d3cf6a1eff92... record new: [727] 0200005d0303f2ea7bb2357416d6cccf7ecb14ae7d1612a66c72d3cf6a1eff92... server: Filtered packet: [732] 16030302d70200005d0303f2ea7bb2357416d6cccf7ecb14ae7d1612a66c72d3... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [20] 0d00000800030000000000080301400200000000 server: Filtered packet: [832] 16fefd000000000000000000690200005d000000000000005dfefdda211160d7... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/1 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [32] 001e040305030603020308040805080604010501060102010402050206020202 handshake old: [187] 0303e346a2e349011464f88d4e10773e47412ebcac6cd0f9f32f417b2be5756b... handshake new: [151] 0303e346a2e349011464f88d4e10773e47412ebcac6cd0f9f32f417b2be5756b... record old: [191] 010000bb0303e346a2e349011464f88d4e10773e47412ebcac6cd0f9f32f417b... record new: [155] 010000970303e346a2e349011464f88d4e10773e47412ebcac6cd0f9f32f417b... client: Filtered packet: [160] 160301009b010000970303e346a2e349011464f88d4e10773e47412ebcac6cd0... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [32] 001e040305030603020308040805080604010501060102010402050206020202 handshake old: [184] fefda3dc706cffbc10e42f6249199bf9a2e6eca62385e93ebbadb71370caf4be... handshake new: [148] fefda3dc706cffbc10e42f6249199bf9a2e6eca62385e93ebbadb71370caf4be... record old: [196] 010000b800000000000000b8fefda3dc706cffbc10e42f6249199bf9a2e6eca6... record new: [160] 010000940000000000000094fefda3dc706cffbc10e42f6249199bf9a2e6eca6... client: Filtered packet: [173] 16feff000000000000000000a0010000940000000000000094fefda3dc706cff... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/0 (2 ms) [ RUN ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/1 (2 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303c1ae7b63fe2bb40e6bbbe0ed2552d238bf85a291a3a37536c4fd... record new: [1192] 020000570303c1ae7b63fe2bb40e6bbbe0ed2552d238bf85a291a3a37536c4fd... server: Filtered packet: [1197] 16030304a8020000570303c1ae7b63fe2bb40e6bbbe0ed2552d238bf85a291a3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdd9615fc52c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/0 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/1 (8 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/0 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/1 (9 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectEcdheP384/0 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectEcdheP384/0 (22 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectEcdheP384/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectEcdheP384/1 (22 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... record old: [715] 0200005d03031375bcb0f4c07846cd5c6468f54188f8cfff201b822735af3eac... record new: [715] 0200005d03031375bcb0f4c07846cd5c6468f54188f8cfff201b822735af3eac... server: Filtered packet: [720] 16030302cb0200005d03031375bcb0f4c07846cd5c6468f54188f8cfff201b82... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefd0a354fc37a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... record old: [715] 0200005d030368a8bc20ca114510c157757d8f73a0802315a2f1d70a0e250eca... record new: [715] 0200005d030368a8bc20ca114510c157757d8f73a0802315a2f1d70a0e250eca... server: Filtered packet: [720] 16030302cb0200005d030368a8bc20ca114510c157757d8f73a0802315a2f1d7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... handshake new: [168] 03001d20c81a800d1882d1fdb78bf3e6bb47343c0fd2ff55620b9029355b784b... record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefd66435d6a60... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/1 (4 ms) [----------] 40 tests from Version12Only/TlsConnectTls12 (219 ms total) [----------] 30 tests from SignatureSchemeRsa/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/4 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/5 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/6 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/7 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/8 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/9 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/4 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/5 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/6 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/7 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/8 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/9 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/4 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/5 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/6 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/7 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/8 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/9 (3 ms) [----------] 30 tests from SignatureSchemeRsa/TlsSignatureSchemeConfiguration (106 ms total) [----------] 12 tests from SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (4 ms) [----------] 12 tests from SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration (48 ms total) [----------] 12 tests from SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (7 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (5 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (7 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (5 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (7 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (6 ms) [----------] 12 tests from SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration (73 ms total) [----------] 6 tests from SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (3 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (4 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (3 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (4 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (3 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (4 ms) [----------] 6 tests from SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration (21 ms total) [----------] 12 tests from SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (5 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (6 ms) [----------] 12 tests from SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration (62 ms total) [----------] 12 tests from SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (7 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (12 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (7 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (12 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (7 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (12 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (7 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (12 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (13 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (13 ms) [----------] 12 tests from SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration (114 ms total) [----------] 12 tests from SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (9 ms) [----------] 12 tests from SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration (87 ms total) [----------] 12 tests from SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (12 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (12 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (7 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (12 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (13 ms) [----------] 12 tests from SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration (113 ms total) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 (5 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 (13 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 (5 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 (13 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 (13 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 (5 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 (3 ms) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest (406 ms total) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 (8 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 (8 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 (10 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 (4 ms) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (265 ms total) [----------] 72 tests from CipherSuiteAEAD/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/12 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/13 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/14 (12 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/15 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/16 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/17 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/12 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/13 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/14 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/15 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/16 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/17 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/12 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/13 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/14 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/15 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/16 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/17 (8 ms) [----------] 72 tests from CipherSuiteAEAD/TlsCipherSuiteTest (478 ms total) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 (12 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 (1 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 (11 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 (12 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 (1 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 (9 ms) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest (404 ms total) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 (3 ms) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (1444 ms total) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 (4 ms) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (725 ms total) [----------] 3520 tests from CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/0 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/2 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/3 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/4 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/5 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/6 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/7 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/8 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/9 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/10 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/11 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/12 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/13 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/14 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/15 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/16 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/17 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/18 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/19 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/20 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/21 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/22 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/23 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/24 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/25 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/26 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/27 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/28 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/29 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/30 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/31 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/32 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/33 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/34 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/35 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/36 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/37 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/38 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/39 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/40 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/41 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/42 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/43 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/44 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/45 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/46 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/47 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/48 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/49 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/50 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/51 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/52 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/53 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/54 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/55 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/56 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/57 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/58 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/59 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/60 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/61 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/62 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/63 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/64 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/65 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/66 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/67 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/68 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/69 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/70 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/71 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/72 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/73 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/74 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/75 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/76 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/77 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/78 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/79 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/80 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/81 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/82 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/83 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/84 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/85 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/86 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/87 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/88 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/89 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/90 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/91 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/92 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/93 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/94 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/95 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/96 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/97 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/98 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/99 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/100 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/101 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/102 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/103 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/104 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/105 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/106 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/107 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/108 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/109 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/111 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/112 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/113 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/114 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/115 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/116 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/117 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/118 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/119 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/120 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/121 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/122 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/123 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/124 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/125 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/126 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/127 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/128 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/129 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/130 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/131 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/132 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/133 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/134 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/135 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/136 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/137 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/138 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/139 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/140 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/141 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/142 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/143 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/144 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/145 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/146 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/147 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/148 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/149 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/150 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/151 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/152 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/153 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/154 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/155 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/156 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/157 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/158 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/159 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/160 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/161 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/162 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/163 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/164 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/165 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/166 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/167 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/168 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/169 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/170 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/171 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/172 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/173 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/174 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/175 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/176 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/177 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/178 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/179 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/180 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/181 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/182 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/183 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/184 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/185 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/186 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/187 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/188 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/189 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/190 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/191 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/192 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/193 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/194 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/195 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/196 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/197 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/198 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/199 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/200 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/201 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/202 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/203 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/204 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/205 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/206 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/207 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/208 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/209 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/210 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/211 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/212 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/213 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/214 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/215 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/216 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/217 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/218 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/219 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/220 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/221 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/222 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/223 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/224 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/225 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/226 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/227 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/228 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/229 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/230 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/231 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/232 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/233 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/234 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/235 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/236 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/237 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/238 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/239 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/240 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/241 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/242 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/243 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/244 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/245 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/246 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/247 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/248 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/249 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/250 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/251 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/252 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/253 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/254 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/255 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/256 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/257 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/258 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/259 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/260 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/261 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/262 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/263 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/264 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/265 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/266 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/267 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/268 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/269 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/270 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/271 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/272 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/273 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/274 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/275 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/276 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/277 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/278 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/279 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/280 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/281 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/282 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/283 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/284 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/285 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/286 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/287 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/288 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/289 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/290 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/291 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/292 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/293 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/294 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/295 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/296 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/297 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/298 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/299 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/300 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/301 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/302 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/303 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/304 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/305 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/306 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/307 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/308 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/309 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/310 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/311 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/312 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/313 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/314 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/315 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/316 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/317 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/318 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/319 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/320 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/321 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/322 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/323 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/324 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/325 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/326 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/327 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/328 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/329 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/330 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/331 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/332 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/333 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/334 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/335 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/336 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/337 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/338 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/339 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/340 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/341 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/342 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/343 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/344 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/345 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/346 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/347 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/348 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/349 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/350 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/351 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/352 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/353 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/354 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/355 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/356 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/357 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/358 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/359 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/360 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/361 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/362 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/363 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/364 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/365 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/366 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/367 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/368 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/369 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/370 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/371 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/372 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/373 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/374 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/375 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/376 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/377 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/378 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/379 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/380 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/381 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/382 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/383 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/384 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/385 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/386 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/387 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/388 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/389 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/390 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/391 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/392 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/393 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/394 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/395 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/396 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/397 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/398 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/399 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/400 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/401 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/402 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/403 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/404 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/405 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/406 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/407 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/408 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/409 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/410 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/411 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/412 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/413 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/414 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/415 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/416 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/417 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/418 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/419 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/420 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/421 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/422 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/423 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/424 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/425 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/426 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/427 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/428 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/429 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/430 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/431 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/432 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/433 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/434 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/435 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/436 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/437 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/438 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/439 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/440 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/441 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/442 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/443 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/444 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/445 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/446 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/447 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/448 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/449 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/450 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/451 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/452 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/453 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/454 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/455 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/456 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/457 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/458 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/459 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/460 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/461 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/462 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/463 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/464 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/465 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/466 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/467 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/468 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/469 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/470 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/471 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/472 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/473 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/474 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/475 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/476 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/477 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/478 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/479 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/480 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/481 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/482 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/483 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/484 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/485 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/486 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/487 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/488 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/489 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/490 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/491 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/492 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/493 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/494 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/495 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/496 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/497 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/498 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/499 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/500 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/501 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/502 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/503 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/504 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/505 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/506 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/507 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/508 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/509 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/510 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/511 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/512 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/513 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/514 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/515 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/516 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/517 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/518 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/519 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/520 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/521 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/522 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/523 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/524 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/525 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/526 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/527 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/528 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/529 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/530 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/531 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/532 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/533 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/534 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/535 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/536 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/537 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/538 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/539 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/540 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/541 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/542 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/543 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/544 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/545 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/546 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/547 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/548 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/549 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/550 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/551 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/552 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/553 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/554 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/555 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/556 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/557 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/558 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/559 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/560 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/561 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/562 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/563 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/564 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/565 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/566 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/567 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/568 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/569 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/570 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/571 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/572 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/573 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/574 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/575 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/576 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/577 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/578 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/579 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/580 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/581 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/582 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/583 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/584 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/585 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/586 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/587 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/588 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/589 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/590 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/591 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/592 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/593 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/594 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/595 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/596 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/597 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/598 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/599 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/601 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/602 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/603 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/606 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/607 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/608 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/609 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/610 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/611 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/612 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/613 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/614 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/616 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/617 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/618 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/619 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/620 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/621 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/622 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/623 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/624 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/625 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/626 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/627 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/628 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/629 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/630 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/631 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/633 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/634 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/635 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/637 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/638 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/639 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/640 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/642 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/644 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/645 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/646 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/647 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/649 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/650 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/651 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/652 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/653 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/654 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/655 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/656 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/658 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/659 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/660 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/661 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/662 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/663 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/664 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/665 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/666 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/667 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/668 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/669 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/670 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/671 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/672 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/673 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/674 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/675 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/676 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/677 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/678 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/679 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/680 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/681 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/682 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/683 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/684 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/685 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/686 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/687 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/688 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/689 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/690 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/691 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/692 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/693 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/694 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/695 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/696 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/697 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/698 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/699 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/700 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/701 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/702 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/703 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/704 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/705 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/706 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/707 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/708 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/709 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/710 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/711 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/712 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/713 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/714 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/715 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/716 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/717 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/718 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/719 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/720 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/721 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/722 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/723 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/724 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/725 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/726 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/727 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/728 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/729 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/730 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/731 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/732 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/733 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/734 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/735 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/736 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/737 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/738 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/739 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/740 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/741 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/742 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/743 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/744 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/745 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/746 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/747 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/748 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/749 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/750 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/751 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/752 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/753 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/754 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/755 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/756 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/757 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/758 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/759 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/760 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/761 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/762 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/763 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/764 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/765 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/766 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/767 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/768 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/769 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/770 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/771 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/772 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/773 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/774 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/776 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/777 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/778 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/779 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/780 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/781 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/782 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/784 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/785 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/786 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/787 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/788 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/789 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/790 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/791 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/792 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/793 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/794 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/795 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/796 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/797 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/798 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/799 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/800 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/801 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/802 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/803 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/804 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/805 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/806 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/807 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/808 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/809 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/810 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/811 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/812 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/813 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/814 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/815 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/816 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/817 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/818 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/819 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/820 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/821 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/822 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/823 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/824 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/825 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/826 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/827 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/828 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/829 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/830 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/831 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/832 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/833 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/834 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/835 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/836 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/837 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/838 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/839 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/840 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/841 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/842 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/843 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/844 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/845 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/846 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/847 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/848 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/849 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/850 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/851 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/852 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/853 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/854 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/855 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/856 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/857 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/858 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/859 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/860 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/861 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/862 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/863 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/864 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/865 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/866 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/867 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/868 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/869 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/870 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/871 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/872 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/873 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/874 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/875 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/876 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/877 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/878 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/879 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/2 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/3 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/4 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/5 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/6 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/7 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/8 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/9 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/10 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/11 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/12 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/13 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/14 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/15 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/16 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/17 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/18 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/19 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/20 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/21 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/22 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/23 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/24 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/25 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/26 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/27 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/28 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/29 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/30 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/31 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/32 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/33 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/34 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/35 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/36 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/37 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/38 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/39 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/40 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/41 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/42 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/43 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/44 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/45 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/46 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/47 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/48 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/49 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/50 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/51 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/52 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/53 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/54 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/55 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/56 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/57 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/58 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/59 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/60 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/61 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/62 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/63 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/64 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/65 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/66 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/67 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/68 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/69 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/70 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/71 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/72 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/73 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/74 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/75 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/76 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/77 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/78 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/79 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/80 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/81 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/82 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/83 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/84 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/85 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/86 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/87 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/88 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/89 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/90 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/91 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/92 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/93 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/94 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/95 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/96 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/97 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/98 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/99 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/100 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/101 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/102 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/103 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/104 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/105 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/106 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/107 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/108 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/109 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/110 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/111 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/112 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/113 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/114 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/115 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/116 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/117 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/118 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/119 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/120 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/121 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/122 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/123 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/124 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/125 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/126 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/127 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/128 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/129 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/130 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/131 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/132 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/133 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/134 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/135 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/136 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/137 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/138 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/139 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/140 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/141 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/142 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/143 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/144 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/145 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/146 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/147 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/148 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/149 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/150 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/151 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/152 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/153 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/154 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/155 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/156 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/157 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/158 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/159 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/160 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/161 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/162 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/163 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/164 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/165 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/166 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/167 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/168 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/169 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/170 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/171 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/172 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/173 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/174 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/175 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/176 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/177 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/178 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/179 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/180 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/181 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/182 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/183 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/184 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/185 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/186 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/187 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/188 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/189 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/190 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/191 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/192 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/193 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/194 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/195 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/196 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/197 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/198 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/199 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/200 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/201 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/202 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/203 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/204 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/205 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/206 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/207 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/208 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/209 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/210 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/211 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/212 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/213 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/214 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/215 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/216 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/217 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/218 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/219 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/220 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/221 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/222 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/223 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/224 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/225 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/226 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/227 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/228 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/229 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/230 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/231 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/232 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/233 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/234 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/235 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/236 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/237 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/238 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/239 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/240 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/241 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/242 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/243 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/244 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/245 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/246 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/247 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/248 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/249 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/250 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/251 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/252 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/253 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/254 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/255 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/256 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/257 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/258 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/259 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/260 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/261 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/262 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/263 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/264 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/265 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/266 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/267 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/268 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/269 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/270 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/271 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/272 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/273 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/274 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/275 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/276 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/277 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/278 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/279 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/280 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/281 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/282 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/283 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/284 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/285 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/286 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/287 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/288 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/289 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/290 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/291 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/292 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/293 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/294 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/295 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/296 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/297 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/298 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/299 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/300 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/301 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/302 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/303 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/304 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/305 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/306 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/307 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/308 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/309 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/310 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/311 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/312 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/313 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/314 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/315 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/316 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/317 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/318 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/319 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/320 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/321 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/322 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/323 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/324 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/325 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/326 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/327 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/328 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/329 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/440 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/441 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/442 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/443 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/444 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/445 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/446 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/447 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/448 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/449 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/450 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/451 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/452 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/453 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/454 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/455 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/456 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/457 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/458 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/459 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/460 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/461 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/462 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/463 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/464 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/465 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/466 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/467 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/468 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/469 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/470 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/471 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/472 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/473 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/474 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/475 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/476 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/477 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/478 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/479 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/480 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/481 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/482 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/483 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/484 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/485 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/486 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/487 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/488 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/489 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/490 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/491 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/492 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/493 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/494 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/495 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/496 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/497 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/498 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/499 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/500 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/501 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/502 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/503 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/504 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/505 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/506 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/507 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/508 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/509 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/510 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/511 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/512 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/513 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/514 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/515 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/516 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/517 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/518 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/519 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/520 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/521 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/522 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/523 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/524 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/525 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/526 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/527 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/528 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/529 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/530 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/531 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/532 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/533 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/534 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/535 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/536 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/537 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/538 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/539 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/540 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/541 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/542 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/543 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/544 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/545 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/546 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/547 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/548 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/549 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/550 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/551 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/552 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/553 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/554 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/555 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/556 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/557 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/558 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/559 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/560 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/561 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/562 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/563 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/564 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/565 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/566 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/567 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/568 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/569 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/570 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/571 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/572 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/573 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/574 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/575 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/576 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/577 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/578 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/579 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/580 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/581 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/582 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/583 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/584 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/585 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/586 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/587 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/588 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/589 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/590 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/591 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/592 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/593 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/594 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/595 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/596 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/597 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/598 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/599 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/600 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/601 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/602 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/603 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/604 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/605 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/606 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/607 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/608 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/609 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/610 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/611 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/612 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/613 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/614 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/615 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/616 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/617 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/618 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/619 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/620 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/621 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/622 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/623 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/624 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/625 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/626 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/627 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/628 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/629 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/630 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/631 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/632 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/633 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/634 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/635 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/636 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/637 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/638 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/639 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/640 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/641 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/642 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/643 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/644 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/645 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/646 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/647 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/648 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/649 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/650 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/651 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/652 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/653 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/654 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/655 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/656 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/657 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/658 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/659 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/660 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/661 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/662 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/663 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/664 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/665 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/666 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/667 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/668 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/669 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/670 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/671 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/672 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/673 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/674 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/675 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/676 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/677 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/678 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/679 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/680 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/681 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/682 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/683 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/684 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/685 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/686 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/687 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/688 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/689 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/690 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/691 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/692 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/693 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/694 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/695 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/696 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/697 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/698 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/699 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/700 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/701 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/702 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/703 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/704 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/705 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/706 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/707 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/708 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/709 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/710 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/711 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/712 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/713 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/714 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/715 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/716 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/717 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/718 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/719 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/720 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/721 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/722 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/723 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/724 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/725 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/726 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/727 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/728 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/729 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/730 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/731 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/732 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/733 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/734 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/735 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/736 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/737 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/738 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/739 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/740 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/741 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/742 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/743 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/744 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/745 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/746 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/747 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/748 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/749 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/750 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/751 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/752 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/753 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/754 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/755 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/756 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/757 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/758 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/759 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/760 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/761 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/762 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/763 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/764 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/765 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/766 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/767 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/768 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/769 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/0 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/2 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/3 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/4 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/5 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/6 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/7 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/8 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/9 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/10 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/11 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/12 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/13 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/14 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/15 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/16 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/17 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/18 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/19 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/20 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/21 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/22 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/23 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/24 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/25 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/26 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/27 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/28 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/29 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/30 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/31 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/32 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/33 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/34 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/35 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/36 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/37 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/38 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/39 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/40 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/41 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/42 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/43 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/44 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/45 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/46 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/47 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/48 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/49 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/50 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/51 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/52 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/53 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/54 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/55 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/56 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/57 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/58 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/59 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/60 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/61 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/62 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/63 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/64 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/65 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/66 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/67 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/68 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/69 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/70 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/71 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/72 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/73 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/74 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/75 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/76 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/77 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/78 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/79 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/80 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/81 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/82 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/83 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/84 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/85 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/86 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/87 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/88 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/89 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/90 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/91 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/92 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/93 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/94 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/95 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/96 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/97 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/98 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/99 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/100 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/101 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/102 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/103 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/104 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/105 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/106 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/107 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/108 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/109 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/111 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/112 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/113 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/114 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/115 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/116 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/117 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/118 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/119 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/120 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/121 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/122 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/123 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/124 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/125 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/126 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/127 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/128 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/129 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/130 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/131 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/132 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/133 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/134 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/135 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/136 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/137 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/138 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/139 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/140 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/141 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/142 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/143 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/144 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/145 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/146 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/147 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/148 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/149 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/150 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/151 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/152 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/153 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/154 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/155 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/156 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/157 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/158 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/159 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/160 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/161 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/162 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/163 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/164 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/165 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/166 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/167 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/168 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/169 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/170 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/171 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/172 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/173 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/174 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/175 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/176 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/177 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/178 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/179 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/180 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/181 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/182 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/183 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/184 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/185 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/186 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/187 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/188 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/189 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/190 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/191 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/192 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/193 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/194 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/195 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/196 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/197 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/198 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/199 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/200 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/201 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/202 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/203 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/204 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/205 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/206 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/207 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/208 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/209 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/210 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/211 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/212 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/213 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/214 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/215 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/216 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/217 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/218 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/219 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/220 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/221 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/222 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/223 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/224 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/225 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/226 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/227 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/228 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/229 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/230 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/231 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/232 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/233 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/234 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/235 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/236 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/237 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/238 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/239 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/240 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/241 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/242 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/243 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/244 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/245 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/246 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/247 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/248 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/249 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/250 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/251 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/252 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/253 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/254 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/255 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/256 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/257 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/258 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/259 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/260 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/261 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/262 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/263 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/264 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/265 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/266 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/267 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/268 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/269 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/270 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/271 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/272 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/273 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/274 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/275 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/276 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/277 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/278 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/279 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/280 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/281 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/282 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/283 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/284 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/285 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/286 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/287 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/288 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/289 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/290 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/291 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/292 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/293 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/294 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/295 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/296 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/297 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/298 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/299 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/300 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/301 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/302 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/303 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/304 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/305 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/306 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/307 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/308 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/309 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/310 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/311 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/312 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/313 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/314 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/315 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/316 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/317 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/318 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/319 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/320 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/321 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/322 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/323 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/324 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/325 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/326 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/327 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/328 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/329 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/330 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/331 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/332 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/333 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/334 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/335 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/336 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/337 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/338 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/339 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/340 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/341 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/342 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/343 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/344 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/345 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/346 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/347 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/348 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/349 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/350 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/351 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/352 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/353 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/354 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/355 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/356 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/357 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/358 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/359 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/360 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/361 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/362 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/363 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/364 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/365 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/366 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/367 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/368 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/369 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/370 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/371 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/372 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/373 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/374 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/375 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/376 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/377 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/378 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/379 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/380 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/381 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/382 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/383 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/384 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/385 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/386 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/387 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/388 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/389 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/390 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/391 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/392 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/393 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/394 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/395 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/396 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/397 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/398 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/399 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/400 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/401 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/402 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/403 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/404 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/405 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/406 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/407 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/408 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/409 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/410 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/411 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/412 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/413 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/414 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/415 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/416 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/417 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/418 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/419 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/420 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/421 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/422 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/423 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/424 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/425 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/426 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/427 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/428 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/429 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/430 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/431 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/432 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/433 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/434 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/435 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/436 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/437 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/438 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/439 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/440 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/441 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/442 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/443 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/444 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/445 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/446 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/447 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/448 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/449 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/450 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/451 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/452 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/453 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/454 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/455 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/456 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/457 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/458 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/459 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/460 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/461 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/462 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/463 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/464 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/465 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/466 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/467 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/468 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/469 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/470 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/471 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/472 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/473 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/474 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/475 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/476 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/477 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/478 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/479 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/480 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/481 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/482 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/483 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/484 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/485 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/486 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/487 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/488 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/489 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/490 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/491 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/492 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/493 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/494 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/495 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/496 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/497 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/498 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/499 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/500 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/501 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/502 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/503 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/504 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/505 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/506 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/507 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/508 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/509 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/510 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/511 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/512 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/513 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/514 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/515 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/516 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/517 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/518 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/519 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/520 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/521 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/522 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/523 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/524 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/525 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/526 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/527 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/528 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/529 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/530 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/531 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/532 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/533 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/534 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/535 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/536 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/537 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/538 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/539 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/540 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/541 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/542 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/543 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/544 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/545 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/546 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/547 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/548 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/549 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/550 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/551 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/552 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/553 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/554 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/555 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/556 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/557 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/558 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/559 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/560 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/561 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/562 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/563 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/564 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/565 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/566 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/567 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/568 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/569 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/570 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/571 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/572 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/573 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/574 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/575 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/576 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/577 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/578 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/579 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/580 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/581 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/582 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/583 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/584 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/585 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/586 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/587 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/588 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/589 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/590 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/591 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/592 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/593 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/594 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/595 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/596 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/597 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/598 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/599 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/601 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/602 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/603 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/606 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/607 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/608 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/609 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/610 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/611 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/612 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/613 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/614 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/616 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/617 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/618 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/619 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/620 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/621 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/622 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/623 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/624 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/626 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/628 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/629 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/631 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/633 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/634 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/635 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/636 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/637 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/638 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/639 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/640 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/641 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/642 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/644 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/645 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/646 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/647 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/649 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/650 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/651 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/652 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/653 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/654 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/655 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/656 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/658 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/659 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/660 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/661 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/662 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/663 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/664 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/665 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/666 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/667 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/668 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/669 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/670 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/671 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/672 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/673 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/674 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/675 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/676 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/677 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/678 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/679 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/680 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/681 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/682 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/683 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/684 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/685 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/686 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/687 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/688 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/689 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/690 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/691 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/692 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/693 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/694 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/695 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/696 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/697 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/698 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/699 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/700 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/701 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/702 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/703 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/704 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/705 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/706 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/707 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/708 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/709 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/710 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/711 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/712 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/713 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/714 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/715 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/716 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/717 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/718 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/719 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/720 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/721 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/722 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/723 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/724 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/725 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/726 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/727 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/728 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/729 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/730 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/731 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/732 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/733 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/734 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/735 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/736 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/737 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/738 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/739 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/740 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/741 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/742 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/743 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/744 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/745 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/746 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/747 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/748 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/749 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/750 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/751 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/752 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/753 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/754 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/755 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/756 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/757 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/758 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/759 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/760 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/761 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/762 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/763 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/764 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/765 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/766 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/767 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/768 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/769 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/770 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/771 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/772 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/773 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/774 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/776 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/777 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/778 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/779 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/780 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/781 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/782 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/784 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/785 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/786 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/787 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/788 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/789 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/790 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/791 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/792 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/793 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/794 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/795 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/796 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/797 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/798 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/799 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/800 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/801 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/802 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/803 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/804 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/805 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/806 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/807 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/808 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/809 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/810 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/811 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/812 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/813 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/814 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/815 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/816 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/817 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/818 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/819 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/820 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/821 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/822 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/823 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/824 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/825 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/826 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/827 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/828 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/829 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/830 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/831 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/832 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/833 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/834 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/835 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/836 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/837 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/838 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/839 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/840 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/841 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/842 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/843 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/844 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/845 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/846 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/847 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/848 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/849 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/850 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/851 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/852 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/853 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/854 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/855 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/856 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/857 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/858 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/859 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/860 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/861 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/862 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/863 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/864 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/865 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/866 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/867 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/868 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/869 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/870 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/871 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/872 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/873 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/874 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/875 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/876 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/877 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/878 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/879 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/2 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/3 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/4 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/5 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/6 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/7 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/8 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/9 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/10 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/11 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/12 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/13 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/14 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/15 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/16 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/17 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/18 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/19 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/20 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/21 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/22 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/23 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/24 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/25 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/26 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/27 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/28 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/29 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/30 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/31 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/32 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/33 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/34 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/35 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/36 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/37 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/38 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/39 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/40 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/41 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/42 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/43 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/44 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/45 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/46 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/47 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/48 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/49 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/50 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/51 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/52 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/53 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/54 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/55 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/56 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/57 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/58 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/59 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/60 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/61 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/62 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/63 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/64 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/65 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/66 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/67 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/68 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/69 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/70 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/71 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/72 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/73 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/74 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/75 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/76 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/77 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/78 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/79 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/80 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/81 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/82 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/83 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/84 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/85 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/86 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/87 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/88 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/89 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/90 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/91 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/92 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/93 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/94 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/95 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/96 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/97 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/98 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/99 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/100 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/101 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/102 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/103 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/104 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/105 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/106 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/107 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/108 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/109 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/111 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/112 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/113 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/114 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/115 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/116 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/117 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/118 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/119 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/120 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/121 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/122 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/123 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/124 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/125 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/126 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/127 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/128 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/129 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/130 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/131 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/132 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/133 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/134 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/135 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/136 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/137 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/138 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/139 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/140 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/141 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/142 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/143 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/144 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/145 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/146 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/147 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/148 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/149 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/150 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/151 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/152 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/153 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/154 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/155 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/156 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/157 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/158 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/159 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/160 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/161 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/162 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/163 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/164 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/165 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/166 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/167 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/168 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/169 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/170 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/171 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/172 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/173 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/174 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/175 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/176 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/177 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/178 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/179 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/180 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/181 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/182 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/183 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/184 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/185 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/186 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/187 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/188 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/189 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/190 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/191 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/192 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/193 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/194 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/195 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/196 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/197 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/198 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/199 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/200 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/201 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/202 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/203 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/204 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/205 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/206 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/207 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/208 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/209 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/210 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/211 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/212 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/213 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/214 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/215 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/216 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/217 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/218 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/219 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/220 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/221 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/222 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/223 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/224 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/225 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/226 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/227 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/228 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/229 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/230 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/231 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/232 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/233 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/234 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/235 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/236 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/237 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/238 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/239 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/240 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/241 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/242 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/243 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/244 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/245 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/246 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/247 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/248 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/249 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/250 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/251 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/252 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/253 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/254 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/255 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/256 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/257 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/258 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/259 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/260 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/261 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/262 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/263 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/264 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/265 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/266 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/267 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/268 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/269 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/270 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/271 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/272 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/273 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/274 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/275 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/276 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/277 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/278 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/279 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/280 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/281 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/282 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/283 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/284 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/285 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/286 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/287 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/288 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/289 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/290 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/291 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/292 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/293 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/294 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/295 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/296 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/297 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/298 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/299 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/300 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/301 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/302 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/303 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/304 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/305 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/306 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/307 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/308 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/309 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/310 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/311 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/312 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/313 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/314 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/315 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/316 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/317 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/318 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/319 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/320 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/321 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/322 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/323 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/324 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/325 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/326 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/327 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/328 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/329 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/330 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/331 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/332 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/333 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/334 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/335 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/336 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/337 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/338 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/339 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/340 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/341 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/342 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/343 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/344 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/345 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/346 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/347 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/348 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/349 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/350 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/351 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/352 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/353 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/354 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/355 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/356 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/357 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/358 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/359 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/360 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/361 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/362 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/363 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/364 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/365 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/366 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/367 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/368 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/369 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/370 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/371 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/372 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/373 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/374 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/375 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/376 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/377 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/378 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/379 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/380 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/381 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/382 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/383 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/384 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/385 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/386 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/387 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/388 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/389 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/390 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/391 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/392 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/393 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/394 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/395 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/396 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/397 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/398 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/399 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/400 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/401 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/402 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/403 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/404 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/405 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/406 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/407 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/408 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/409 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/410 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/411 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/412 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/413 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/414 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/415 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/416 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/417 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/418 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/419 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/420 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/421 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/422 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/423 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/424 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/425 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/426 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/427 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/428 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/429 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/430 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/431 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/432 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/433 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/434 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/435 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/436 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/437 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/438 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/439 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/440 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/441 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/442 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/443 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/444 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/445 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/446 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/447 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/448 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/449 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/450 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/451 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/452 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/453 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/454 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/455 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/456 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/457 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/458 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/459 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/460 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/461 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/462 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/463 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/464 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/465 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/466 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/467 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/468 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/469 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/470 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/471 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/472 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/473 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/474 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/475 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/476 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/477 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/478 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/479 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/480 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/481 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/482 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/483 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/484 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/485 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/486 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/487 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/488 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/489 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/490 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/491 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/492 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/493 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/494 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/495 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/496 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/497 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/498 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/499 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/500 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/501 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/502 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/503 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/504 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/505 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/506 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/507 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/508 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/509 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/510 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/511 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/512 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/513 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/514 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/515 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/516 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/517 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/518 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/519 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/520 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/521 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/522 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/523 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/524 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/525 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/526 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/527 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/528 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/529 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/530 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/531 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/532 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/533 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/534 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/535 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/536 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/537 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/538 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/539 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/540 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/541 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/542 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/543 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/544 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/545 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/546 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/547 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/548 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/549 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/550 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/551 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/552 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/553 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/554 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/555 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/556 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/557 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/558 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/559 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/560 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/561 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/562 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/563 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/564 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/565 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/566 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/567 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/568 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/569 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/570 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/571 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/572 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/573 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/574 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/575 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/576 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/577 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/578 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/579 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/580 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/581 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/582 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/583 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/584 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/585 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/586 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/587 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/588 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/589 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/590 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/591 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/592 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/593 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/594 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/595 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/596 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/597 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/598 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/599 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/601 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/602 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/603 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/606 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/607 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/608 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/609 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/610 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/611 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/612 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/613 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/614 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/616 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/617 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/618 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/619 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/620 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/621 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/622 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/623 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/624 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/626 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/628 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/629 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/631 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/633 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/634 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/635 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/637 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/638 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/639 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/640 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/642 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/643 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/644 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/645 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/646 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/647 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/648 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/649 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/650 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/651 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/652 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/653 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/654 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/655 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/656 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/657 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/658 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/659 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/660 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/661 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/662 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/663 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/664 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/665 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/666 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/667 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/668 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/669 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/670 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/671 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/672 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/673 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/674 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/675 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/676 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/677 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/678 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/679 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/680 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/681 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/682 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/683 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/684 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/685 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/686 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/687 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/688 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/689 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/690 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/691 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/692 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/693 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/694 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/695 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/696 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/697 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/698 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/699 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/700 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/701 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/702 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/703 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/704 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/705 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/706 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/707 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/708 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/709 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/710 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/711 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/712 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/713 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/714 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/715 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/716 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/717 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/718 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/719 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/720 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/721 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/722 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/723 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/724 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/725 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/726 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/727 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/728 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/729 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/730 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/731 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/732 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/733 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/734 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/735 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/736 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/737 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/738 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/739 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/740 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/741 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/742 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/743 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/744 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/745 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/746 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/747 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/748 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/749 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/750 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/751 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/752 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/753 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/754 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/755 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/756 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/757 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/758 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/759 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/760 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/761 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/762 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/763 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/764 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/765 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/766 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/767 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/768 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/769 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/770 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/771 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/772 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/773 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/774 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/776 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/777 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/778 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/779 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/780 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/781 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/782 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/784 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/785 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/786 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/787 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/788 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/789 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/790 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/791 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/792 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/793 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/794 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/795 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/796 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/797 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/798 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/799 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/800 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/801 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/802 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/803 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/804 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/805 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/806 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/807 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/808 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/809 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/810 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/811 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/812 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/813 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/814 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/815 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/816 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/817 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/818 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/819 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/820 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/821 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/822 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/823 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/824 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/825 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/826 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/827 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/828 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/829 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/830 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/831 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/832 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/833 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/834 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/835 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/836 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/837 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/838 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/839 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/840 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/841 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/842 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/843 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/844 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/845 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/846 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/847 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/848 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/849 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/850 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/851 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/852 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/853 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/854 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/855 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/856 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/857 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/858 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/859 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/860 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/861 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/862 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/863 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/864 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/865 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/866 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/867 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/868 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/869 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/870 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/871 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/872 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/873 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/874 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/875 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/876 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/877 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/878 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/879 (9 ms) [----------] 3520 tests from CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest (22192 ms total) [----------] 960 tests from CipherSuiteTLS13/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/0 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/1 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/2 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/3 (3 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/4 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/6 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/7 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/9 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/10 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/11 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/12 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/13 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/14 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/15 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/16 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/17 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/18 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/19 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/20 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/21 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/22 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/23 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/24 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/25 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/26 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/27 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/28 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/29 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/30 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/31 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/32 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/33 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/34 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/35 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/36 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/37 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/38 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/39 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/40 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/41 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/42 (3 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/43 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/44 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/45 (3 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/46 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/47 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/48 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/49 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/50 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/51 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/52 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/53 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/54 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/55 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/56 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/57 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/58 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/59 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/60 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/61 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/62 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/63 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/64 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/65 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/66 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/67 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/68 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/69 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/70 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/71 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/72 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/73 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/74 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/75 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/76 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/77 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/78 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/79 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/80 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/81 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/82 (3 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/83 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/84 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/85 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/86 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/87 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/88 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/89 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/90 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/91 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/92 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/93 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/94 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/95 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/96 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/97 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/98 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/99 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/100 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/101 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/102 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/103 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/104 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/105 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/106 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/107 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/108 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/109 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/110 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/111 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/112 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/113 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/114 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/115 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/116 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/117 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/118 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/119 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/120 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/121 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/122 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/123 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/124 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/125 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/126 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/127 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/128 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/129 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/130 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/131 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/132 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/133 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/134 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/135 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/136 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/137 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/138 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/139 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/140 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/141 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/142 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/143 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/144 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/145 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/146 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/147 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/148 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/149 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/150 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/151 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/152 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/153 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/154 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/155 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/156 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/157 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/158 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/159 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/160 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/161 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/162 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/163 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/164 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/165 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/166 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/167 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/168 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/169 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/170 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/171 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/172 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/173 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/174 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/175 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/176 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/177 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/178 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/179 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/180 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/181 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/182 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/183 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/184 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/185 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/186 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/187 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/188 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/189 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/190 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/191 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/192 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/193 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/194 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/195 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/196 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/197 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/198 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/199 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/200 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/201 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/202 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/203 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/204 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/205 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/206 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/207 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/208 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/209 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/210 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/211 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/212 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/213 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/214 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/215 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/216 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/217 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/218 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/219 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/220 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/221 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/222 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/223 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/224 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/225 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/226 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/227 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/228 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/229 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/230 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/231 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/232 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/233 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/234 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/235 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/236 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/237 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/238 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/239 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/1 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/2 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/3 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/4 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/5 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/6 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/7 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/8 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/9 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/10 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/11 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/12 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/13 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/14 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/15 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/16 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/17 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/18 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/19 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/20 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/21 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/22 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/23 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/24 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/25 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/26 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/27 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/28 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/29 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/30 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/31 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/32 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/33 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/34 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/35 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/36 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/37 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/38 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/39 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/40 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/41 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/42 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/43 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/44 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/45 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/46 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/47 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/48 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/49 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/50 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/51 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/52 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/53 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/54 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/55 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/56 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/57 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/58 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/59 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/60 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/61 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/62 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/63 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/64 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/65 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/66 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/67 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/68 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/69 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/70 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/71 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/72 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/73 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/74 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/75 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/76 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/77 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/78 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/79 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/80 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/81 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/82 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/83 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/84 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/85 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/86 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/87 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/88 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/89 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/90 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/91 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/92 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/93 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/94 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/95 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/96 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/97 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/98 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/99 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/100 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/101 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/102 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/103 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/104 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/105 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/106 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/107 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/108 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/109 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/110 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/111 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/112 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/113 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/114 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/115 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/116 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/117 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/118 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/119 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/120 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/121 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/122 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/123 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/124 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/125 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/126 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/127 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/128 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/129 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/130 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/131 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/132 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/133 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/134 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/135 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/136 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/137 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/138 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/139 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/140 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/141 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/142 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/143 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/144 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/145 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/146 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/147 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/148 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/149 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/150 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/151 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/152 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/153 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/154 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/155 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/156 (33 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/157 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/158 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/159 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/160 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/161 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/162 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/163 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/164 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/165 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/166 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/167 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/168 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/169 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/170 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/171 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/172 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/173 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/174 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/175 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/176 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/177 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/178 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/179 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/180 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/181 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/182 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/183 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/184 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/185 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/186 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/187 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/188 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/189 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/190 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/191 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/192 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/193 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/194 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/195 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/196 (33 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/197 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/198 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/199 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/200 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/201 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/202 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/203 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/204 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/205 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/206 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/207 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/208 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/209 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/210 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/211 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/212 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/213 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/214 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/215 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/216 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/217 (45 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/218 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/219 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/220 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/221 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/222 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/223 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/224 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/225 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/226 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/227 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/228 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/229 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/230 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/231 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/232 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/233 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/234 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/235 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/236 (33 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/237 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/238 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/239 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/0 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/1 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/2 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/3 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/4 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/6 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/7 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/9 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/10 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/11 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/12 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/13 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/14 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/15 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/16 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/17 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/18 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/19 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/20 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/21 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/22 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/23 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/24 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/25 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/26 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/27 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/28 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/29 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/30 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/31 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/32 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/33 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/34 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/35 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/36 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/37 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/38 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/39 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/40 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/41 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/42 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/43 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/44 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/45 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/46 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/47 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/48 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/49 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/50 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/51 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/52 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/53 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/54 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/55 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/56 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/57 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/58 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/59 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/60 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/61 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/62 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/63 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/64 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/65 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/66 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/67 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/68 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/69 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/70 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/71 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/72 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/73 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/74 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/75 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/76 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/77 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/78 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/79 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/80 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/81 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/82 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/83 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/84 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/85 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/86 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/87 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/88 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/89 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/90 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/91 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/92 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/93 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/94 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/95 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/96 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/97 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/98 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/99 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/100 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/101 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/102 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/103 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/104 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/105 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/106 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/107 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/108 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/109 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/110 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/111 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/112 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/113 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/114 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/115 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/116 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/117 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/118 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/119 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fddb800301fccfa8c0b1295afecdcffab1dbf10b72c877d80d76d598ab4ccab... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/120 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7f7000303a42f9bb56f46659b5bfceb9e039cb2a20dbcbc0d4bed44bfabff8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/121 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f83b00030689e4066187881900c76c1d3a87dd19a8b90328ff0db11ef4531ec... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/122 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f57c10030988c8bd1509c3b624fb586a246884bac5432a49adc87eefe9a849b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/123 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0b1f003032b0a91a76da8f83a91a9159f48acea234eabca8129851fdbf950f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/124 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe0a50030ea3316188a793b3d480353e767c8d5add658fb57dce40e1992ff97... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/125 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5bee0030189647b2b4ddcea948247546250daa655829e166e071e3821072a6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/126 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f40690030ba6f98bb6443d0f10c797f62d3964558dc9cb24f6b654d1a46accf... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/127 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8a9800302f3faf2ec859b986df7e08c233c426142149c53ecb950b597d85c4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/128 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc701003077468112d1840d93f28fd5cb8ad89adb0f2f46a3714a4c1f944cc3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/129 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2da600308d5704173298e414ef578b694313801d7404d84d5690b89ad03bcc... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/130 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6c01003049abb989244ba43d2cf007b344222e9d2afd2d7318da65c4233b72... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/131 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8ed3003003612ea4fc2111447fc5bbb5b45f6a997a9e4b815cb5ecabf43484... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/132 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa6e800308e950b910cdd352f3a77a1d24efe7987063a19d7972cef64cdc49b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/133 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ffbc7003067ac11bb2d6dc19582d14a5f37b7ed0242ae1c31073bcab5a0827b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/134 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f735e003012a12c271c066415513b24806eba139cf8ef1c79220a7994862789... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/135 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fac9600306d92f36ccf7c5d67da5fdd13178077a76c770ebe12008a83740364... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/136 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb70f0030efb2dcbf438d2c98b3e7ec2ceaf1bbaa950161a4b4a90b5d9b156a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/137 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f27190030152c5c31ccf1bd12b943e1cd57bdf945f2d267a3df172a6f9e830a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/138 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa3e800305bf8eda8f9cdbd362a48b05df9df2b9b1cae589f067402dd6ade06... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/139 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7c54003058dfb43c8324c190e44cdff3dc4058354831a4f7426230b9d41f0e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/140 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f428700305ede5340a81478745331ddd10c5d2e300535630e3db8850a683b13... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/141 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8477003035cd54bde4daaee90f6492432b11291e82933ccde07ad121ed17d1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/142 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fba010030b8a0089e0f46695504da1231620549d82b843c7fc4ae84f5615501... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/143 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff2b100301a373ad9ab99f01da83dc32494eed37e54dae380846b6110cf0022... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/144 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6ae5003054cb1799be4f4b9da2ab9bc52b30476f0a1a49ca327f3737bd5dc2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/145 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fcfe10030d0dc9b5b5f473fcde2207a93761e5d7b786481a6a4780078ffdc08... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/146 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa6490030190b89e22e0f72a26768bd3fa451c14625b58d6effe553baf4f874... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/147 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4101003022718b40a320f920466dc06fdead8f565129796b903765f6acbbae... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/148 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6f6e0030269dc9fccd87031faebc656d0f695278f638b1f5944496324eec62... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/149 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd8a70030e8113b5e50d6149377eb14d5798306ce11986eaa989e2e0a856fb2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/150 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f80380030c28984598842a48a8cadc9d1c5a551e0a7c0cee3fdb2efbbf00b63... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/151 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2feeb20030846caca7692bfac7982d990da21b842350bbab5e4ac8fb41b0088c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/152 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fcb7b0030a49340b76daed3af82b76ab422087bf56ae6789a4041581e5b7a77... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/153 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fead70030557b160ed3d9ec821b794d634faa95ad93f4158fb1fd964d42df34... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/154 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fdd1a00304a1775ff6bf28159b9d4a89aa3f171534186ad42a2f4c82d90747b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/155 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe44e00300bf96c6d3ace4780ef820ec73d6ab94a27cf9f777038a85a3ff2d8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/156 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe5350030e7b5d351979cc28cbb7a616622a949d59cdb4f09118ba04808c3bd... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/157 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd1ea003052f949f9c50edd113c360e05c4ec0a151af1d9a5409a273ed4d7bf... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/158 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5c0c0030704d1105ac7820a573af69732330d593276df4fda2ddc53e215650... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/159 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f27ac00300b684f17b6ab3cdf596ef9bb9998a870b631d9fd82fb6a3a4867f6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/160 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f403b0030c8457cd73e7219f942fcd8c2fc5c290da970782c132e67eb5c0f5e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/161 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f34f90030fda4892dddb81fd1055b6be4f4ad6ac8f98f5c2870e595173c23ce... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/162 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f366f00304c856bdfee8f2386e26309357e4b65fe13886e6f3851696101361a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/163 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fff25003047c26017ddbd2dbb230646b09ec432048ea0c198e0c4da8293ff87... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/164 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa4ab00309bf8f025a38aea384a43e8f74b9e33b37bbff450dbb09e70844359... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/165 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f248d0030bf3bbde4dd10b616c4e1c6b5c92073da27ea8b673fd54598167d07... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/166 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb67f0030b559b105a23942769e138c458930625bd76ada5fd6f1b062ecb016... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/167 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd24b00302845288ca50c0f43c422af5e845da96e2be9a66dd56f955b884713... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/168 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f851f0030964b51b75a1b278e8fd469392675cfac69f99dce160fd798fa2243... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/169 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f175d00306cfd30d79a0b1c174cce46335f41409d6ea14a9700a2708a38ed61... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/170 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fcf210030f42d44740de2da909032749096db6a57b5d4b286cdda45b6cb01bd... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/171 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4174003027ec6a16b1f8ecdeeaef4c36ed3f617db7af924f73f1465768e02b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/172 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fca460030cb28ae078b69b4b492d9b9ea5e1e06999ff772fb8cb97fd1ae36f8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/173 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f17200030fe618af7c7da68a1dbf2fe08423ac1f69f5b3d6e388e42c3340cc2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/174 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1f1600302e1c74a1aaaecc6c44c7a34333a0c0121f62d02c7966f8630b8ce2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/175 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd1810030d3c3ae438544de0db447f4b3f1f4de2d8df760f69d7560b4e3e5b3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/176 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb53000304e7de7490a6cee454f840e3b3386571be103cf50667bf0bbd05399... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/177 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8789003041d5f0c75841b73cbb98f6cb27e3c633a81b9530d54b2af598cebf... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/178 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe8330030c20cd5d02ca262816eb0575a991a8bfb98de274be71e565c7845a9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/179 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f62c10030a642358026743cabe9a189a274d7ceab93e758af30917bbf90a1e8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/180 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3ddf003055b4ea0439f327ebae713683e766ceda44ddb73b9c797d2de3dbb0... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/181 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f95fa003038c0b5e5f077a14fc55ba8390ac944dc154b64cab540c16a5708f6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/182 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa70d003060c0a34e1055484022cfa88c911422f77d272c807ffd7fd4811c90... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/183 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fed5a00304a7fae7ea60a2bc0b930c027bda74c9c52790e7cb8a18874c1126d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/184 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2faa00302426cc840a8a1a34befca45ec10328b6902e957f048491f83ac656... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/185 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff3f0003077f835723794af8e06c5ed79576eab73e62671dae9b7db36c7ddf1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/186 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7a770030202a846e0dd5b1f547abd6a7c2be11a19c00d5d6ecc58836866764... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/187 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f24240030713a8720d7f6827de2c118d2892fe21241d6b872d96d9c4e4aef80... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/188 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb3fd0030765d70e51dd5c98af1ba738fd47f256414e9b725f955a426b437a9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/189 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb1f0003053bad2505a9714f27b803b509b80bbe062741fc59412edb11e55bd... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/190 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f216e00300fb0d1fc651877a33e8367d91a0816923b6afd07258d832a343923... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/191 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f38ad00302126d8b547ee3af8b72acdacaf744ddf8e686077be92e28f88cce6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/192 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb8dd003000748eecf924c50fa9f00793194ef85660edb45b35cb6d8b4ef173... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/193 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1e25003030e692ba12889f345a54e2044460a45ab02a5bf264a238d2dd658f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/194 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff6020030113f340109d2512002900b668a214b04ff54c71bb7275f142e2246... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/195 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8f300030d3fd4034d158db033b326221558e8d027b0b125f147d62e95da255... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/196 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8a4e0030edaf5cb34729ef3cc306aeb394dd713ffcd6b6e5a3dead1373389b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/197 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9c1a00303c31b1df660fd0a5d93f21fbdfc26392719f663fa97dd7eb354a70... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/198 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9082003016b216a583a7c274d5a6c85d60dee71dd8b56ab1136d1be47c9e55... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/199 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4e350030ac35fdef9c313218613c36558386ed03662f28aac411e0a68f749d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/200 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0bad0030aa9235150af4b8ade1fbaba097c7ce666c933f5c93b9bc86efb806... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/201 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f51ee00306a02cff97665c168c3a893c48367bee0c904b83682c818fc7f57b9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/202 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc96800306e3258a7440188163ab209cbf9249e51cc57b7e1e42ad57898024a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/203 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc3bb003056606269c3dc6f60c4bd5e642165b9f6d66832db0fbd0fa8e3686a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/204 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7bb60030b8c2e1ee3412e7f51d3eba9bc97355d558599c10e142b87abc24a2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/205 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fdfc30030bf2387c1d271a86bbac044d76e75b837dda5295c3e6e56e30f4164... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/206 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb74b0030295e4a101b449ce3c94f27c3fe1c44c1668b1a36d04079b8309c29... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/207 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fbb7f00306d19feaed28965df44eff5810aabf54e502e003ea9d2fea4630723... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/208 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa0150030d3088c137cd752360e601601ad61696fece5979961f949b44e2f15... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/209 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f79ea0030e91f9f78d6620653704d8d66fb82ced2c3d7c7965ea4115acf0031... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/210 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f87400030e4a06ad48e46bbc665216f5e6baba66d767b29e157fff52b71af8f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/211 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0dc10030bf36184fd680ce9491693c43cf30c60a434ef77cdc5ef8773dd36b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/212 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5062003012d605bb4f77c38a5c90f7c93cad7775bf1d1266bfacf913f713e1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/213 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5e8e003003198265476c424e87c2cc09614e78a929a796cb44c7a9f23e125f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/214 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe3de003007c26f79e4e26d7bfbda5000a11989fc396c22bf939ae85db6935d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/215 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe52e0030b191644f3d674ea7b50752d90cbc4ec6bd98d2e4e612786017484f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/216 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2febbb0030f46f28fa5a2b877822fe16977041f3026f4b4a203b6e9325008056... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/217 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5f160030c054c10f7617e6b510c650a76baa89fb4a6dbf2fed8a4c3dd7b3c6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/218 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f83e700300f85d8bd8a7c0a2c56032c68464af713ff26fa93e275804415ac5f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/219 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f127c0030c81f12becba4d91267cbccdbeb0f69b5bc91ef1ec4163df251d879... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/220 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f48e50030822537eec4316d8c8ee716d5e35414dfd0d4047992435f34dfa8d7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/221 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f31610030d3e65706a6c2b16746b5ca9ffd87347321179bd2796d4438c07a6e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/222 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f29480030d3b0dd18c737e1ef6c9fda4350ab5a52042a36a2eda0d5cb49e581... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/223 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5bf70030cc1c4f53799bbddc8bca8a8420dc4997c200ab1e1ddfaddfb229fb... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/224 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd0990030d91a05d528bd228f1ed3779e07b1cf7507138a3d2066a637c05c55... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/225 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb0a500306de481d301411fe1ed9e5776b6ae5183d7b82a3c08e794fd601198... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/226 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1da00030c4e3023b592e8a522737663e7fd3f9c4d28128dcd8ef92ad187495... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/227 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1d20003004b376adef9eb32fa41ffc8b2269b6adaf20b35931de734137e59a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/228 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f802b0030480d4a37dd1fbe46743c5bc519c303cf05ce086bbe8d572faf5bb7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/229 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fdb100030e8f498d2eab581002bd5bb40583c660a2ce866b239eb3ca51e9d6b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/230 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fada700307c31cc42801f5b147cddd02f5aa996d39620174808878eeb992b0f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/231 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f28a900308c9c048a811eea6bbe19e960167db75280e5da4f67ca88da55b00c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/232 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc8bd0030436a6de5507325d89f7833b169c3e4a6333c1de009556aef2c5728... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/233 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7d2b00309b063f8bc06e405e554840d770a989c40f867dba156ce6f86031db... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/234 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f15450030f7bf3f137f1d1f83b55a74f27490392c5e19a6edc8a20576d8d5ba... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/235 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f26880030730f395ad7234f1b97012fff0c8020171bdd1d9ba6f9db0f96f191... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/236 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f792000300f360efa17d711568f5a20217efaca9f645ad18b56d4025445f804... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/237 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fac9a0030b836fc3f9ec28971a2e48a99795209862fb49ed449366cf376313f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/238 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7c250030f54db9263a99b5d372aa9e50b77e17cdf3746f313df9d128a0bb3e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/239 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 (0 ms) [----------] 960 tests from CipherSuiteTLS13/TlsCipherSuiteTest (11112 ms total) [----------] 72 tests from CipherSuiteTLS13AllGroups/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/0 (7 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/1 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/2 (20 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/3 (14 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/4 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/5 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/6 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/7 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/8 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/9 (6 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/10 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/11 (20 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/12 (14 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/13 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/14 (16 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/15 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/16 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/17 (107 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/0 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/1 (25 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/2 (44 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/3 (33 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/4 (25 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/5 (38 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/6 (52 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/7 (95 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/8 (216 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/9 (18 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/10 (26 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/11 (44 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/12 (33 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/13 (25 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/14 (38 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/15 (53 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/16 (94 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/17 (217 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/0 (6 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/1 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/2 (19 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/3 (14 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/4 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/5 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/6 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/7 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/8 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5eef003090097161992421594c0cec3251950373cfaefcd19169b381524dc8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/9 (7 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f51a6003000304f496b0a36480065c54f51cccaf3f7f29ec3ea29f170de4c29... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/10 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb27f0030cf69069501a587e76bd8559b1f415f0e0ef6902d0cf3724dfce2ee... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/11 (20 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f06910030556250bb249f0fce69c511a8433e26469a19d81a8160ff3e923353... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/12 (14 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f75e300302cf6d7b7c17e499d1f1fc74846566f858efbf11cac75b3015ac6a2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/13 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3e7200305c5e4a90181860332ff56bd03df5ff1532033dd96d82205de1b882... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/14 (16 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f75740030c2e7abec63868e4880970c748b487a9e3eace0e2cae7967277057b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/15 (25 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f954200306a188f7b6c78afc47d9d5e1454853f5db85e0f13c23ab9327120df... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/16 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f20c500305d77f79d8f8cedc944947f79dd509b91293745b70d0dad96e8f8ae... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/17 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 (0 ms) [----------] 72 tests from CipherSuiteTLS13AllGroups/TlsCipherSuiteTest (2109 ms total) [----------] 8 tests from TestSecurityStatus/SecurityStatusTest [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/7 (4 ms) [----------] 8 tests from TestSecurityStatus/SecurityStatusTest (27 ms total) [----------] 72 tests from DamageYStream/TlsDamageDHYTest [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030191f5f76208247a1c2eef60abea390e79cd6ded1ba57d27cb1e10... record new: [1190] 02000057030191f5f76208247a1c2eef60abea390e79cd6ded1ba57d27cb1e10... server: Filtered packet: [1195] 16030104a602000057030191f5f76208247a1c2eef60abea390e79cd6ded1ba5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703011b04c1a7f3166928027acc5e8a660a53894834deb581c43ce5fc... record new: [1190] 0200005703011b04c1a7f3166928027acc5e8a660a53894834deb581c43ce5fc... server: Filtered packet: [1195] 16030104a60200005703011b04c1a7f3166928027acc5e8a660a53894834deb5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030176692fa511e22de45afad87edc0c4a7f5eaee0fa6b66c9b7ad00... record new: [1190] 02000057030176692fa511e22de45afad87edc0c4a7f5eaee0fa6b66c9b7ad00... server: Filtered packet: [1195] 16030104a602000057030176692fa511e22de45afad87edc0c4a7f5eaee0fa6b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301226be02f8504839414888661e7750d480ba466233989de796a16... record new: [1190] 020000570301226be02f8504839414888661e7750d480ba466233989de796a16... server: Filtered packet: [1195] 16030104a6020000570301226be02f8504839414888661e7750d480ba4662339... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301f32bd9da531a11c688c072a3065299acb4a099fa921b306b5f57... record new: [1190] 020000570301f32bd9da531a11c688c072a3065299acb4a099fa921b306b5f57... server: Filtered packet: [1195] 16030104a6020000570301f32bd9da531a11c688c072a3065299acb4a099fa92... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301b3797e3ce5453953069ec92cfb5638e3f30d55c8ab0bb3344ff1... record new: [1190] 020000570301b3797e3ce5453953069ec92cfb5638e3f30d55c8ab0bb3344ff1... server: Filtered packet: [1195] 16030104a6020000570301b3797e3ce5453953069ec92cfb5638e3f30d55c8ab... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301a4748ec070588cbbfd59974b06afa5bab0bd061f8a98054a9d85... record new: [1190] 020000570301a4748ec070588cbbfd59974b06afa5bab0bd061f8a98054a9d85... server: Filtered packet: [1195] 16030104a6020000570301a4748ec070588cbbfd59974b06afa5bab0bd061f8a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703019d4f1b024d98d08606e4376a7f9302664c874c6b839eaaf142d4... record new: [1190] 0200005703019d4f1b024d98d08606e4376a7f9302664c874c6b839eaaf142d4... server: Filtered packet: [1195] 16030104a60200005703019d4f1b024d98d08606e4376a7f9302664c874c6b83... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703011daa6f0475fa32a37c92e5f2660c8c193b7eba29c4d2462709bb... record new: [1191] 0200005703011daa6f0475fa32a37c92e5f2660c8c193b7eba29c4d2462709bb... server: Filtered packet: [1196] 16030104a70200005703011daa6f0475fa32a37c92e5f2660c8c193b7eba29c4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703017bcf710d5a9e9835d02c4134b910ed37922509b354be3476ceb1... record new: [1191] 0200005703017bcf710d5a9e9835d02c4134b910ed37922509b354be3476ceb1... server: Filtered packet: [1196] 16030104a70200005703017bcf710d5a9e9835d02c4134b910ed37922509b354... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703019a7e504d5f0b82c9d2a2b93a83e73fcdfb725bee4b4f7341d36f... record new: [1191] 0200005703019a7e504d5f0b82c9d2a2b93a83e73fcdfb725bee4b4f7341d36f... server: Filtered packet: [1196] 16030104a70200005703019a7e504d5f0b82c9d2a2b93a83e73fcdfb725bee4b... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301fe0a851f4a4b655460b15e4d9c83ea880ad6c6493cc0bb037404... record new: [1191] 020000570301fe0a851f4a4b655460b15e4d9c83ea880ad6c6493cc0bb037404... server: Filtered packet: [1196] 16030104a7020000570301fe0a851f4a4b655460b15e4d9c83ea880ad6c6493c... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030233c206a59567b9863b4138ecc9923d7b3909f3fe955fb0ac45df... record new: [1190] 02000057030233c206a59567b9863b4138ecc9923d7b3909f3fe955fb0ac45df... server: Filtered packet: [1195] 16030204a602000057030233c206a59567b9863b4138ecc9923d7b3909f3fe95... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703026ba090c374989fbc0d411095dc1ee68a4eabd4a3b2f3d928b47a... record new: [1190] 0200005703026ba090c374989fbc0d411095dc1ee68a4eabd4a3b2f3d928b47a... server: Filtered packet: [1195] 16030204a60200005703026ba090c374989fbc0d411095dc1ee68a4eabd4a3b2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030291c02c7af9aa21af97ad95b041d7bc3f192bc5fc2140b616a993... record new: [1190] 02000057030291c02c7af9aa21af97ad95b041d7bc3f192bc5fc2140b616a993... server: Filtered packet: [1195] 16030204a602000057030291c02c7af9aa21af97ad95b041d7bc3f192bc5fc21... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302a4070ce34b06f878dfbf70cdbdc52742386175fd0cccc7a7bad9... record new: [1190] 020000570302a4070ce34b06f878dfbf70cdbdc52742386175fd0cccc7a7bad9... server: Filtered packet: [1195] 16030204a6020000570302a4070ce34b06f878dfbf70cdbdc52742386175fd0c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302eb2f7b4ee5f2943ac762547cd62f59f667d01b6b3971d1f97556... record new: [1190] 020000570302eb2f7b4ee5f2943ac762547cd62f59f667d01b6b3971d1f97556... server: Filtered packet: [1195] 16030204a6020000570302eb2f7b4ee5f2943ac762547cd62f59f667d01b6b39... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302194192d04b20a6c24e35af4537b42bf1290c9a8144e3f17f8fa2... record new: [1190] 020000570302194192d04b20a6c24e35af4537b42bf1290c9a8144e3f17f8fa2... server: Filtered packet: [1195] 16030204a6020000570302194192d04b20a6c24e35af4537b42bf1290c9a8144... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703021396178781f89990c8b9b79b0f5a4925f5666e676bcf25d60830... record new: [1190] 0200005703021396178781f89990c8b9b79b0f5a4925f5666e676bcf25d60830... server: Filtered packet: [1195] 16030204a60200005703021396178781f89990c8b9b79b0f5a4925f5666e676b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030284ee3dcfd8cb08de6f8e487c39ae10f8b4dc4fbc043e1c446ea6... record new: [1190] 02000057030284ee3dcfd8cb08de6f8e487c39ae10f8b4dc4fbc043e1c446ea6... server: Filtered packet: [1195] 16030204a602000057030284ee3dcfd8cb08de6f8e487c39ae10f8b4dc4fbc04... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302049d6350c051bf4d4d82a49f335b1f189de25d94fb8692c22dfd... record new: [1191] 020000570302049d6350c051bf4d4d82a49f335b1f189de25d94fb8692c22dfd... server: Filtered packet: [1196] 16030204a7020000570302049d6350c051bf4d4d82a49f335b1f189de25d94fb... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030237e301851ef89d1f1e279dc21b6852128e975651bd1ecacdcb0d... record new: [1191] 02000057030237e301851ef89d1f1e279dc21b6852128e975651bd1ecacdcb0d... server: Filtered packet: [1196] 16030204a702000057030237e301851ef89d1f1e279dc21b6852128e975651bd... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030271bf9e67c519a398fcae7abb1ca29cf4a4a480a7b9fc475a6179... record new: [1191] 02000057030271bf9e67c519a398fcae7abb1ca29cf4a4a480a7b9fc475a6179... server: Filtered packet: [1196] 16030204a702000057030271bf9e67c519a398fcae7abb1ca29cf4a4a480a7b9... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703027d2b5c114330e2cde9f1b58c381ddedf35a394825f4a97638ac2... record new: [1191] 0200005703027d2b5c114330e2cde9f1b58c381ddedf35a394825f4a97638ac2... server: Filtered packet: [1196] 16030204a70200005703027d2b5c114330e2cde9f1b58c381ddedf35a394825f... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030331e21172425d842e68952481d522609710caef2e769bf2085403... record new: [1192] 02000057030331e21172425d842e68952481d522609710caef2e769bf2085403... server: Filtered packet: [1197] 16030304a802000057030331e21172425d842e68952481d522609710caef2e76... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703039c754ea0c69d21a0507229ae24828a980fc109edec9d5fab4447... record new: [1192] 0200005703039c754ea0c69d21a0507229ae24828a980fc109edec9d5fab4447... server: Filtered packet: [1197] 16030304a80200005703039c754ea0c69d21a0507229ae24828a980fc109edec... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703035328932ca354566765b7a4e8d5532166dcb39c712bbbac595354... record new: [1192] 0200005703035328932ca354566765b7a4e8d5532166dcb39c712bbbac595354... server: Filtered packet: [1197] 16030304a80200005703035328932ca354566765b7a4e8d5532166dcb39c712b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303a9cef0dd185d0709318badfe97be6eceda1d67b3fe48032a25e8... record new: [1192] 020000570303a9cef0dd185d0709318badfe97be6eceda1d67b3fe48032a25e8... server: Filtered packet: [1197] 16030304a8020000570303a9cef0dd185d0709318badfe97be6eceda1d67b3fe... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303133e5a848baa2a5ade03a3912710ed1ae0ced23d2570b4ab81ab... record new: [1192] 020000570303133e5a848baa2a5ade03a3912710ed1ae0ced23d2570b4ab81ab... server: Filtered packet: [1197] 16030304a8020000570303133e5a848baa2a5ade03a3912710ed1ae0ced23d25... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703031fa85b328e5d2a1fce27451af336caf1abd487d45af595ce400e... record new: [1192] 0200005703031fa85b328e5d2a1fce27451af336caf1abd487d45af595ce400e... server: Filtered packet: [1197] 16030304a80200005703031fa85b328e5d2a1fce27451af336caf1abd487d45a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030308d41c13f47cd30f7bad9fa29b6f1aa5b7093b1f1710094a1fde... record new: [1192] 02000057030308d41c13f47cd30f7bad9fa29b6f1aa5b7093b1f1710094a1fde... server: Filtered packet: [1197] 16030304a802000057030308d41c13f47cd30f7bad9fa29b6f1aa5b7093b1f17... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303a891ea6c679bd2f81954a840933ec4f19691b4b488de51523d12... record new: [1192] 020000570303a891ea6c679bd2f81954a840933ec4f19691b4b488de51523d12... server: Filtered packet: [1197] 16030304a8020000570303a891ea6c679bd2f81954a840933ec4f19691b4b488... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303d83765166fd7e5c9bceecdb260b4c833f3e5e7860acccd7cd651... record new: [1193] 020000570303d83765166fd7e5c9bceecdb260b4c833f3e5e7860acccd7cd651... server: Filtered packet: [1198] 16030304a9020000570303d83765166fd7e5c9bceecdb260b4c833f3e5e7860a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303e4b00f7beac6ffe2f5f88064749bdd7b86708a800f81c49971fa... record new: [1193] 020000570303e4b00f7beac6ffe2f5f88064749bdd7b86708a800f81c49971fa... server: Filtered packet: [1198] 16030304a9020000570303e4b00f7beac6ffe2f5f88064749bdd7b86708a800f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303403f5b18f7740ca527af5630dd5c1e8ce420044b4f883a228fd6... record new: [1193] 020000570303403f5b18f7740ca527af5630dd5c1e8ce420044b4f883a228fd6... server: Filtered packet: [1198] 16030304a9020000570303403f5b18f7740ca527af5630dd5c1e8ce420044b4f... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030391cce459cab30499d86d55bfeea5f07f4ce3c4bca72f66fc080f... record new: [1193] 02000057030391cce459cab30499d86d55bfeea5f07f4ce3c4bca72f66fc080f... server: Filtered packet: [1198] 16030304a902000057030391cce459cab30499d86d55bfeea5f07f4ce3c4bca7... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010047f1a8f7cf28d7eb94ac612e593f5cdfc8d6cdf13646dc7bf16d0f3605ab... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010047f1a8f7cf28d7eb94ac612e593f5cdfc8d6cdf13646dc7bf16d... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003bada611549ac4dc04e426d2b22a82bd44b7e5af68a29676446a2072ea14... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201003bada611549ac4dc04e426d2b22a82bd44b7e5af68a29676446a... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e1a99d9d0bd06e10ce2b8bb2a5a6d174ac41b3a82c65cbc3d89e3a8a5e80... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100e1a99d9d0bd06e10ce2b8bb2a5a6d174ac41b3a82c65cbc3d89e... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004e6b0f75db8e6df075dfdcafc112ee97543c3486c6e098e9a5ddbc7dc34e... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201004e6b0f75db8e6df075dfdcafc112ee97543c3486c6e098e9a5dd... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004a988ea6cd4365bed6526f1911dc935fbc871301f415c1081f9044c9d9ad... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201004a988ea6cd4365bed6526f1911dc935fbc871301f415c1081f90... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000945076bb00a0cb63aa04e8649274e67657429f0273a8c30c928539f20dd... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201000945076bb00a0cb63aa04e8649274e67657429f0273a8c30c928... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009a44da711897d8d44ebca873e92f1c3cabb9f3e017035c34d9812fa481ad... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201009a44da711897d8d44ebca873e92f1c3cabb9f3e017035c34d981... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a7a6de81866fcef2fdb0ec58a38232c9ffb02e8c18e8b49e009a518f1143... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100a7a6de81866fcef2fdb0ec58a38232c9ffb02e8c18e8b49e009a... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010019618f07f9fa880568a397ce845e8281e630580e6174319ec9772ff4e619... handshake new: [259] 01010119618f07f9fa880568a397ce845e8281e630580e6174319ec9772ff4e6... record old: [262] 10000102010019618f07f9fa880568a397ce845e8281e630580e6174319ec977... record new: [263] 1000010301010119618f07f9fa880568a397ce845e8281e630580e6174319ec9... client: Filtered packet: [327] 16030101071000010301010119618f07f9fa880568a397ce845e8281e630580e... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e821d983ad3dbce379544de0c05a28642691f8457f9cac7369cb612145e9... handshake new: [259] 010101e821d983ad3dbce379544de0c05a28642691f8457f9cac7369cb612145... record old: [262] 100001020100e821d983ad3dbce379544de0c05a28642691f8457f9cac7369cb... record new: [263] 10000103010101e821d983ad3dbce379544de0c05a28642691f8457f9cac7369... client: Filtered packet: [327] 160301010710000103010101e821d983ad3dbce379544de0c05a28642691f845... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009b5776d2b28647975b58a86ae3a74cc48da4ba456b998f21facb9571d60a... handshake new: [259] 0101009b5776d2b28647975b58a86ae3a74cc48da4ba456b998f21facb9571d6... record old: [262] 1000010201009b5776d2b28647975b58a86ae3a74cc48da4ba456b998f21facb... record new: [263] 100001030101009b5776d2b28647975b58a86ae3a74cc48da4ba456b998f21fa... client: Filtered packet: [327] 1603010107100001030101009b5776d2b28647975b58a86ae3a74cc48da4ba45... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010064e7e50837fa3874941df67c3adffcbf9894b44e70798bbcd39b15314d81... handshake new: [259] 01010064e7e50837fa3874941df67c3adffcbf9894b44e70798bbcd39b15314d... record old: [262] 10000102010064e7e50837fa3874941df67c3adffcbf9894b44e70798bbcd39b... record new: [263] 1000010301010064e7e50837fa3874941df67c3adffcbf9894b44e70798bbcd3... client: Filtered packet: [327] 16030101071000010301010064e7e50837fa3874941df67c3adffcbf9894b44e... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (8 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003b40bc4541ed006332df470049d5a39613ed20844b0dbb5d3b6f019e5f53... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201003b40bc4541ed006332df470049d5a39613ed20844b0dbb5d3b6f... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f32cea2abd5962dba700709d8636c29119fe144fa229e916371e0e48ff89... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100f32cea2abd5962dba700709d8636c29119fe144fa229e916371e... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006f284e0be7550c071dfc0147db5a2ab653ef34a958d94224280a0bc78e3c... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201006f284e0be7550c071dfc0147db5a2ab653ef34a958d94224280a... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e15d68fc6d21f6a4f245ec80f7ff253f0a2ef513aa11bcbe8f73f8b68849... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100e15d68fc6d21f6a4f245ec80f7ff253f0a2ef513aa11bcbe8f73... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fa26373bd9a8902ff0ad1a6d4c26d21de3bd31ce1939ab2bd056cb4091ee... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100fa26373bd9a8902ff0ad1a6d4c26d21de3bd31ce1939ab2bd056... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100739d781ea31bd0bab62ac67474e2348fa7115c1044c6e10fc457d093b7bd... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100739d781ea31bd0bab62ac67474e2348fa7115c1044c6e10fc457... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010087b796a101553d5f618181a6fca5947457def5fa1c130626ce2a2fa454da... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 10000102010087b796a101553d5f618181a6fca5947457def5fa1c130626ce2a... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f7042eebea36149b060ad9fbd0f40f24f17370ac8e2e652f58157d8d3eda... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100f7042eebea36149b060ad9fbd0f40f24f17370ac8e2e652f5815... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003b8fc6f1490726005ef331ade24694bd46e4c6dd90c177738a954ee3ced6... handshake new: [259] 0101013b8fc6f1490726005ef331ade24694bd46e4c6dd90c177738a954ee3ce... record old: [262] 1000010201003b8fc6f1490726005ef331ade24694bd46e4c6dd90c177738a95... record new: [263] 100001030101013b8fc6f1490726005ef331ade24694bd46e4c6dd90c177738a... client: Filtered packet: [343] 1603020107100001030101013b8fc6f1490726005ef331ade24694bd46e4c6dd... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007a595994c1f627859ebf5e656821aaace102c7924f33d0b0204be0f656f4... handshake new: [259] 0101017a595994c1f627859ebf5e656821aaace102c7924f33d0b0204be0f656... record old: [262] 1000010201007a595994c1f627859ebf5e656821aaace102c7924f33d0b0204b... record new: [263] 100001030101017a595994c1f627859ebf5e656821aaace102c7924f33d0b020... client: Filtered packet: [343] 1603020107100001030101017a595994c1f627859ebf5e656821aaace102c792... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007936e1218f8ea89ad8e705ab05c367a1109daa2401376a95ec89cbaa0f23... handshake new: [259] 0101007936e1218f8ea89ad8e705ab05c367a1109daa2401376a95ec89cbaa0f... record old: [262] 1000010201007936e1218f8ea89ad8e705ab05c367a1109daa2401376a95ec89... record new: [263] 100001030101007936e1218f8ea89ad8e705ab05c367a1109daa2401376a95ec... client: Filtered packet: [343] 1603020107100001030101007936e1218f8ea89ad8e705ab05c367a1109daa24... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (8 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e240289b1953994da91aa692e25ee13e7167465ecab9f75bc85aa63fa791... handshake new: [259] 010100e240289b1953994da91aa692e25ee13e7167465ecab9f75bc85aa63fa7... record old: [262] 100001020100e240289b1953994da91aa692e25ee13e7167465ecab9f75bc85a... record new: [263] 10000103010100e240289b1953994da91aa692e25ee13e7167465ecab9f75bc8... client: Filtered packet: [343] 160302010710000103010100e240289b1953994da91aa692e25ee13e7167465e... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010009a6a11ee223201f12fc1f8d0ebf731ca14beaf4f3a02bca7d64dcda9227... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010009a6a11ee223201f12fc1f8d0ebf731ca14beaf4f3a02bca7d64... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001cd3d8f8218345ff5970f77b75d2efa9743d066f2896ae4a31465928f4fd... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201001cd3d8f8218345ff5970f77b75d2efa9743d066f2896ae4a3146... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010007b9ea8354e2bb4c4ee5d202659491527c60b24be6a51157f08fcae955b0... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010007b9ea8354e2bb4c4ee5d202659491527c60b24be6a51157f08f... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010062d8bb248ab2db6cd989846b7f1221c78771e20f6cc9e7327cb1c3608f5f... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010062d8bb248ab2db6cd989846b7f1221c78771e20f6cc9e7327cb1... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100778c376d0458af1ac2c1aeb866a6e5ac534a5589b1bf3ab7c3c3ad30275e... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100778c376d0458af1ac2c1aeb866a6e5ac534a5589b1bf3ab7c3c3... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010046a7175c5c072b2df9941b35d6c404828cd49f7ef839cdf7f7538a149694... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010046a7175c5c072b2df9941b35d6c404828cd49f7ef839cdf7f753... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010003210dd71a9a09b183e254e6edb25ede3930e768b335a0a6f4a3baa59e4f... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 10000102010003210dd71a9a09b183e254e6edb25ede3930e768b335a0a6f4a3... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010015eb4beca041efa2e4f9025b588a8ca05ac0d5e29bfb94e12775c3323cf4... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 10000102010015eb4beca041efa2e4f9025b588a8ca05ac0d5e29bfb94e12775... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010067c349e17ea57c8ef16183360f5b5303c069d42973e148c7865fe8e119a5... handshake new: [259] 01010167c349e17ea57c8ef16183360f5b5303c069d42973e148c7865fe8e119... record old: [262] 10000102010067c349e17ea57c8ef16183360f5b5303c069d42973e148c7865f... record new: [263] 1000010301010167c349e17ea57c8ef16183360f5b5303c069d42973e148c786... client: Filtered packet: [319] 16030301071000010301010167c349e17ea57c8ef16183360f5b5303c069d429... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f344c73fe1b1010f27e35642f830ddaf9c1c58a144ab82074a5e7020715e... handshake new: [259] 010101f344c73fe1b1010f27e35642f830ddaf9c1c58a144ab82074a5e702071... record old: [262] 100001020100f344c73fe1b1010f27e35642f830ddaf9c1c58a144ab82074a5e... record new: [263] 10000103010101f344c73fe1b1010f27e35642f830ddaf9c1c58a144ab82074a... client: Filtered packet: [319] 160303010710000103010101f344c73fe1b1010f27e35642f830ddaf9c1c58a1... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010098b0cd367fdf8de5d9f4f55c4b1f46b4e348cd38893e642f376b78893076... handshake new: [259] 01010098b0cd367fdf8de5d9f4f55c4b1f46b4e348cd38893e642f376b788930... record old: [262] 10000102010098b0cd367fdf8de5d9f4f55c4b1f46b4e348cd38893e642f376b... record new: [263] 1000010301010098b0cd367fdf8de5d9f4f55c4b1f46b4e348cd38893e642f37... client: Filtered packet: [319] 16030301071000010301010098b0cd367fdf8de5d9f4f55c4b1f46b4e348cd38... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (8 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008dfbdd5c81ab519330fe43214128ce0fe80552a81b426a689a166de5532a... handshake new: [259] 0101008dfbdd5c81ab519330fe43214128ce0fe80552a81b426a689a166de553... record old: [262] 1000010201008dfbdd5c81ab519330fe43214128ce0fe80552a81b426a689a16... record new: [263] 100001030101008dfbdd5c81ab519330fe43214128ce0fe80552a81b426a689a... client: Filtered packet: [319] 1603030107100001030101008dfbdd5c81ab519330fe43214128ce0fe80552a8... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (8 ms) [----------] 72 tests from DamageYStream/TlsDamageDHYTest (412 ms total) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffcff7719e85... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff30514a4ee5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff791faf1602... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffa124801208... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff316e02d847... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff7b0a308e45... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff075f0d686d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff1f103c2e47... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff100d8fba96... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff2d5112a564... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feffe8bfdfe047... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feffe7bf392b0e... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdd80950a322... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd01015d15e7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd200217e735... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdfc7616ec0c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd089e743e66... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd460e856426... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd5b1b303314... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd55289adea0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd367092a20a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefdf4b7c23975... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd09a1009478... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd568bb2d7ce... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100cf4c2db77bad6877938c72ed8a457a80d3c14ed81d19075dca46e0dbbd77... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100cf4c2db77bad6877938c72ed8a457a80d3c1... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100564fb598c6e05138911dde183e2dcefbcbd3f60b6b2fa7cd41fead6e797d... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100564fb598c6e05138911dde183e2dcefbcbd3... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010083006ade3c7725746eeb1c1a420fef1355058cff173d09f30337146b9c99... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010083006ade3c7725746eeb1c1a420fef135505... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006520f1c216fa8b04b34b6aa91f5639e46bb1ac3a10366180f78768e305b4... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201006520f1c216fa8b04b34b6aa91f5639e46bb1... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100612cb76062624ca89b96a1479f124db007432206faced10ba40f619a88ec... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100612cb76062624ca89b96a1479f124db00743... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005ba267698ba4f9ec892e0ad5464677f55b6c73af9a9ab452a5b50825c519... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201005ba267698ba4f9ec892e0ad5464677f55b6c... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010007bb9925604ba920f1b58b691d0362110709f6a353599f47c0b0302038c5... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 100001020001000000000102010007bb9925604ba920f1b58b691d0362110709... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010019afef313a65ad4dae71696a5cebf92edc4f7b8d2873d04b6594c483c23b... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 100001020001000000000102010019afef313a65ad4dae71696a5cebf92edc4f... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ab3a1a6ffd877ed1c452a7405ac3447a9b1560f176c4902e583e61337456... handshake new: [259] 010101ab3a1a6ffd877ed1c452a7405ac3447a9b1560f176c4902e583e613374... record old: [270] 1000010200010000000001020100ab3a1a6ffd877ed1c452a7405ac3447a9b15... record new: [271] 100001030001000000000103010101ab3a1a6ffd877ed1c452a7405ac3447a9b... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101ab3a1a6f... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100688be88e63c3b05cf26afae31bb879ce218b6326982c37b5ed8c40f5302b... handshake new: [259] 010101688be88e63c3b05cf26afae31bb879ce218b6326982c37b5ed8c40f530... record old: [270] 1000010200010000000001020100688be88e63c3b05cf26afae31bb879ce218b... record new: [271] 100001030001000000000103010101688be88e63c3b05cf26afae31bb879ce21... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101688be88e... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b17902315271dd8eeed959618eada17940474d67d6bd47bde5ef8008ae25... handshake new: [259] 010100b17902315271dd8eeed959618eada17940474d67d6bd47bde5ef8008ae... record old: [270] 1000010200010000000001020100b17902315271dd8eeed959618eada1794047... record new: [271] 100001030001000000000103010100b17902315271dd8eeed959618eada17940... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010100b1790231... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ff6ecf74011ab843c97d0f16d1c94b54d36dbf785f7dcbd82c162a303c30... handshake new: [259] 010100ff6ecf74011ab843c97d0f16d1c94b54d36dbf785f7dcbd82c162a303c... record old: [270] 1000010200010000000001020100ff6ecf74011ab843c97d0f16d1c94b54d36d... record new: [271] 100001030001000000000103010100ff6ecf74011ab843c97d0f16d1c94b54d3... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010100ff6ecf74... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (8 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e1eec8234cfacd35ebb4e8f380b643128bd9241f59e15c0f6dc1bce4e477... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100e1eec8234cfacd35ebb4e8f380b643128bd9... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fb0ba8678897752fa8f316e2dffd1e23c77c499df905110f8f0c778e3b1a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100fb0ba8678897752fa8f316e2dffd1e23c77c... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010005bb6e71937ea23e41fedf4e1f0b60449d972525ac9e0b6085adf18ae271... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010005bb6e71937ea23e41fedf4e1f0b60449d97... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100612f0545e34e16b2e36327832f81894d9ecd82332b7a260e8d0fbedce7dc... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100612f0545e34e16b2e36327832f81894d9ecd... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100cc84939358f2e28a16108c5dc9e57c2d2217c4fb8743f1398426724a9f9b... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100cc84939358f2e28a16108c5dc9e57c2d2217... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a3e40ff09486c25ee8dd304be53629b45378c63c465ac0dcf6d3612ac311... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100a3e40ff09486c25ee8dd304be53629b45378... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010057b3cbf6f99c4a7c19652d54e6bc4d07a6547d28106dc86bec392670af8a... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 100001020001000000000102010057b3cbf6f99c4a7c19652d54e6bc4d07a654... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007284b31f4dc9eb8ea49ad9d25fc84662c8bed1da00e79e17142d6032f332... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201007284b31f4dc9eb8ea49ad9d25fc84662c8be... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c1f665f40df338e20a85d744ead0a938eafcf9792e4acd480d6f32160b05... handshake new: [259] 010101c1f665f40df338e20a85d744ead0a938eafcf9792e4acd480d6f32160b... record old: [270] 1000010200010000000001020100c1f665f40df338e20a85d744ead0a938eafc... record new: [271] 100001030001000000000103010101c1f665f40df338e20a85d744ead0a938ea... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101c1f665f4... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a214badc03de6546d96fe9bf8f5e7079206897645eb938b6f7d32c2d5199... handshake new: [259] 010101a214badc03de6546d96fe9bf8f5e7079206897645eb938b6f7d32c2d51... record old: [270] 1000010200010000000001020100a214badc03de6546d96fe9bf8f5e70792068... record new: [271] 100001030001000000000103010101a214badc03de6546d96fe9bf8f5e707920... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101a214badc... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f604d8be1693f4e3941dce9a9727c1f8ad8ebab13fc3d167472bcec67664... handshake new: [259] 010100f604d8be1693f4e3941dce9a9727c1f8ad8ebab13fc3d167472bcec676... record old: [270] 1000010200010000000001020100f604d8be1693f4e3941dce9a9727c1f8ad8e... record new: [271] 100001030001000000000103010100f604d8be1693f4e3941dce9a9727c1f8ad... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010100f604d8be... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e2729370d3288031cb42362bb84da7c36348a0e8f70f5ef62d56cc5668e0... handshake new: [259] 010100e2729370d3288031cb42362bb84da7c36348a0e8f70f5ef62d56cc5668... record old: [270] 1000010200010000000001020100e2729370d3288031cb42362bb84da7c36348... record new: [271] 100001030001000000000103010100e2729370d3288031cb42362bb84da7c363... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010100e2729370... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (8 ms) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (275 ms total) [----------] 14 tests from DatagramPre13/TlsConnectDatagramPre13 [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/0 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/1 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/0 (54 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/1 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Drop packet client: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/0 (463 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Drop packet client: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/1 (460 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/0 (356 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/1 (357 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/0 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/1 (54 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/0 (357 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/1 (357 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/0 (357 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/1 (357 ms) [----------] 14 tests from DatagramPre13/TlsConnectDatagramPre13 (3392 ms total) [----------] 22 tests from DatagramDrop13/TlsDropDatagram13 [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 0:[187] 010000af00000000000000affefdf836dd98d9a4656919584e2f8658363281f5... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/0 (56 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 0:[187] 010000af00000000000000affefdd630f6761d2af3fc47cd1cc736b802b1d8a6... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/1 (56 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd5beee3b8dceb744328d0aaad124cea2b82df... record drop: DTLS 1.3 <46> 200000000a509:[65] f7b8bed333616ccbdf79703615c989ce59e9b42f08d29a9f1260da41e86b6d7b... record drop: DTLS 1.3 <46> 2000000009b83:[470] dee0f6968ae3c2011fdf1cf8ee1fe84bfba2b48e6a3a8a10e3bc97c84cc9622f... record drop: DTLS 1.3 <46> 200000000d923:[161] 09df655fc315446f78b6d5d06d6d4bce786cb9a2260c5d3c190d0d0f9d5f6863... record drop: DTLS 1.3 <46> 200000000f9e7:[61] bd323655acfbb5036f8b40f3dbb8b455f32a07c4c8f51f5387c021005f3d29ae... server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/0 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefdbe4984e98a17f35369ac6f35d0451f34367b... record drop: DTLS 1.3 <46> 200000000f3e0:[65] 503b3cf8e8eeb2602b1f856ca7309a563c8bfe936d534d2d57385981080e23b9... record drop: DTLS 1.3 <46> 200000000bb95:[470] 108a55d336bdea183c4bb105b0ee015e66738b8f05fb67668b3d1586bf157824... record drop: DTLS 1.3 <46> 2000000009b08:[161] d61b80fcaae1dc996644450038e9e2cf29cbf8ae6060612f8e87d67866e9b639... record drop: DTLS 1.3 <46> 2000000003f35:[61] e3603ceae8510ae3cebca01bc294196c6d159ae7f6fc7535e86eb5458cb83c1c... server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/1 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd512b5eaeab59d25e43f8a023c599eea38431... server: Filtered packet: [777] 2eadc000410ec73bb20ef9fee12dfce233c6a9710e3e6f3c3644a86822259fb8... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/0 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd8bad67780533b163248ca028eecc7920affb... server: Filtered packet: [777] 2e3384004101f6d2d44bd7c5bfb880c7d00a889f65025517efd15149d8f10e00... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/1 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000a5ad:[65] 1824c1753e6cf73a6455322e4b69f3caa6dd590c7c0f5305e1711010dde36de8... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefdd8f9af572c... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000003649:[65] c4db6b314ddacbc5e1e8987ab4686b7f3490937abcf42493d3e76f832b657b74... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefdd9469f8f38... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/1 (5 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED record drop: DTLS 1.3 <35> 30000000000d0:[27] 2de1253c09bc356ccd7ef91c3b07b1c6d1bf1b6348f530ee1606aa server: Drop packet Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED record drop: DTLS 1.3 <47> 30000000039c6:[27] 019aa52a2c8ca65070d82644714a5fffab2bef6da10fc79b107571 server: Drop packet Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/1 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 20000000032f9:[161] 15034e39c42052c1a2633c3ccbb059f427c3adb482d4296fad03824613507cd3... client: Filtered packet: [547] 2e185101dccfd5b04aa9a89d50392979428e15a0488867321c5b159bbd829c1d... client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/0 (20 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000003ce4:[161] c85b8c3440d5e9ee59885b5ab407eb871a2e3abf95ead0e4d98a8cd6b7be6636... client: Filtered packet: [547] 2eedb901dcb8c3c61299d524db31909a0ca207be370732c4bc529f577502b531... client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/1 (19 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000e8be:[259] 2adbcbb0ea2b17feb1850948eb4c68f5bbd7220ed45bf7578a873a16e374f07b... server: Filtered packet: [181] 16fefd00000000000000000062020000560000000000000056fefd43eaae3ccf... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000003a72:[259] 8b30306b89ad10b0a18a533ce134666f308debc57791be840fa5058e1704402f... server: Filtered packet: [181] 16fefd00000000000000000062020000560000000000000056fefd880b3ab1e6... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/1 (5 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000f21f:[240] 40be686c118b465c5a83852b1ca0d9bf81488d618d131203b2f405f2b56b521b... server: Filtered packet: [166] 2e9e3000a106b31f34ead5330c6a3150e483b8718ddc09f7319dd08ef5082b04... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000009411:[240] f4de238d2f1b2d41be0828532bd486ed8c33629fb3924727c7884772642096cd... server: Filtered packet: [166] 2e5bde00a1269a08288aa88b4f6e27d136dd93fbac550c80a7878dd3c062ee1d... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/1 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/0 (9 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/1 (8 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake record drop: DTLS 1.3 <46> 2000000005f25:[69] 6755833de1e81413e0765ebf71cb36a4d7cfa00e226404d2352c84c5e915b46c... server: Filtered packet: [183] 16fefd000000000000000000680200005c000000000000005cfefd722dbc8688... 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/0 (9 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake record drop: DTLS 1.3 <46> 2000000001c83:[69] df8a8581fbefeede7192d7c4b07a0b97166b4e3d836462c0d4f728367464d512... server: Filtered packet: [183] 16fefd000000000000000000680200005c000000000000005cfefd83025a1d0e... 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/1 (8 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 20000000088c0:[65] 4cce1501c511b2c37f3c99a13c3439e0f4c3e28a3201c58b9031d610ea0ff9a5... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefd339f286168... server: Send Direct [70] 2e88c000414cce1501c511b2c37f3c99a13c3439e0f4c3e28a3201c58b9031d6... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/0 (5 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000002e97:[65] 1a6832a6dd8dcea84f60eb2e0c75be120f21d1f91337e3f20e8340c5fe412370... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefda9861534b1... server: Send Direct [70] 2e2e9700411a6832a6dd8dcea84f60eb2e0c75be120f21d1f91337e3f20e8340... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/1 (4 ms) [----------] 22 tests from DatagramDrop13/TlsDropDatagram13 (448 ms total) [----------] 4 tests from DatagramFragment13/TlsFragmentationAndRecoveryTest [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000eb3e:[470] 382305371a443d9acf784cad0f57e37585987389d3144b62fba71916a1b7fa9a... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefd65f4a50048... record drop: DTLS 1.3 <46> 2000000004553:[251] 572577e16402f014124bc7fdd6edba999ea44ea08e3cb8957764d26c827c14e2... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000005 client: Drop packet record drop: DTLS 1.3 <46> 2000000007ccd:[177] d77793114dfe28eb4b370bf59d35a198611a61a027e3ee21f80ffa360be2f9b3... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/0 (5 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 20000000057d3:[470] 2a5519e6419f859b7b602cbab4411390b26101dc93f5754ca723b6410582296e... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefdf972ceeeda... record drop: DTLS 1.3 <46> 200000000b8ff:[251] 37b1c364c5c20bb5a7eb720551cffadecb1ff9a2c5b14822af3384d6da9c78be... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000005 client: Drop packet record drop: DTLS 1.3 <46> 200000000ea8b:[177] ecf749cbe8064f04100b98535ec7e608643862d663fb13a7c028dddf175226e1... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/1 (4 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000a8ee:[470] e86e0c02a7e6077ed0f244a111e33fd407b18a39618764400a7f5e3eda38ff6e... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefd6cd53f2d68... record drop: DTLS 1.3 <46> 2000000003b66:[248] a6f909a59f4f5bdc89720d76fd0a90e24e56d307f28e45845f3331ba3bf0184e... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000004 client: Drop packet record drop: DTLS 1.3 <46> 2000000002efd:[177] 6c385dbe6168691c0485f4ed902505740c6c2e6b5d94631618149ea3d429af9b... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/0 (5 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000a22e:[470] 41d0c4625da22f0508165a5e3cd335622de98d90943cbb80be976ddb8280acc8... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefdb63aea332a... record drop: DTLS 1.3 <46> 200000000287e:[248] e0cd1307f7a620ad069d4387843413f8a4c33f647d03708dd1e1d1c79dd10622... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000004 client: Drop packet record drop: DTLS 1.3 <46> 200000000f5db:[177] 19d8892bf4bb7e27d6b0356eaa3473cfd69fdb3e8c70c080007cd1018f14e2f1... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/1 (4 ms) [----------] 4 tests from DatagramFragment13/TlsFragmentationAndRecoveryTest (18 ms total) [----------] 6 tests from DatagramReorder13/TlsReorderDatagram13 [ RUN ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd5479053bcb6b0afc173e35a32da43b0bcc14... record drop: DTLS 1.3 <46> 2000000003f83:[65] 17ac7fb6bfb000b5aac1373750fda1b9df2dc67e4d51719e59f470a0403e8b90... record drop: DTLS 1.3 <46> 2000000003d91:[259] 78c9509efa3adb54e87ba5b1e859d540d6674a68dc48f2d9a3020ed1d038056d... server: Drop packet record drop: DTLS 1.3 <46> 200000000e44d:[240] 02815624b84bf3a4070dc9567d3cd8e4e1c42756d87b536351b4bd79e050cca4... record drop: DTLS 1.3 <46> 200000000e160:[161] 1ee95d4ca05c8e4306fcbddfe7c432abf64ed1dd3423ec769c2ec39687ca6c67... server: Drop packet record drop: DTLS 1.3 <46> 200000000269a:[61] 8dd2df273f8aeea28cf799dde8a0367a4e64e40939b738527d98226fb758c4d0... server: Drop packet server: Send Direct [111] 16fefd00000000000000000062020000560000000000000056fefd5479053bcb... server: Send Direct [70] 2e3f83004117ac7fb6bfb000b5aac1373750fda1b9df2dc67e4d51719e59f470... server: Send Direct [245] 2ee44d00f002815624b84bf3a4070dc9567d3cd8e4e1c42756d87b536351b4bd... server: Send Direct [264] 2e3d91010378c9509efa3adb54e87ba5b1e859d540d6674a68dc48f2d9a3020e... server: Send Direct [166] 2ee16000a11ee95d4ca05c8e4306fcbddfe7c432abf64ed1dd3423ec769c2ec3... server: Send Direct [66] 2e269a003d8dd2df273f8aeea28cf799dde8a0367a4e64e40939b738527d9822... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/0 (5 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd69c346af15156822bcadf305c6ce9f7ffb58... record drop: DTLS 1.3 <46> 200000000d79c:[65] 255cd54544be082b8929f6a69890821b1298a1f79e3d2bbf1fcb92e86d650e75... record drop: DTLS 1.3 <46> 2000000005436:[259] c9b9778d3f961d494011fa295d858b8bbc19d5c265769e726476bedf467298ec... server: Drop packet record drop: DTLS 1.3 <46> 200000000ad52:[240] 6fdab31fdff14c579a42e1cd1340f3b2dbda3b6abab59d7c6113d03c1327996d... record drop: DTLS 1.3 <46> 200000000856b:[161] 67b57c933ea85787924310b8ad2cc376f528706cbb5268e123e9c4404890a0a2... server: Drop packet record drop: DTLS 1.3 <46> 2000000006316:[61] f2868f679f29bbd9947bf0885ae1c12b575b9db186f1aa9353d3d36eaed4ae8b... server: Drop packet server: Send Direct [111] 16fefd00000000000000000062020000560000000000000056fefd69c346af15... server: Send Direct [70] 2ed79c0041255cd54544be082b8929f6a69890821b1298a1f79e3d2bbf1fcb92... server: Send Direct [245] 2ead5200f06fdab31fdff14c579a42e1cd1340f3b2dbda3b6abab59d7c6113d0... server: Send Direct [264] 2e54360103c9b9778d3f961d494011fa295d858b8bbc19d5c265769e726476be... server: Send Direct [166] 2e856b00a167b57c933ea85787924310b8ad2cc376f528706cbb5268e123e9c4... server: Send Direct [66] 2e6316003df2868f679f29bbd9947bf0885ae1c12b575b9db186f1aa9353d3d3... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/1 (4 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 100000000e891:[23] 61d00f89908d86d260e8d70b94b2af6137b5cf8841bb27 client: Drop packet record drop: DTLS 1.3 <45> 100000000da28:[29] 958884c3341fbfdb80e74b15147cca0db39a12401fdb1883a1b91450f5 record drop: DTLS 1.3 <46> 2000000007ccf:[61] 279bd6b73c01896d337781ec9d572915b39da7700b8dbb1a32b16301aece5cff... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2dda28001d958884c3341fbfdb80e74b15147cca0db39a12401fdb1883a1b914... client: Send Direct [28] 2de891001761d00f89908d86d260e8d70b94b2af6137b5cf8841bb27 client: Send Direct [66] 2e7ccf003d279bd6b73c01896d337781ec9d572915b39da7700b8dbb1a32b163... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/0 (9 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 100000000da5a:[23] 21293727329e0e57144c90a01bd1485ed72fc95c5be7e7 client: Drop packet record drop: DTLS 1.3 <45> 1000000002daf:[29] 5271feadc7e763cac21c5f3434ba3748c39722569d73515b8c3ea127c1 record drop: DTLS 1.3 <46> 200000000170f:[61] f3e9dfa3ea128eaeacc5df200fa0ac6e880e2461b08abd74c53b9ffd3f774a0a... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d2daf001d5271feadc7e763cac21c5f3434ba3748c39722569d73515b8c3ea1... client: Send Direct [28] 2dda5a001721293727329e0e57144c90a01bd1485ed72fc95c5be7e7 client: Send Direct [66] 2e170f003df3e9dfa3ea128eaeacc5df200fa0ac6e880e2461b08abd74c53b9f... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/1 (8 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 10000000050c0:[23] edee854c4412f184325bfc033b47cae4b89d38a806e6b6 client: Drop packet record drop: DTLS 1.3 <45> 100000000ddc5:[29] 9753520c6ef4ca9cf965ce0259d7d93d39cf36865ce3e35ae3c621ebfb record drop: DTLS 1.3 <46> 2000000000fd0:[61] 76087cb5c39a3ed45895b3cb16a2194b33c4f5253b81f4b9841d6b22f33ab240... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2dddc5001d9753520c6ef4ca9cf965ce0259d7d93d39cf36865ce3e35ae3c621... client: Send Direct [66] 2e0fd0003d76087cb5c39a3ed45895b3cb16a2194b33c4f5253b81f4b9841d6b... client: Send Direct [28] 2d50c00017edee854c4412f184325bfc033b47cae4b89d38a806e6b6 server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/0 (9 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 100000000c440:[23] 6995b8f57e9d06346754b492a9a5d5df0cffd9c1bfc1cc client: Drop packet record drop: DTLS 1.3 <45> 10000000056c0:[29] 5cbba7d628133b3207d0a57ef4a36dcaee2d849a45fce162c3d054b5cc record drop: DTLS 1.3 <46> 200000000969c:[61] b282bca5201e29021429ec93064f7d0afd77b19120b79c4b1221633122c55eb8... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d56c0001d5cbba7d628133b3207d0a57ef4a36dcaee2d849a45fce162c3d054... client: Send Direct [66] 2e969c003db282bca5201e29021429ec93064f7d0afd77b19120b79c4b122163... client: Send Direct [28] 2dc44000176995b8f57e9d06346754b492a9a5d5df0cffd9c1bfc1cc server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/1 (9 ms) [----------] 6 tests from DatagramReorder13/TlsReorderDatagram13 (44 ms total) [----------] 24 tests from DatagramOnly/TlsConnectDatagram [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/2 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [794] 2cfefd00000000000000000004010203042e26a30041eb5bc87f37f67ced7b48... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/0 (54 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [698] 17fefd000000000000000000040102030416fefd000000000000000101c20b00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/1 (54 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [696] 17feff000000000000000000040102030416feff000000000000000101c20b00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/2 (55 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/0 (56 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/1 (55 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/2 (55 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [231] 16feff00000000000000000066010000b5000000000000005afefd407dfd13c9... client: Filtered packet: [66] 2e5281003d1edab90ee54d6ed292dc428fe9b286f9a29671e754c38a8eccd3e3... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [72] 2ffb1c0043cacad40f6b28e42c716c53b5f7478597c77336669a19ed47ea8db5... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [24] 2f033700133f652911eeeaf01531f441b8f6c3dc4d7ff8c2 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [234] 16feff00000000000000000068010000b8000000000000005cfefd9fcc765880... client: Filtered packet: [158] 16fefd0000000000000002001c100000210001000000000010206a8bb33da930... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Filtered packet: [87] 17fefd0001000000000001004a0001000000000001f834543eb8881916ef18d8... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [39] 15fefd0001000000000002001a0001000000000002b76a7f6b8dac94b78a7ecc... client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [164] 16feff00000000000000000045010000720000000000000039feff5b96ec5dc0... client: Filtered packet: [174] 16feff0000000000000002001c1000002100010000000000102098e3e0d03b53... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Filtered packet: [109] 17feff00010000000000010060721980cde0df3e02630c1cfc00730e10c7d377... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [61] 15feff000100000000000200307915dc1988a95b6e2ffd0435954843594a3a04... client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/2 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [913] 16fefd0000000000000000003702000056000000000000002bfefde2c7dc495a... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Filtered packet: [32] 2f1a2f001be3d66e76c258a0228c37ec166369210b4d097592c392c7aa4de59e client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Filtered packet: [72] 2fe5f00043d539e90f6b03825180eb808045628577fbee9ab3ff314b3ec71635... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [874] 16fefd0000000000000000003a0200005d000000000000002efefdc29d6a4d7e... server: Filtered packet: [75] 14fefd000000000000000700010116fefd000100000000000000300001000000... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [87] 17fefd0001000000000001004a00010000000000013bd0beda5f1ad300d4db9d... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/1 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [872] 16feff0000000000000000003a0200005d000000000000002efeffec1f57dae7... server: Filtered packet: [91] 14feff000000000000000700010116feff00010000000000000040752f35db4a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [109] 17feff00010000000000010060c4ead9012788717c9dfb20c91be3d27667f563... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/2 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 (5 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/2 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/2 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/0 (5 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/2 (3 ms) [----------] 24 tests from DatagramOnly/TlsConnectDatagram (397 ms total) [----------] 4 tests from Datagram12Plus/TlsConnectDatagram12Plus [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/0 (4 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/1 (4 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/0 (4 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/1 (3 ms) [----------] 4 tests from Datagram12Plus/TlsConnectDatagram12Plus (15 ms total) [----------] 24 tests from KeyExchangeTest/TlsKeyExchangeTest [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 (18 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 (18 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/4 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/5 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 (18 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 (18 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/4 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/5 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 (18 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 (18 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/4 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/5 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/0 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/1 (7 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/2 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/3 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/3 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/4 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/4 (7 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/5 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/5 (6 ms) [----------] 24 tests from KeyExchangeTest/TlsKeyExchangeTest (292 ms total) [----------] 36 tests from Pre13StreamOnly/TlsConnectStreamPre13 [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/0 (11 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/1 (11 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/2 (10 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03019ec5f885e7453f5813428d62ac447f99f22ffd499e263405ba676eac2321... handshake new: [93] 0301cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [713] 0200005d03019ec5f885e7453f5813428d62ac447f99f22ffd499e263405ba67... record new: [713] 0200005d0301cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [718] 16030102c90200005d0301cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0302a0b3c7ac6524b6ada5f2ecae4fd1d3f5438bcbad8dbe0e689131f40bcb9e... handshake new: [93] 0302cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [713] 0200005d0302a0b3c7ac6524b6ada5f2ecae4fd1d3f5438bcbad8dbe0e689131... record new: [713] 0200005d0302cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [718] 16030202c90200005d0302cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03039b9ba6c462b1815344b88f8be032adacf2406ec411ff9d59cd9d1260caac... handshake new: [93] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [715] 0200005d03039b9ba6c462b1815344b88f8be032adacf2406ec411ff9d59cd9d... record new: [715] 0200005d0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [720] 16030302cb0200005d0303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [110] 16030100251000002120e4e0bd85a86568a0332b99adbe8b9a843373076d4387... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/0 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [126] 1603020025100000212009ad16b8bbce49a49f8a12fa3ef1bc2512f78b1a7d81... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [102] 160303002510000021205c98b42c2f640981049f458c0b9f590deda6909adaf0... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [68] 16030100041400000c14030100010116030100301d13a24968b9875a6cf89a22... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTED to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [84] 16030200041400000c140302000101160302004057a4801dc8e4469667cd3034... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/1 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [60] 16030300041400000c14030300010116030300280000000000000000d9514cc7... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/0 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/1 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/0 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/1 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/2 (6 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/0 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/1 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/2 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080ad04ca9b0312b574fe4e3c0008ddd04e07936f14853ec678b68470af6b1f... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 100000820080ad04ca9b0312b574fe4e3c0008ddd04e07936f14853ec678b684... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00806282a718afbe6b31a3ad5eb6629d7faed6b3aebf476abce63424838aef76... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 1000008200806282a718afbe6b31a3ad5eb6629d7faed6b3aebf476abce63424... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 (2 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080205e8b134aa1c54989e5f3c7b8f461e4d56d830eac9a514a40a657db60e3... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 100000820080205e8b134aa1c54989e5f3c7b8f461e4d56d830eac9a514a40a6... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00808a1cdeb753c807c7a65bc66609d165421549165f81abc613b597b025646f... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 1000008200808a1cdeb753c807c7a65bc66609d165421549165f81abc613b597... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 (2 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080b7d5f2cd0dcb9725a946113fe2a1bd0cd9dee15bac5de793d0d11c254fa1... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 100000820080b7d5f2cd0dcb9725a946113fe2a1bd0cd9dee15bac5de793d0d1... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 008091189c7732b6eb91f8385c770da0c4efc2ece1665ca2bd75ae2848c8254f... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 10000082008091189c7732b6eb91f8385c770da0c4efc2ece1665ca2bd75ae28... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 (3 ms) [----------] 36 tests from Pre13StreamOnly/TlsConnectStreamPre13 (151 ms total) [----------] 16 tests from KeyExchangeTest/TlsKeyExchangeTest13 [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/0 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/0 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/1 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/1 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/1 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/0 (3 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/1 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/0 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/1 (9 ms) [----------] 16 tests from KeyExchangeTest/TlsKeyExchangeTest13 (121 ms total) [----------] 68 tests from ExtensionStream/TlsExtensionTestGeneric [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [180] 030349dd79f19dffb84ecae2d2f5b2eaf1c9f29e32b482f8550b73dafa51d671... handshake new: [180] 030349dd79f19dffb84ecae2d2f5b2eaf1c9f29e32b482f8550b73dafa51d671... record old: [184] 010000b4030349dd79f19dffb84ecae2d2f5b2eaf1c9f29e32b482f8550b73da... record new: [184] 010000b4030349dd79f19dffb84ecae2d2f5b2eaf1c9f29e32b482f8550b73da... client: Filtered packet: [189] 16030100b8010000b4030349dd79f19dffb84ecae2d2f5b2eaf1c9f29e32b482... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [187] 03039b826edcae2c44ff5dfd6a9bca7961c938e4e217efc5b3ac65dbaef13b42... handshake new: [187] 03039b826edcae2c44ff5dfd6a9bca7961c938e4e217efc5b3ac65dbaef13b42... record old: [191] 010000bb03039b826edcae2c44ff5dfd6a9bca7961c938e4e217efc5b3ac65db... record new: [191] 010000bb03039b826edcae2c44ff5dfd6a9bca7961c938e4e217efc5b3ac65db... client: Filtered packet: [196] 16030100bf010000bb03039b826edcae2c44ff5dfd6a9bca7961c938e4e217ef... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [117] 03025b567d4fae45c8fa00014799b6d106c2fc26ec74043e62a283c36e88568a... handshake new: [117] 03025b567d4fae45c8fa00014799b6d106c2fc26ec74043e62a283c36e88568a... record old: [121] 0100007503025b567d4fae45c8fa00014799b6d106c2fc26ec74043e62a283c3... record new: [121] 0100007503025b567d4fae45c8fa00014799b6d106c2fc26ec74043e62a283c3... client: Filtered packet: [126] 16030100790100007503025b567d4fae45c8fa00014799b6d106c2fc26ec7404... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [117] 0301f1382e3a5d4a2f4c84ecb4a8937dffba9b745cd89417d4409ca504f0f99d... handshake new: [117] 0301f1382e3a5d4a2f4c84ecb4a8937dffba9b745cd89417d4409ca504f0f99d... record old: [121] 010000750301f1382e3a5d4a2f4c84ecb4a8937dffba9b745cd89417d4409ca5... record new: [121] 010000750301f1382e3a5d4a2f4c84ecb4a8937dffba9b745cd89417d4409ca5... client: Filtered packet: [126] 1603010079010000750301f1382e3a5d4a2f4c84ecb4a8937dffba9b745cd894... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [180] 0303c1bbbc3f5dd9cba7f895aea3a2a79f7516dcba6a20680664e1801a4d7fc9... handshake new: [180] 0303c1bbbc3f5dd9cba7f895aea3a2a79f7516dcba6a20680664e1801a4d7fc9... record old: [184] 010000b40303c1bbbc3f5dd9cba7f895aea3a2a79f7516dcba6a20680664e180... record new: [184] 010000b40303c1bbbc3f5dd9cba7f895aea3a2a79f7516dcba6a20680664e180... client: Filtered packet: [189] 16030100b8010000b40303c1bbbc3f5dd9cba7f895aea3a2a79f7516dcba6a20... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [187] 03037787d62e009bb3fc038d6bbc1b9f4c9cac5bada3347c8e26a8cdaa717ce6... handshake new: [187] 03037787d62e009bb3fc038d6bbc1b9f4c9cac5bada3347c8e26a8cdaa717ce6... record old: [191] 010000bb03037787d62e009bb3fc038d6bbc1b9f4c9cac5bada3347c8e26a8cd... record new: [191] 010000bb03037787d62e009bb3fc038d6bbc1b9f4c9cac5bada3347c8e26a8cd... client: Filtered packet: [196] 16030100bf010000bb03037787d62e009bb3fc038d6bbc1b9f4c9cac5bada334... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [117] 0302a71d06cbc8fe3dbfa4701b6dca263187091504a233d7a307ea8d2031c912... handshake new: [117] 0302a71d06cbc8fe3dbfa4701b6dca263187091504a233d7a307ea8d2031c912... record old: [121] 010000750302a71d06cbc8fe3dbfa4701b6dca263187091504a233d7a307ea8d... record new: [121] 010000750302a71d06cbc8fe3dbfa4701b6dca263187091504a233d7a307ea8d... client: Filtered packet: [126] 1603010079010000750302a71d06cbc8fe3dbfa4701b6dca263187091504a233... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [117] 0301281a2e5dcfadbea397d1dbf95a0d846d00edc6c6aaaaf1f6de0090c8f55e... handshake new: [117] 0301281a2e5dcfadbea397d1dbf95a0d846d00edc6c6aaaaf1f6de0090c8f55e... record old: [121] 010000750301281a2e5dcfadbea397d1dbf95a0d846d00edc6c6aaaaf1f6de00... record new: [121] 010000750301281a2e5dcfadbea397d1dbf95a0d846d00edc6c6aaaaf1f6de00... client: Filtered packet: [126] 1603010079010000750301281a2e5dcfadbea397d1dbf95a0d846d00edc6c6aa... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [180] 03033295f724f66aaff4290fb17744bc6cee72277bb2a759f867ca86d8b848cd... handshake new: [176] 03033295f724f66aaff4290fb17744bc6cee72277bb2a759f867ca86d8b848cd... record old: [184] 010000b403033295f724f66aaff4290fb17744bc6cee72277bb2a759f867ca86... record new: [180] 010000b003033295f724f66aaff4290fb17744bc6cee72277bb2a759f867ca86... client: Filtered packet: [185] 16030100b4010000b003033295f724f66aaff4290fb17744bc6cee72277bb2a7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [187] 03037f17a951a61e89908913eff5564f83aa8e7e6232c877a502e0ea0b976646... handshake new: [183] 03037f17a951a61e89908913eff5564f83aa8e7e6232c877a502e0ea0b976646... record old: [191] 010000bb03037f17a951a61e89908913eff5564f83aa8e7e6232c877a502e0ea... record new: [187] 010000b703037f17a951a61e89908913eff5564f83aa8e7e6232c877a502e0ea... client: Filtered packet: [192] 16030100bb010000b703037f17a951a61e89908913eff5564f83aa8e7e6232c8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [117] 03024259ee496b8c86d59074d28f4380d24c1884d1358d6bbc182203587dc804... handshake new: [113] 03024259ee496b8c86d59074d28f4380d24c1884d1358d6bbc182203587dc804... record old: [121] 0100007503024259ee496b8c86d59074d28f4380d24c1884d1358d6bbc182203... record new: [117] 0100007103024259ee496b8c86d59074d28f4380d24c1884d1358d6bbc182203... client: Filtered packet: [122] 16030100750100007103024259ee496b8c86d59074d28f4380d24c1884d1358d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [117] 03015fd23b5df0153b7593a9fe594d6c8880016d44e5ed425a84903b86fae84d... handshake new: [113] 03015fd23b5df0153b7593a9fe594d6c8880016d44e5ed425a84903b86fae84d... record old: [121] 0100007503015fd23b5df0153b7593a9fe594d6c8880016d44e5ed425a84903b... record new: [117] 0100007103015fd23b5df0153b7593a9fe594d6c8880016d44e5ed425a84903b... client: Filtered packet: [122] 16030100750100007103015fd23b5df0153b7593a9fe594d6c8880016d44e5ed... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303ed95833bec52d0bb87fffae677e38f601f1616099906f11b820178437b83... handshake new: [198] 0303ed95833bec52d0bb87fffae677e38f601f1616099906f11b820178437b83... record old: [184] 010000b40303ed95833bec52d0bb87fffae677e38f601f1616099906f11b8201... record new: [202] 010000c60303ed95833bec52d0bb87fffae677e38f601f1616099906f11b8201... client: Filtered packet: [207] 16030100ca010000c60303ed95833bec52d0bb87fffae677e38f601f16160999... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03030913efee40c66284597025d6ab6e2d321f70db8b64652140db413c16bee5... handshake new: [205] 03030913efee40c66284597025d6ab6e2d321f70db8b64652140db413c16bee5... record old: [191] 010000bb03030913efee40c66284597025d6ab6e2d321f70db8b64652140db41... record new: [209] 010000cd03030913efee40c66284597025d6ab6e2d321f70db8b64652140db41... client: Filtered packet: [214] 16030100d1010000cd03030913efee40c66284597025d6ab6e2d321f70db8b64... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0302493f70248eaae5a478aa58aa2efff82db2a39d5a6431317d0de986c43da4... handshake new: [135] 0302493f70248eaae5a478aa58aa2efff82db2a39d5a6431317d0de986c43da4... record old: [121] 010000750302493f70248eaae5a478aa58aa2efff82db2a39d5a6431317d0de9... record new: [139] 010000870302493f70248eaae5a478aa58aa2efff82db2a39d5a6431317d0de9... client: Filtered packet: [144] 160301008b010000870302493f70248eaae5a478aa58aa2efff82db2a39d5a64... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0301bafde62f448d1dff9d998d64ac230a88352b95db4359d9bee75a2fdf1667... handshake new: [135] 0301bafde62f448d1dff9d998d64ac230a88352b95db4359d9bee75a2fdf1667... record old: [121] 010000750301bafde62f448d1dff9d998d64ac230a88352b95db4359d9bee75a... record new: [139] 010000870301bafde62f448d1dff9d998d64ac230a88352b95db4359d9bee75a... client: Filtered packet: [144] 160301008b010000870301bafde62f448d1dff9d998d64ac230a88352b95db43... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [180] 03036fb95e794024942f66545b0d2299ac19fcd2a079bd87077663b33248d922... handshake new: [186] 03036fb95e794024942f66545b0d2299ac19fcd2a079bd87077663b33248d922... record old: [184] 010000b403036fb95e794024942f66545b0d2299ac19fcd2a079bd87077663b3... record new: [190] 010000ba03036fb95e794024942f66545b0d2299ac19fcd2a079bd87077663b3... client: Filtered packet: [195] 16030100be010000ba03036fb95e794024942f66545b0d2299ac19fcd2a079bd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [187] 0303bfed1406a67687131eba4d962c5d093b8193ae9b6c7214709338797b0e45... handshake new: [193] 0303bfed1406a67687131eba4d962c5d093b8193ae9b6c7214709338797b0e45... record old: [191] 010000bb0303bfed1406a67687131eba4d962c5d093b8193ae9b6c7214709338... record new: [197] 010000c10303bfed1406a67687131eba4d962c5d093b8193ae9b6c7214709338... client: Filtered packet: [202] 16030100c5010000c10303bfed1406a67687131eba4d962c5d093b8193ae9b6c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [117] 03021b387cc73dd1d5b7a663a99c647cece83248087e46337a4e04c00fd81f22... handshake new: [123] 03021b387cc73dd1d5b7a663a99c647cece83248087e46337a4e04c00fd81f22... record old: [121] 0100007503021b387cc73dd1d5b7a663a99c647cece83248087e46337a4e04c0... record new: [127] 0100007b03021b387cc73dd1d5b7a663a99c647cece83248087e46337a4e04c0... client: Filtered packet: [132] 160301007f0100007b03021b387cc73dd1d5b7a663a99c647cece83248087e46... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [117] 03016e9ad48da92ca65ca0134b0b029c422b57729a088135636834c289aff458... handshake new: [123] 03016e9ad48da92ca65ca0134b0b029c422b57729a088135636834c289aff458... record old: [121] 0100007503016e9ad48da92ca65ca0134b0b029c422b57729a088135636834c2... record new: [127] 0100007b03016e9ad48da92ca65ca0134b0b029c422b57729a088135636834c2... client: Filtered packet: [132] 160301007f0100007b03016e9ad48da92ca65ca0134b0b029c422b57729a0881... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [180] 030383e661c05c5f410a7e996dbeaa200a1259335aa7d39b72569957ad2a0785... handshake new: [171] 030383e661c05c5f410a7e996dbeaa200a1259335aa7d39b72569957ad2a0785... record old: [184] 010000b4030383e661c05c5f410a7e996dbeaa200a1259335aa7d39b72569957... record new: [175] 010000ab030383e661c05c5f410a7e996dbeaa200a1259335aa7d39b72569957... client: Filtered packet: [180] 16030100af010000ab030383e661c05c5f410a7e996dbeaa200a1259335aa7d3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [187] 03035e49ccc4e50d6ae82016644600e0a5e480cdda3e8400ebbb689a7ebcbe7b... handshake new: [178] 03035e49ccc4e50d6ae82016644600e0a5e480cdda3e8400ebbb689a7ebcbe7b... record old: [191] 010000bb03035e49ccc4e50d6ae82016644600e0a5e480cdda3e8400ebbb689a... record new: [182] 010000b203035e49ccc4e50d6ae82016644600e0a5e480cdda3e8400ebbb689a... client: Filtered packet: [187] 16030100b6010000b203035e49ccc4e50d6ae82016644600e0a5e480cdda3e84... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [117] 0302cf26eb019293be88e45811ab15b0dd228b8f302543f2a39040be663cf6d2... handshake new: [108] 0302cf26eb019293be88e45811ab15b0dd228b8f302543f2a39040be663cf6d2... record old: [121] 010000750302cf26eb019293be88e45811ab15b0dd228b8f302543f2a39040be... record new: [112] 0100006c0302cf26eb019293be88e45811ab15b0dd228b8f302543f2a39040be... client: Filtered packet: [117] 16030100700100006c0302cf26eb019293be88e45811ab15b0dd228b8f302543... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [117] 030178615d59f86d4cc9dce2aa1ba23926addbef8570026345f0c90ff7ae04e0... handshake new: [108] 030178615d59f86d4cc9dce2aa1ba23926addbef8570026345f0c90ff7ae04e0... record old: [121] 01000075030178615d59f86d4cc9dce2aa1ba23926addbef8570026345f0c90f... record new: [112] 0100006c030178615d59f86d4cc9dce2aa1ba23926addbef8570026345f0c90f... client: Filtered packet: [117] 16030100700100006c030178615d59f86d4cc9dce2aa1ba23926addbef857002... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [190] 0303726c3351a149523f90f2ecc6d2294d6226f383ac38703efa12286d47f5e9... handshake new: [184] 0303726c3351a149523f90f2ecc6d2294d6226f383ac38703efa12286d47f5e9... record old: [194] 010000be0303726c3351a149523f90f2ecc6d2294d6226f383ac38703efa1228... record new: [188] 010000b80303726c3351a149523f90f2ecc6d2294d6226f383ac38703efa1228... client: Filtered packet: [193] 16030100bc010000b80303726c3351a149523f90f2ecc6d2294d6226f383ac38... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [197] 0303290f3a03dfad648e1ba66ac79153610fb9fc6b5c4d2ed5fd5388475c4744... handshake new: [191] 0303290f3a03dfad648e1ba66ac79153610fb9fc6b5c4d2ed5fd5388475c4744... record old: [201] 010000c50303290f3a03dfad648e1ba66ac79153610fb9fc6b5c4d2ed5fd5388... record new: [195] 010000bf0303290f3a03dfad648e1ba66ac79153610fb9fc6b5c4d2ed5fd5388... client: Filtered packet: [200] 16030100c3010000bf0303290f3a03dfad648e1ba66ac79153610fb9fc6b5c4d... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [127] 030264c6215bd50a526073b4bc638aba4a71ae6c8e7a61e56299c6f67885da75... handshake new: [121] 030264c6215bd50a526073b4bc638aba4a71ae6c8e7a61e56299c6f67885da75... record old: [131] 0100007f030264c6215bd50a526073b4bc638aba4a71ae6c8e7a61e56299c6f6... record new: [125] 01000079030264c6215bd50a526073b4bc638aba4a71ae6c8e7a61e56299c6f6... client: Filtered packet: [130] 160301007d01000079030264c6215bd50a526073b4bc638aba4a71ae6c8e7a61... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [127] 03011d31e4ed8e5ae24099bba04d7a8d3830e9cab8c0d25d752d5f7ac8a3c885... handshake new: [121] 03011d31e4ed8e5ae24099bba04d7a8d3830e9cab8c0d25d752d5f7ac8a3c885... record old: [131] 0100007f03011d31e4ed8e5ae24099bba04d7a8d3830e9cab8c0d25d752d5f7a... record new: [125] 0100007903011d31e4ed8e5ae24099bba04d7a8d3830e9cab8c0d25d752d5f7a... client: Filtered packet: [130] 160301007d0100007903011d31e4ed8e5ae24099bba04d7a8d3830e9cab8c0d2... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [190] 0303c1abe5d4074de709e49f88a474e4caa0565085aa2f06a2768a2ce7bf8b72... handshake new: [186] 0303c1abe5d4074de709e49f88a474e4caa0565085aa2f06a2768a2ce7bf8b72... record old: [194] 010000be0303c1abe5d4074de709e49f88a474e4caa0565085aa2f06a2768a2c... record new: [190] 010000ba0303c1abe5d4074de709e49f88a474e4caa0565085aa2f06a2768a2c... client: Filtered packet: [195] 16030100be010000ba0303c1abe5d4074de709e49f88a474e4caa0565085aa2f... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [197] 03035db63bec397dbf4303e2b456d7807db3c11e85d0edbaf9f82418a3b7a211... handshake new: [193] 03035db63bec397dbf4303e2b456d7807db3c11e85d0edbaf9f82418a3b7a211... record old: [201] 010000c503035db63bec397dbf4303e2b456d7807db3c11e85d0edbaf9f82418... record new: [197] 010000c103035db63bec397dbf4303e2b456d7807db3c11e85d0edbaf9f82418... client: Filtered packet: [202] 16030100c5010000c103035db63bec397dbf4303e2b456d7807db3c11e85d0ed... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [127] 0302d8495b6f3206588b0fbdf54b41c21971254a323fe94ec68560c77f510770... handshake new: [123] 0302d8495b6f3206588b0fbdf54b41c21971254a323fe94ec68560c77f510770... record old: [131] 0100007f0302d8495b6f3206588b0fbdf54b41c21971254a323fe94ec68560c7... record new: [127] 0100007b0302d8495b6f3206588b0fbdf54b41c21971254a323fe94ec68560c7... client: Filtered packet: [132] 160301007f0100007b0302d8495b6f3206588b0fbdf54b41c21971254a323fe9... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [127] 03015b6fbff79a5f24979eaa886ed63ed42c2c3dfee3030f66833953faaa6371... handshake new: [123] 03015b6fbff79a5f24979eaa886ed63ed42c2c3dfee3030f66833953faaa6371... record old: [131] 0100007f03015b6fbff79a5f24979eaa886ed63ed42c2c3dfee3030f66833953... record new: [127] 0100007b03015b6fbff79a5f24979eaa886ed63ed42c2c3dfee3030f66833953... client: Filtered packet: [132] 160301007f0100007b03015b6fbff79a5f24979eaa886ed63ed42c2c3dfee303... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [190] 03031c463bab233f5cdf53cd32e00cc76d9223a7d5df0b38b5d20169e512e7ad... handshake new: [185] 03031c463bab233f5cdf53cd32e00cc76d9223a7d5df0b38b5d20169e512e7ad... record old: [194] 010000be03031c463bab233f5cdf53cd32e00cc76d9223a7d5df0b38b5d20169... record new: [189] 010000b903031c463bab233f5cdf53cd32e00cc76d9223a7d5df0b38b5d20169... client: Filtered packet: [194] 16030100bd010000b903031c463bab233f5cdf53cd32e00cc76d9223a7d5df0b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [197] 0303c39eb2c907ef99fca40b27b2bf19b48ab1d13ad245c61c0b5c0bee4d6482... handshake new: [192] 0303c39eb2c907ef99fca40b27b2bf19b48ab1d13ad245c61c0b5c0bee4d6482... record old: [201] 010000c50303c39eb2c907ef99fca40b27b2bf19b48ab1d13ad245c61c0b5c0b... record new: [196] 010000c00303c39eb2c907ef99fca40b27b2bf19b48ab1d13ad245c61c0b5c0b... client: Filtered packet: [201] 16030100c4010000c00303c39eb2c907ef99fca40b27b2bf19b48ab1d13ad245... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [127] 0302ccc9aea65c5e8807a20c19eef8919aff6b3d5f165e700ee3f4b67c5db56f... handshake new: [122] 0302ccc9aea65c5e8807a20c19eef8919aff6b3d5f165e700ee3f4b67c5db56f... record old: [131] 0100007f0302ccc9aea65c5e8807a20c19eef8919aff6b3d5f165e700ee3f4b6... record new: [126] 0100007a0302ccc9aea65c5e8807a20c19eef8919aff6b3d5f165e700ee3f4b6... client: Filtered packet: [131] 160301007e0100007a0302ccc9aea65c5e8807a20c19eef8919aff6b3d5f165e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [127] 03015a6805501290f8c864bd53eed4a5ef7e6a0205c7a2765e9a86ec936f7bd5... handshake new: [122] 03015a6805501290f8c864bd53eed4a5ef7e6a0205c7a2765e9a86ec936f7bd5... record old: [131] 0100007f03015a6805501290f8c864bd53eed4a5ef7e6a0205c7a2765e9a86ec... record new: [126] 0100007a03015a6805501290f8c864bd53eed4a5ef7e6a0205c7a2765e9a86ec... client: Filtered packet: [131] 160301007e0100007a03015a6805501290f8c864bd53eed4a5ef7e6a0205c7a2... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [190] 030304969808c79d1096380c71948ea6ab3b424ab8d2d55466b53279e5e80ccc... handshake new: [189] 030304969808c79d1096380c71948ea6ab3b424ab8d2d55466b53279e5e80ccc... record old: [194] 010000be030304969808c79d1096380c71948ea6ab3b424ab8d2d55466b53279... record new: [193] 010000bd030304969808c79d1096380c71948ea6ab3b424ab8d2d55466b53279... client: Filtered packet: [198] 16030100c1010000bd030304969808c79d1096380c71948ea6ab3b424ab8d2d5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [197] 03032a9805a914683b0fdc21d59ef36ee98459b13c1d5225887cb0eac87ba1c4... handshake new: [196] 03032a9805a914683b0fdc21d59ef36ee98459b13c1d5225887cb0eac87ba1c4... record old: [201] 010000c503032a9805a914683b0fdc21d59ef36ee98459b13c1d5225887cb0ea... record new: [200] 010000c403032a9805a914683b0fdc21d59ef36ee98459b13c1d5225887cb0ea... client: Filtered packet: [205] 16030100c8010000c403032a9805a914683b0fdc21d59ef36ee98459b13c1d52... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [127] 030275b1b7b611bca01aa0803ab6a7ece083b4449a2a4fd952c9c80383472bf7... handshake new: [126] 030275b1b7b611bca01aa0803ab6a7ece083b4449a2a4fd952c9c80383472bf7... record old: [131] 0100007f030275b1b7b611bca01aa0803ab6a7ece083b4449a2a4fd952c9c803... record new: [130] 0100007e030275b1b7b611bca01aa0803ab6a7ece083b4449a2a4fd952c9c803... client: Filtered packet: [135] 16030100820100007e030275b1b7b611bca01aa0803ab6a7ece083b4449a2a4f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [127] 03014a43d964b19308a4709c45fadcf8c36bc97e538bb56eb66bc9b15d907e51... handshake new: [126] 03014a43d964b19308a4709c45fadcf8c36bc97e538bb56eb66bc9b15d907e51... record old: [131] 0100007f03014a43d964b19308a4709c45fadcf8c36bc97e538bb56eb66bc9b1... record new: [130] 0100007e03014a43d964b19308a4709c45fadcf8c36bc97e538bb56eb66bc9b1... client: Filtered packet: [135] 16030100820100007e03014a43d964b19308a4709c45fadcf8c36bc97e538bb5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [190] 0303a0eb19e32de29962cafd726fa11f065ddd2414608e35aeaf8f63424075f2... handshake new: [189] 0303a0eb19e32de29962cafd726fa11f065ddd2414608e35aeaf8f63424075f2... record old: [194] 010000be0303a0eb19e32de29962cafd726fa11f065ddd2414608e35aeaf8f63... record new: [193] 010000bd0303a0eb19e32de29962cafd726fa11f065ddd2414608e35aeaf8f63... client: Filtered packet: [198] 16030100c1010000bd0303a0eb19e32de29962cafd726fa11f065ddd2414608e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [197] 03034b166aac4f76ef8599b9845bee3a9ce31734e9f8545a19f59367f98331a9... handshake new: [196] 03034b166aac4f76ef8599b9845bee3a9ce31734e9f8545a19f59367f98331a9... record old: [201] 010000c503034b166aac4f76ef8599b9845bee3a9ce31734e9f8545a19f59367... record new: [200] 010000c403034b166aac4f76ef8599b9845bee3a9ce31734e9f8545a19f59367... client: Filtered packet: [205] 16030100c8010000c403034b166aac4f76ef8599b9845bee3a9ce31734e9f854... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [127] 03028767bdbccd5d90101d242f5e6d673699c0ebd9623c37030440d03c90a749... handshake new: [126] 03028767bdbccd5d90101d242f5e6d673699c0ebd9623c37030440d03c90a749... record old: [131] 0100007f03028767bdbccd5d90101d242f5e6d673699c0ebd9623c37030440d0... record new: [130] 0100007e03028767bdbccd5d90101d242f5e6d673699c0ebd9623c37030440d0... client: Filtered packet: [135] 16030100820100007e03028767bdbccd5d90101d242f5e6d673699c0ebd9623c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [127] 0301f3265d3221db539caf075545a088a725da6255ce21395e4696e6d3749002... handshake new: [126] 0301f3265d3221db539caf075545a088a725da6255ce21395e4696e6d3749002... record old: [131] 0100007f0301f3265d3221db539caf075545a088a725da6255ce21395e4696e6... record new: [130] 0100007e0301f3265d3221db539caf075545a088a725da6255ce21395e4696e6... client: Filtered packet: [135] 16030100820100007e0301f3265d3221db539caf075545a088a725da6255ce21... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [190] 03031db9e4f1eba6600c097b49543ff1a5a0aefafc8915fe9fc10bf5e3bc55d9... handshake new: [189] 03031db9e4f1eba6600c097b49543ff1a5a0aefafc8915fe9fc10bf5e3bc55d9... record old: [194] 010000be03031db9e4f1eba6600c097b49543ff1a5a0aefafc8915fe9fc10bf5... record new: [193] 010000bd03031db9e4f1eba6600c097b49543ff1a5a0aefafc8915fe9fc10bf5... client: Filtered packet: [198] 16030100c1010000bd03031db9e4f1eba6600c097b49543ff1a5a0aefafc8915... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [197] 0303a8b6ae96c898f14501487c229d66ac5d847e6c8ada1cb70123a1bf49e8b5... handshake new: [196] 0303a8b6ae96c898f14501487c229d66ac5d847e6c8ada1cb70123a1bf49e8b5... record old: [201] 010000c50303a8b6ae96c898f14501487c229d66ac5d847e6c8ada1cb70123a1... record new: [200] 010000c40303a8b6ae96c898f14501487c229d66ac5d847e6c8ada1cb70123a1... client: Filtered packet: [205] 16030100c8010000c40303a8b6ae96c898f14501487c229d66ac5d847e6c8ada... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [127] 0302c96c726a03b9886b3925211e88c71014ff54e5d56fbb846fb253123e0c36... handshake new: [126] 0302c96c726a03b9886b3925211e88c71014ff54e5d56fbb846fb253123e0c36... record old: [131] 0100007f0302c96c726a03b9886b3925211e88c71014ff54e5d56fbb846fb253... record new: [130] 0100007e0302c96c726a03b9886b3925211e88c71014ff54e5d56fbb846fb253... client: Filtered packet: [135] 16030100820100007e0302c96c726a03b9886b3925211e88c71014ff54e5d56f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [127] 030141b0e807449c825315e1f0cd27fc56626ece58e86a085795941b6a7404b1... handshake new: [126] 030141b0e807449c825315e1f0cd27fc56626ece58e86a085795941b6a7404b1... record old: [131] 0100007f030141b0e807449c825315e1f0cd27fc56626ece58e86a085795941b... record new: [130] 0100007e030141b0e807449c825315e1f0cd27fc56626ece58e86a085795941b... client: Filtered packet: [135] 16030100820100007e030141b0e807449c825315e1f0cd27fc56626ece58e86a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [180] 0303cf2d1ece03a0fbc4157194113bc76f8f323a9d20f6dc2d272ce9c6938395... handshake new: [156] 0303cf2d1ece03a0fbc4157194113bc76f8f323a9d20f6dc2d272ce9c6938395... record old: [184] 010000b40303cf2d1ece03a0fbc4157194113bc76f8f323a9d20f6dc2d272ce9... record new: [160] 0100009c0303cf2d1ece03a0fbc4157194113bc76f8f323a9d20f6dc2d272ce9... client: Filtered packet: [165] 16030100a00100009c0303cf2d1ece03a0fbc4157194113bc76f8f323a9d20f6... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [187] 0303cd2266ae100910d44abf344065f65b1afd351076685267c1cc4bafb56465... handshake new: [173] 0303cd2266ae100910d44abf344065f65b1afd351076685267c1cc4bafb56465... record old: [191] 010000bb0303cd2266ae100910d44abf344065f65b1afd351076685267c1cc4b... record new: [177] 010000ad0303cd2266ae100910d44abf344065f65b1afd351076685267c1cc4b... client: Filtered packet: [182] 16030100b1010000ad0303cd2266ae100910d44abf344065f65b1afd35107668... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/1 (6 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 03028bced56146cf3d538e329b7d0f57afc812384c69dcb5905415b465ca0a1e... handshake new: [103] 03028bced56146cf3d538e329b7d0f57afc812384c69dcb5905415b465ca0a1e... record old: [121] 0100007503028bced56146cf3d538e329b7d0f57afc812384c69dcb5905415b4... record new: [107] 0100006703028bced56146cf3d538e329b7d0f57afc812384c69dcb5905415b4... client: Filtered packet: [112] 160301006b0100006703028bced56146cf3d538e329b7d0f57afc812384c69dc... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/2 (7 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 0301c9a53cc90b80477f3550cb4c2e9f24bc0f2f0396d1ea6b230e7110e4d1c9... handshake new: [103] 0301c9a53cc90b80477f3550cb4c2e9f24bc0f2f0396d1ea6b230e7110e4d1c9... record old: [121] 010000750301c9a53cc90b80477f3550cb4c2e9f24bc0f2f0396d1ea6b230e71... record new: [107] 010000670301c9a53cc90b80477f3550cb4c2e9f24bc0f2f0396d1ea6b230e71... client: Filtered packet: [112] 160301006b010000670301c9a53cc90b80477f3550cb4c2e9f24bc0f2f0396d1... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/3 (6 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [3] 000100 handshake old: [180] 0303208634cfa2b0dfc0697b7b954eb9b33a64f05858ba9c2ec79eac4ed56177... handshake new: [163] 0303208634cfa2b0dfc0697b7b954eb9b33a64f05858ba9c2ec79eac4ed56177... record old: [184] 010000b40303208634cfa2b0dfc0697b7b954eb9b33a64f05858ba9c2ec79eac... record new: [167] 010000a30303208634cfa2b0dfc0697b7b954eb9b33a64f05858ba9c2ec79eac... client: Filtered packet: [172] 16030100a7010000a30303208634cfa2b0dfc0697b7b954eb9b33a64f05858ba... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [187] 0303177ed99f6ba3464f9eb19d160e1f9c6ca18487cb07b679d070cb7c2dd2f0... handshake new: [180] 0303177ed99f6ba3464f9eb19d160e1f9c6ca18487cb07b679d070cb7c2dd2f0... record old: [191] 010000bb0303177ed99f6ba3464f9eb19d160e1f9c6ca18487cb07b679d070cb... record new: [184] 010000b40303177ed99f6ba3464f9eb19d160e1f9c6ca18487cb07b679d070cb... client: Filtered packet: [189] 16030100b8010000b40303177ed99f6ba3464f9eb19d160e1f9c6ca18487cb07... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [117] 03029af7fce01f316318592fcbae819e00d0426a2eef3b28f57866dc86df3888... handshake new: [110] 03029af7fce01f316318592fcbae819e00d0426a2eef3b28f57866dc86df3888... record old: [121] 0100007503029af7fce01f316318592fcbae819e00d0426a2eef3b28f57866dc... record new: [114] 0100006e03029af7fce01f316318592fcbae819e00d0426a2eef3b28f57866dc... client: Filtered packet: [119] 16030100720100006e03029af7fce01f316318592fcbae819e00d0426a2eef3b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [117] 03013c74688478ef4047e9b8c2690fd29e08fc849b68a426dd4ea22e38759342... handshake new: [110] 03013c74688478ef4047e9b8c2690fd29e08fc849b68a426dd4ea22e38759342... record old: [121] 0100007503013c74688478ef4047e9b8c2690fd29e08fc849b68a426dd4ea22e... record new: [114] 0100006e03013c74688478ef4047e9b8c2690fd29e08fc849b68a426dd4ea22e... client: Filtered packet: [119] 16030100720100006e03013c74688478ef4047e9b8c2690fd29e08fc849b68a4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [4] 09990000 handshake old: [180] 030331251fbbbce2d0dda8029ba216f2aa069ef484bfcd8dfc374126036c4eb4... handshake new: [164] 030331251fbbbce2d0dda8029ba216f2aa069ef484bfcd8dfc374126036c4eb4... record old: [184] 010000b4030331251fbbbce2d0dda8029ba216f2aa069ef484bfcd8dfc374126... record new: [168] 010000a4030331251fbbbce2d0dda8029ba216f2aa069ef484bfcd8dfc374126... client: Filtered packet: [173] 16030100a8010000a4030331251fbbbce2d0dda8029ba216f2aa069ef484bfcd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [187] 0303dbc5cbe382127898727448d2382b1435d62cf7f32e9bb7426679865390b2... handshake new: [181] 0303dbc5cbe382127898727448d2382b1435d62cf7f32e9bb7426679865390b2... record old: [191] 010000bb0303dbc5cbe382127898727448d2382b1435d62cf7f32e9bb7426679... record new: [185] 010000b50303dbc5cbe382127898727448d2382b1435d62cf7f32e9bb7426679... client: Filtered packet: [190] 16030100b9010000b50303dbc5cbe382127898727448d2382b1435d62cf7f32e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [117] 030226be6dc65772e6d883bd79b18ff211634be019150a041551f406e78cc037... handshake new: [111] 030226be6dc65772e6d883bd79b18ff211634be019150a041551f406e78cc037... record old: [121] 01000075030226be6dc65772e6d883bd79b18ff211634be019150a041551f406... record new: [115] 0100006f030226be6dc65772e6d883bd79b18ff211634be019150a041551f406... client: Filtered packet: [120] 16030100730100006f030226be6dc65772e6d883bd79b18ff211634be019150a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [117] 0301024d9f2624b69a11c8301705de5783a9710b9ddfcd8e12d0b39c265c8721... handshake new: [111] 0301024d9f2624b69a11c8301705de5783a9710b9ddfcd8e12d0b39c265c8721... record old: [121] 010000750301024d9f2624b69a11c8301705de5783a9710b9ddfcd8e12d0b39c... record new: [115] 0100006f0301024d9f2624b69a11c8301705de5783a9710b9ddfcd8e12d0b39c... client: Filtered packet: [120] 16030100730100006f0301024d9f2624b69a11c8301705de5783a9710b9ddfcd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [5] 0002000000 handshake old: [180] 0303cfbbec1cebeacf745d5226c9c4f70b5c2539b24b2bdda17d1af876ccef6e... handshake new: [165] 0303cfbbec1cebeacf745d5226c9c4f70b5c2539b24b2bdda17d1af876ccef6e... record old: [184] 010000b40303cfbbec1cebeacf745d5226c9c4f70b5c2539b24b2bdda17d1af8... record new: [169] 010000a50303cfbbec1cebeacf745d5226c9c4f70b5c2539b24b2bdda17d1af8... client: Filtered packet: [174] 16030100a9010000a50303cfbbec1cebeacf745d5226c9c4f70b5c2539b24b2b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [187] 030326baffb43401fb0b5ec5d807d417a8f26a23b58652ecc148c6d6b2af7fa4... handshake new: [182] 030326baffb43401fb0b5ec5d807d417a8f26a23b58652ecc148c6d6b2af7fa4... record old: [191] 010000bb030326baffb43401fb0b5ec5d807d417a8f26a23b58652ecc148c6d6... record new: [186] 010000b6030326baffb43401fb0b5ec5d807d417a8f26a23b58652ecc148c6d6... client: Filtered packet: [191] 16030100ba010000b6030326baffb43401fb0b5ec5d807d417a8f26a23b58652... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [117] 0302a700a63cb9ba723273a5c2be640dc2e2029e127301d3749866c9ca6f47e6... handshake new: [112] 0302a700a63cb9ba723273a5c2be640dc2e2029e127301d3749866c9ca6f47e6... record old: [121] 010000750302a700a63cb9ba723273a5c2be640dc2e2029e127301d3749866c9... record new: [116] 010000700302a700a63cb9ba723273a5c2be640dc2e2029e127301d3749866c9... client: Filtered packet: [121] 1603010074010000700302a700a63cb9ba723273a5c2be640dc2e2029e127301... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [117] 03011f88fbfd9834fdc616b7b1107a7fbc3fd4cc955875c883c4618f6a234814... handshake new: [112] 03011f88fbfd9834fdc616b7b1107a7fbc3fd4cc955875c883c4618f6a234814... record old: [121] 0100007503011f88fbfd9834fdc616b7b1107a7fbc3fd4cc955875c883c4618f... record new: [116] 0100007003011f88fbfd9834fdc616b7b1107a7fbc3fd4cc955875c883c4618f... client: Filtered packet: [121] 16030100740100007003011f88fbfd9834fdc616b7b1107a7fbc3fd4cc955875... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 (2 ms) [----------] 68 tests from ExtensionStream/TlsExtensionTestGeneric (180 ms total) [----------] 51 tests from ExtensionDatagram/TlsExtensionTestGeneric [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [181] fefdfa7a8bd3f85fbde931d6f00fde83ac817877c6b684efb2175870db0a0721... handshake new: [181] fefdfa7a8bd3f85fbde931d6f00fde83ac817877c6b684efb2175870db0a0721... record old: [193] 010000b500000000000000b5fefdfa7a8bd3f85fbde931d6f00fde83ac817877... record new: [193] 010000b500000000000000b5fefdfa7a8bd3f85fbde931d6f00fde83ac817877... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefdfa7a8bd3f8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [184] fefd0b002f51a4347f5118185c0b94c8a05a8a227c2e0d31c517405f0f0791c8... handshake new: [184] fefd0b002f51a4347f5118185c0b94c8a05a8a227c2e0d31c517405f0f0791c8... record old: [196] 010000b800000000000000b8fefd0b002f51a4347f5118185c0b94c8a05a8a22... record new: [196] 010000b800000000000000b8fefd0b002f51a4347f5118185c0b94c8a05a8a22... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd0b002f51a4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [114] feff3ae10cb2a69c4f0d5521390b2090146866b75be5d8269363db5360e89e99... handshake new: [114] feff3ae10cb2a69c4f0d5521390b2090146866b75be5d8269363db5360e89e99... record old: [126] 010000720000000000000072feff3ae10cb2a69c4f0d5521390b2090146866b7... record new: [126] 010000720000000000000072feff3ae10cb2a69c4f0d5521390b2090146866b7... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff3ae10cb2a6... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [181] fefdb972af77cdc93c88e65259ffbaaa542a4084145d024c9cc6b01ee5f0a602... handshake new: [181] fefdb972af77cdc93c88e65259ffbaaa542a4084145d024c9cc6b01ee5f0a602... record old: [193] 010000b500000000000000b5fefdb972af77cdc93c88e65259ffbaaa542a4084... record new: [193] 010000b500000000000000b5fefdb972af77cdc93c88e65259ffbaaa542a4084... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefdb972af77cd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [184] fefdca4ad466c7e18d6e0a0cba60e32515aaf4dc6477a361b240d6beaf3a9190... handshake new: [184] fefdca4ad466c7e18d6e0a0cba60e32515aaf4dc6477a361b240d6beaf3a9190... record old: [196] 010000b800000000000000b8fefdca4ad466c7e18d6e0a0cba60e32515aaf4dc... record new: [196] 010000b800000000000000b8fefdca4ad466c7e18d6e0a0cba60e32515aaf4dc... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefdca4ad466c7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [114] feff45b88cdaf4ab5492a682f6794506cc7f37068b69ca23c39106369d02feda... handshake new: [114] feff45b88cdaf4ab5492a682f6794506cc7f37068b69ca23c39106369d02feda... record old: [126] 010000720000000000000072feff45b88cdaf4ab5492a682f6794506cc7f3706... record new: [126] 010000720000000000000072feff45b88cdaf4ab5492a682f6794506cc7f3706... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff45b88cdaf4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [181] fefd8d019ea6e1e819cac568a07a7a50aef0e941ff79e9c27469bd3942172177... handshake new: [177] fefd8d019ea6e1e819cac568a07a7a50aef0e941ff79e9c27469bd3942172177... record old: [193] 010000b500000000000000b5fefd8d019ea6e1e819cac568a07a7a50aef0e941... record new: [189] 010000b100000000000000b1fefd8d019ea6e1e819cac568a07a7a50aef0e941... client: Filtered packet: [202] 16feff000000000000000000bd010000b100000000000000b1fefd8d019ea6e1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [184] fefdf17213de43eedb66b70b9708862584588c142b332ef2b461f45bcea1c4c6... handshake new: [180] fefdf17213de43eedb66b70b9708862584588c142b332ef2b461f45bcea1c4c6... record old: [196] 010000b800000000000000b8fefdf17213de43eedb66b70b9708862584588c14... record new: [192] 010000b400000000000000b4fefdf17213de43eedb66b70b9708862584588c14... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefdf17213de43... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [114] feffa4b5e649ee9fb639bf4b530418bcefe760c3ae9426338afa495ec2f8e75c... handshake new: [110] feffa4b5e649ee9fb639bf4b530418bcefe760c3ae9426338afa495ec2f8e75c... record old: [126] 010000720000000000000072feffa4b5e649ee9fb639bf4b530418bcefe760c3... record new: [122] 0100006e000000000000006efeffa4b5e649ee9fb639bf4b530418bcefe760c3... client: Filtered packet: [135] 16feff0000000000000000007a0100006e000000000000006efeffa4b5e649ee... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd5578499dd2aed8a61faa01a20c5c87018dfe4dc4723d7bcb4618121bbe6c... handshake new: [199] fefd5578499dd2aed8a61faa01a20c5c87018dfe4dc4723d7bcb4618121bbe6c... record old: [193] 010000b500000000000000b5fefd5578499dd2aed8a61faa01a20c5c87018dfe... record new: [211] 010000c700000000000000c7fefd5578499dd2aed8a61faa01a20c5c87018dfe... client: Filtered packet: [224] 16feff000000000000000000d3010000c700000000000000c7fefd5578499dd2... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefd99f6f9ad4fedefe4eb1c2d189ff99d1ea0ba23c98cd129c42f9b4b28d056... handshake new: [202] fefd99f6f9ad4fedefe4eb1c2d189ff99d1ea0ba23c98cd129c42f9b4b28d056... record old: [196] 010000b800000000000000b8fefd99f6f9ad4fedefe4eb1c2d189ff99d1ea0ba... record new: [214] 010000ca00000000000000cafefd99f6f9ad4fedefe4eb1c2d189ff99d1ea0ba... client: Filtered packet: [227] 16feff000000000000000000d6010000ca00000000000000cafefd99f6f9ad4f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [114] feff1a75b8729f50024c3a2113fb33b674f2d54417be34105c11775f81f257ce... handshake new: [132] feff1a75b8729f50024c3a2113fb33b674f2d54417be34105c11775f81f257ce... record old: [126] 010000720000000000000072feff1a75b8729f50024c3a2113fb33b674f2d544... record new: [144] 010000840000000000000084feff1a75b8729f50024c3a2113fb33b674f2d544... client: Filtered packet: [157] 16feff00000000000000000090010000840000000000000084feff1a75b8729f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [181] fefd62e95f97d27f53433f812fd97c12a967867201eecb8e6ffc26f6e9f46f88... handshake new: [187] fefd62e95f97d27f53433f812fd97c12a967867201eecb8e6ffc26f6e9f46f88... record old: [193] 010000b500000000000000b5fefd62e95f97d27f53433f812fd97c12a9678672... record new: [199] 010000bb00000000000000bbfefd62e95f97d27f53433f812fd97c12a9678672... client: Filtered packet: [212] 16feff000000000000000000c7010000bb00000000000000bbfefd62e95f97d2... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [184] fefd321f8a7b9c67f4bebbed18c8337112c6bd264680fcabd92d58b4205e8bc7... handshake new: [190] fefd321f8a7b9c67f4bebbed18c8337112c6bd264680fcabd92d58b4205e8bc7... record old: [196] 010000b800000000000000b8fefd321f8a7b9c67f4bebbed18c8337112c6bd26... record new: [202] 010000be00000000000000befefd321f8a7b9c67f4bebbed18c8337112c6bd26... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefd321f8a7b9c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [114] feff4c73086ae515be8e4eb278d497e7e71642d3ac39366b23bdd413483fbc68... handshake new: [120] feff4c73086ae515be8e4eb278d497e7e71642d3ac39366b23bdd413483fbc68... record old: [126] 010000720000000000000072feff4c73086ae515be8e4eb278d497e7e71642d3... record new: [132] 010000780000000000000078feff4c73086ae515be8e4eb278d497e7e71642d3... client: Filtered packet: [145] 16feff00000000000000000084010000780000000000000078feff4c73086ae5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [181] fefdac82aaf79e37312a46fc3bbd58f08dd59acb79c19c38997167b2f88134e4... handshake new: [172] fefdac82aaf79e37312a46fc3bbd58f08dd59acb79c19c38997167b2f88134e4... record old: [193] 010000b500000000000000b5fefdac82aaf79e37312a46fc3bbd58f08dd59acb... record new: [184] 010000ac00000000000000acfefdac82aaf79e37312a46fc3bbd58f08dd59acb... client: Filtered packet: [197] 16feff000000000000000000b8010000ac00000000000000acfefdac82aaf79e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [184] fefd3811e0a9dfdb4e863b70e5f3e35e87741e43ca5f9f796276dd7fb36cd3a1... handshake new: [175] fefd3811e0a9dfdb4e863b70e5f3e35e87741e43ca5f9f796276dd7fb36cd3a1... record old: [196] 010000b800000000000000b8fefd3811e0a9dfdb4e863b70e5f3e35e87741e43... record new: [187] 010000af00000000000000affefd3811e0a9dfdb4e863b70e5f3e35e87741e43... client: Filtered packet: [200] 16feff000000000000000000bb010000af00000000000000affefd3811e0a9df... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [114] feff77cc648cdded501b0589a3b7390e58c9653ac02e70a28cbb1db76a186f92... handshake new: [105] feff77cc648cdded501b0589a3b7390e58c9653ac02e70a28cbb1db76a186f92... record old: [126] 010000720000000000000072feff77cc648cdded501b0589a3b7390e58c9653a... record new: [117] 010000690000000000000069feff77cc648cdded501b0589a3b7390e58c9653a... client: Filtered packet: [130] 16feff00000000000000000075010000690000000000000069feff77cc648cdd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [191] fefdbb705639ee9096b6fe02d641235dd0ed24ddbc4dc899f844d9fa928e35be... handshake new: [185] fefdbb705639ee9096b6fe02d641235dd0ed24ddbc4dc899f844d9fa928e35be... record old: [203] 010000bf00000000000000bffefdbb705639ee9096b6fe02d641235dd0ed24dd... record new: [197] 010000b900000000000000b9fefdbb705639ee9096b6fe02d641235dd0ed24dd... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefdbb705639ee... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [194] fefdab9cd0e3f07e9a68714a009bf6457b9e4d42460123acccc356779cbc275f... handshake new: [188] fefdab9cd0e3f07e9a68714a009bf6457b9e4d42460123acccc356779cbc275f... record old: [206] 010000c200000000000000c2fefdab9cd0e3f07e9a68714a009bf6457b9e4d42... record new: [200] 010000bc00000000000000bcfefdab9cd0e3f07e9a68714a009bf6457b9e4d42... client: Filtered packet: [213] 16feff000000000000000000c8010000bc00000000000000bcfefdab9cd0e3f0... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [124] feff5c5469c64d244385fa0bfc241026c34eba67d4da4db280d99d16eb4aeae3... handshake new: [118] feff5c5469c64d244385fa0bfc241026c34eba67d4da4db280d99d16eb4aeae3... record old: [136] 0100007c000000000000007cfeff5c5469c64d244385fa0bfc241026c34eba67... record new: [130] 010000760000000000000076feff5c5469c64d244385fa0bfc241026c34eba67... client: Filtered packet: [143] 16feff00000000000000000082010000760000000000000076feff5c5469c64d... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [191] fefd8fd55bd06c688676744617c7cf490ba862a098a0c9dd623d37117bf18997... handshake new: [187] fefd8fd55bd06c688676744617c7cf490ba862a098a0c9dd623d37117bf18997... record old: [203] 010000bf00000000000000bffefd8fd55bd06c688676744617c7cf490ba862a0... record new: [199] 010000bb00000000000000bbfefd8fd55bd06c688676744617c7cf490ba862a0... client: Filtered packet: [212] 16feff000000000000000000c7010000bb00000000000000bbfefd8fd55bd06c... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [194] fefda3ab0f6edfdfde3935f1963aa076a1135d926da81944d06620249c633de7... handshake new: [190] fefda3ab0f6edfdfde3935f1963aa076a1135d926da81944d06620249c633de7... record old: [206] 010000c200000000000000c2fefda3ab0f6edfdfde3935f1963aa076a1135d92... record new: [202] 010000be00000000000000befefda3ab0f6edfdfde3935f1963aa076a1135d92... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefda3ab0f6edf... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [124] feff5229dec6c0136fb21ce17c8c4814301b0d84d0c0f3e65f6c05c017e5a9ad... handshake new: [120] feff5229dec6c0136fb21ce17c8c4814301b0d84d0c0f3e65f6c05c017e5a9ad... record old: [136] 0100007c000000000000007cfeff5229dec6c0136fb21ce17c8c4814301b0d84... record new: [132] 010000780000000000000078feff5229dec6c0136fb21ce17c8c4814301b0d84... client: Filtered packet: [145] 16feff00000000000000000084010000780000000000000078feff5229dec6c0... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [191] fefdcfd7670f99148775c3ff2df770d4cb432f0fa5553f8bc27c1c626e71ecb0... handshake new: [186] fefdcfd7670f99148775c3ff2df770d4cb432f0fa5553f8bc27c1c626e71ecb0... record old: [203] 010000bf00000000000000bffefdcfd7670f99148775c3ff2df770d4cb432f0f... record new: [198] 010000ba00000000000000bafefdcfd7670f99148775c3ff2df770d4cb432f0f... client: Filtered packet: [211] 16feff000000000000000000c6010000ba00000000000000bafefdcfd7670f99... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [194] fefd484fd126e2e2f3b86ae2d58c8fb48e4077356d86bef141a36653d4085c4f... handshake new: [189] fefd484fd126e2e2f3b86ae2d58c8fb48e4077356d86bef141a36653d4085c4f... record old: [206] 010000c200000000000000c2fefd484fd126e2e2f3b86ae2d58c8fb48e407735... record new: [201] 010000bd00000000000000bdfefd484fd126e2e2f3b86ae2d58c8fb48e407735... client: Filtered packet: [214] 16feff000000000000000000c9010000bd00000000000000bdfefd484fd126e2... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [124] feff2135ef8e4f1538c5d393f7b78842efbb11479a3be3aeef385c69646d1b9b... handshake new: [119] feff2135ef8e4f1538c5d393f7b78842efbb11479a3be3aeef385c69646d1b9b... record old: [136] 0100007c000000000000007cfeff2135ef8e4f1538c5d393f7b78842efbb1147... record new: [131] 010000770000000000000077feff2135ef8e4f1538c5d393f7b78842efbb1147... client: Filtered packet: [144] 16feff00000000000000000083010000770000000000000077feff2135ef8e4f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [191] fefdc27fd8f2e8e186bc38b959f618c28c740df40ea0b880aab7203ad2edbb4e... handshake new: [190] fefdc27fd8f2e8e186bc38b959f618c28c740df40ea0b880aab7203ad2edbb4e... record old: [203] 010000bf00000000000000bffefdc27fd8f2e8e186bc38b959f618c28c740df4... record new: [202] 010000be00000000000000befefdc27fd8f2e8e186bc38b959f618c28c740df4... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefdc27fd8f2e8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [194] fefd8926da767a083ac3a05c16888e9720cc33eb1dfa75d0aecb11beac76c0bc... handshake new: [193] fefd8926da767a083ac3a05c16888e9720cc33eb1dfa75d0aecb11beac76c0bc... record old: [206] 010000c200000000000000c2fefd8926da767a083ac3a05c16888e9720cc33eb... record new: [205] 010000c100000000000000c1fefd8926da767a083ac3a05c16888e9720cc33eb... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefd8926da767a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [124] feff03489488d153b8768a85ecbbd8e8adec6b37085e67ec67832b6ff59b65e7... handshake new: [123] feff03489488d153b8768a85ecbbd8e8adec6b37085e67ec67832b6ff59b65e7... record old: [136] 0100007c000000000000007cfeff03489488d153b8768a85ecbbd8e8adec6b37... record new: [135] 0100007b000000000000007bfeff03489488d153b8768a85ecbbd8e8adec6b37... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeff03489488d1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [191] fefd4fac946d2af93170b24fbbad47e6cc23c98f9bc4843b6eb42d520df2ec4e... handshake new: [190] fefd4fac946d2af93170b24fbbad47e6cc23c98f9bc4843b6eb42d520df2ec4e... record old: [203] 010000bf00000000000000bffefd4fac946d2af93170b24fbbad47e6cc23c98f... record new: [202] 010000be00000000000000befefd4fac946d2af93170b24fbbad47e6cc23c98f... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefd4fac946d2a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [194] fefd34b4d149c33dbb88bfae054cc6b322480a233e40a07b94519997b3b5516a... handshake new: [193] fefd34b4d149c33dbb88bfae054cc6b322480a233e40a07b94519997b3b5516a... record old: [206] 010000c200000000000000c2fefd34b4d149c33dbb88bfae054cc6b322480a23... record new: [205] 010000c100000000000000c1fefd34b4d149c33dbb88bfae054cc6b322480a23... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefd34b4d149c3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [124] feff6842b68f3f01e38a9668ea25831cd0fe1235a30b37f420aa0f2d8ad82378... handshake new: [123] feff6842b68f3f01e38a9668ea25831cd0fe1235a30b37f420aa0f2d8ad82378... record old: [136] 0100007c000000000000007cfeff6842b68f3f01e38a9668ea25831cd0fe1235... record new: [135] 0100007b000000000000007bfeff6842b68f3f01e38a9668ea25831cd0fe1235... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeff6842b68f3f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [191] fefda09ebc2ef836872828ff5eb2a3bcb68ebb4abbe244cbf5b58398695ed27b... handshake new: [190] fefda09ebc2ef836872828ff5eb2a3bcb68ebb4abbe244cbf5b58398695ed27b... record old: [203] 010000bf00000000000000bffefda09ebc2ef836872828ff5eb2a3bcb68ebb4a... record new: [202] 010000be00000000000000befefda09ebc2ef836872828ff5eb2a3bcb68ebb4a... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefda09ebc2ef8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [194] fefd063cc8b82f2d4cb777e8003ce6693f34c77a6bb70523e050b5f5b9e04541... handshake new: [193] fefd063cc8b82f2d4cb777e8003ce6693f34c77a6bb70523e050b5f5b9e04541... record old: [206] 010000c200000000000000c2fefd063cc8b82f2d4cb777e8003ce6693f34c77a... record new: [205] 010000c100000000000000c1fefd063cc8b82f2d4cb777e8003ce6693f34c77a... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefd063cc8b82f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [124] feffc9fdbcb34e409bc4408ee6e1721b369c5cc800069a3a9b2e257d7d71011a... handshake new: [123] feffc9fdbcb34e409bc4408ee6e1721b369c5cc800069a3a9b2e257d7d71011a... record old: [136] 0100007c000000000000007cfeffc9fdbcb34e409bc4408ee6e1721b369c5cc8... record new: [135] 0100007b000000000000007bfeffc9fdbcb34e409bc4408ee6e1721b369c5cc8... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeffc9fdbcb34e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [181] fefd2cfa709674b15ce21a9dc4d29442da7e9382826fcb79be55ab5b1d9ac7b4... handshake new: [157] fefd2cfa709674b15ce21a9dc4d29442da7e9382826fcb79be55ab5b1d9ac7b4... record old: [193] 010000b500000000000000b5fefd2cfa709674b15ce21a9dc4d29442da7e9382... record new: [169] 0100009d000000000000009dfefd2cfa709674b15ce21a9dc4d29442da7e9382... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefd2cfa709674... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [184] fefd400d54f3063bd87eb56c7281eea5f0e70ae0c30ac94500d60615b8996028... handshake new: [170] fefd400d54f3063bd87eb56c7281eea5f0e70ae0c30ac94500d60615b8996028... record old: [196] 010000b800000000000000b8fefd400d54f3063bd87eb56c7281eea5f0e70ae0... record new: [182] 010000aa00000000000000aafefd400d54f3063bd87eb56c7281eea5f0e70ae0... client: Filtered packet: [195] 16feff000000000000000000b6010000aa00000000000000aafefd400d54f306... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/1 (6 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [114] feff1a3e3f7dc71fe49888efa92aa637a0903fcb038d8acf24a2e59dd2ca78fe... handshake new: [100] feff1a3e3f7dc71fe49888efa92aa637a0903fcb038d8acf24a2e59dd2ca78fe... record old: [126] 010000720000000000000072feff1a3e3f7dc71fe49888efa92aa637a0903fcb... record new: [112] 010000640000000000000064feff1a3e3f7dc71fe49888efa92aa637a0903fcb... client: Filtered packet: [125] 16feff00000000000000000070010000640000000000000064feff1a3e3f7dc7... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/2 (7 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [3] 000100 handshake old: [181] fefd54a5b07a67c4114a072603886f55a155ef4207de317ec2efe4defaaa3192... handshake new: [164] fefd54a5b07a67c4114a072603886f55a155ef4207de317ec2efe4defaaa3192... record old: [193] 010000b500000000000000b5fefd54a5b07a67c4114a072603886f55a155ef42... record new: [176] 010000a400000000000000a4fefd54a5b07a67c4114a072603886f55a155ef42... client: Filtered packet: [189] 16feff000000000000000000b0010000a400000000000000a4fefd54a5b07a67... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [184] fefd9da3ee7e630e3ef15adf5e17ebcfb9ace04817c39d0b5e780314df3f1092... handshake new: [177] fefd9da3ee7e630e3ef15adf5e17ebcfb9ace04817c39d0b5e780314df3f1092... record old: [196] 010000b800000000000000b8fefd9da3ee7e630e3ef15adf5e17ebcfb9ace048... record new: [189] 010000b100000000000000b1fefd9da3ee7e630e3ef15adf5e17ebcfb9ace048... client: Filtered packet: [202] 16feff000000000000000000bd010000b100000000000000b1fefd9da3ee7e63... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [114] feff74a83e20898c39d42298dce95032979e2755e204d71fe0902bdd00ba4659... handshake new: [107] feff74a83e20898c39d42298dce95032979e2755e204d71fe0902bdd00ba4659... record old: [126] 010000720000000000000072feff74a83e20898c39d42298dce95032979e2755... record new: [119] 0100006b000000000000006bfeff74a83e20898c39d42298dce95032979e2755... client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeff74a83e2089... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [4] 09990000 handshake old: [181] fefd44af37d6aa844b2bd3929120f328f29703a3f1953ca4ecc3e3ba0118a996... handshake new: [165] fefd44af37d6aa844b2bd3929120f328f29703a3f1953ca4ecc3e3ba0118a996... record old: [193] 010000b500000000000000b5fefd44af37d6aa844b2bd3929120f328f29703a3... record new: [177] 010000a500000000000000a5fefd44af37d6aa844b2bd3929120f328f29703a3... client: Filtered packet: [190] 16feff000000000000000000b1010000a500000000000000a5fefd44af37d6aa... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [184] fefdcd66ae29a3a59902e7cd3deb6e683a5ae22b2bff1ddb35879a29577fc727... handshake new: [178] fefdcd66ae29a3a59902e7cd3deb6e683a5ae22b2bff1ddb35879a29577fc727... record old: [196] 010000b800000000000000b8fefdcd66ae29a3a59902e7cd3deb6e683a5ae22b... record new: [190] 010000b200000000000000b2fefdcd66ae29a3a59902e7cd3deb6e683a5ae22b... client: Filtered packet: [203] 16feff000000000000000000be010000b200000000000000b2fefdcd66ae29a3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [114] feff134ff059a71f03fdbf5b3d62465121521d6e77ba6e43e54b0e2612d5e44a... handshake new: [108] feff134ff059a71f03fdbf5b3d62465121521d6e77ba6e43e54b0e2612d5e44a... record old: [126] 010000720000000000000072feff134ff059a71f03fdbf5b3d62465121521d6e... record new: [120] 0100006c000000000000006cfeff134ff059a71f03fdbf5b3d62465121521d6e... client: Filtered packet: [133] 16feff000000000000000000780100006c000000000000006cfeff134ff059a7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [5] 0002000000 handshake old: [181] fefd2963559619c98ad5e47d5bd269bc3bfba4bb0f25ae5a1ff0b4a8208f9cc9... handshake new: [166] fefd2963559619c98ad5e47d5bd269bc3bfba4bb0f25ae5a1ff0b4a8208f9cc9... record old: [193] 010000b500000000000000b5fefd2963559619c98ad5e47d5bd269bc3bfba4bb... record new: [178] 010000a600000000000000a6fefd2963559619c98ad5e47d5bd269bc3bfba4bb... client: Filtered packet: [191] 16feff000000000000000000b2010000a600000000000000a6fefd2963559619... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [184] fefd35b8c4e75d0a218781e047dcfee886fbbceb4cc89deba96fb8eb0c798c49... handshake new: [179] fefd35b8c4e75d0a218781e047dcfee886fbbceb4cc89deba96fb8eb0c798c49... record old: [196] 010000b800000000000000b8fefd35b8c4e75d0a218781e047dcfee886fbbceb... record new: [191] 010000b300000000000000b3fefd35b8c4e75d0a218781e047dcfee886fbbceb... client: Filtered packet: [204] 16feff000000000000000000bf010000b300000000000000b3fefd35b8c4e75d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [114] feff0fed7e0019c987a794dc218e1854640bbfe1033543fd0aa727ef631a475f... handshake new: [109] feff0fed7e0019c987a794dc218e1854640bbfe1033543fd0aa727ef631a475f... record old: [126] 010000720000000000000072feff0fed7e0019c987a794dc218e1854640bbfe1... record new: [121] 0100006d000000000000006dfeff0fed7e0019c987a794dc218e1854640bbfe1... client: Filtered packet: [134] 16feff000000000000000000790100006d000000000000006dfeff0fed7e0019... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (2 ms) [----------] 51 tests from ExtensionDatagram/TlsExtensionTestGeneric (135 ms total) [----------] 39 tests from ExtensionPre13Stream/TlsExtensionTestPre13 [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0301141c7d5a70d6083b23e6f13357ab53cd98cc5eeac860b7df7cbe0f9052a3... handshake new: [99] 0301141c7d5a70d6083b23e6f13357ab53cd98cc5eeac860b7df7cbe0f9052a3... record old: [721] 020000650301141c7d5a70d6083b23e6f13357ab53cd98cc5eeac860b7df7cbe... record new: [719] 020000630301141c7d5a70d6083b23e6f13357ab53cd98cc5eeac860b7df7cbe... server: Filtered packet: [724] 16030102cf020000630301141c7d5a70d6083b23e6f13357ab53cd98cc5eeac8... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 03021ef71f99e49d3c5834dcba09ee7ad919384982915efab75d52277f551ce2... handshake new: [99] 03021ef71f99e49d3c5834dcba09ee7ad919384982915efab75d52277f551ce2... record old: [721] 0200006503021ef71f99e49d3c5834dcba09ee7ad919384982915efab75d5227... record new: [719] 0200006303021ef71f99e49d3c5834dcba09ee7ad919384982915efab75d5227... server: Filtered packet: [724] 16030202cf0200006303021ef71f99e49d3c5834dcba09ee7ad919384982915e... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0303feae33990694383923eff6927ba0cc8bd5063ccb019ebd0515656104c5b9... handshake new: [99] 0303feae33990694383923eff6927ba0cc8bd5063ccb019ebd0515656104c5b9... record old: [723] 020000650303feae33990694383923eff6927ba0cc8bd5063ccb019ebd051565... record new: [721] 020000630303feae33990694383923eff6927ba0cc8bd5063ccb019ebd051565... server: Filtered packet: [726] 16030302d1020000630303feae33990694383923eff6927ba0cc8bd5063ccb01... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 0301cadc583666ee6a8d5569eb230e1ae1d2a15523a39a93d9edb0fd7c11743e... handshake new: [100] 0301cadc583666ee6a8d5569eb230e1ae1d2a15523a39a93d9edb0fd7c11743e... record old: [721] 020000650301cadc583666ee6a8d5569eb230e1ae1d2a15523a39a93d9edb0fd... record new: [720] 020000640301cadc583666ee6a8d5569eb230e1ae1d2a15523a39a93d9edb0fd... server: Filtered packet: [725] 16030102d0020000640301cadc583666ee6a8d5569eb230e1ae1d2a15523a39a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 03021b8caf5bf6992f632b611a479e962090a4bd214be7cac01c400ab5cd662e... handshake new: [100] 03021b8caf5bf6992f632b611a479e962090a4bd214be7cac01c400ab5cd662e... record old: [721] 0200006503021b8caf5bf6992f632b611a479e962090a4bd214be7cac01c400a... record new: [720] 0200006403021b8caf5bf6992f632b611a479e962090a4bd214be7cac01c400a... server: Filtered packet: [725] 16030202d00200006403021b8caf5bf6992f632b611a479e962090a4bd214be7... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 0303c4fb5070e60e469ef807ae6007269ac8fd1f96d25dc906c257c37674ef30... handshake new: [100] 0303c4fb5070e60e469ef807ae6007269ac8fd1f96d25dc906c257c37674ef30... record old: [723] 020000650303c4fb5070e60e469ef807ae6007269ac8fd1f96d25dc906c257c3... record new: [722] 020000640303c4fb5070e60e469ef807ae6007269ac8fd1f96d25dc906c257c3... server: Filtered packet: [727] 16030302d2020000640303c4fb5070e60e469ef807ae6007269ac8fd1f96d25d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 030136ab134c380db1d32ba6a54fb979be5481f0f5251dd5331ed2cfd9e5dbf2... handshake new: [102] 030136ab134c380db1d32ba6a54fb979be5481f0f5251dd5331ed2cfd9e5dbf2... record old: [721] 02000065030136ab134c380db1d32ba6a54fb979be5481f0f5251dd5331ed2cf... record new: [722] 02000066030136ab134c380db1d32ba6a54fb979be5481f0f5251dd5331ed2cf... server: Filtered packet: [727] 16030102d202000066030136ab134c380db1d32ba6a54fb979be5481f0f5251d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 03029136b81d1ae3c3aa8a8d0626b9cd3f8ba6c3eb6ae9a265320385b7e7a841... handshake new: [102] 03029136b81d1ae3c3aa8a8d0626b9cd3f8ba6c3eb6ae9a265320385b7e7a841... record old: [721] 0200006503029136b81d1ae3c3aa8a8d0626b9cd3f8ba6c3eb6ae9a265320385... record new: [722] 0200006603029136b81d1ae3c3aa8a8d0626b9cd3f8ba6c3eb6ae9a265320385... server: Filtered packet: [727] 16030202d20200006603029136b81d1ae3c3aa8a8d0626b9cd3f8ba6c3eb6ae9... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 0303b295136ccfc8c55d70fec945756d20daaedd818e92cab1fca00db62beb6a... handshake new: [102] 0303b295136ccfc8c55d70fec945756d20daaedd818e92cab1fca00db62beb6a... record old: [723] 020000650303b295136ccfc8c55d70fec945756d20daaedd818e92cab1fca00d... record new: [724] 020000660303b295136ccfc8c55d70fec945756d20daaedd818e92cab1fca00d... server: Filtered packet: [729] 16030302d4020000660303b295136ccfc8c55d70fec945756d20daaedd818e92... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 030196d49af2f18818503ab7cc9afba15d7f99aef0e84383d3cc26f9cbe0c642... handshake new: [103] 030196d49af2f18818503ab7cc9afba15d7f99aef0e84383d3cc26f9cbe0c642... record old: [721] 02000065030196d49af2f18818503ab7cc9afba15d7f99aef0e84383d3cc26f9... record new: [723] 02000067030196d49af2f18818503ab7cc9afba15d7f99aef0e84383d3cc26f9... server: Filtered packet: [728] 16030102d302000067030196d49af2f18818503ab7cc9afba15d7f99aef0e843... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 03029a5406b3b35e0aa7e6d08aebf909affb0dbca53e6d49538b867004b55e33... handshake new: [103] 03029a5406b3b35e0aa7e6d08aebf909affb0dbca53e6d49538b867004b55e33... record old: [721] 0200006503029a5406b3b35e0aa7e6d08aebf909affb0dbca53e6d49538b8670... record new: [723] 0200006703029a5406b3b35e0aa7e6d08aebf909affb0dbca53e6d49538b8670... server: Filtered packet: [728] 16030202d30200006703029a5406b3b35e0aa7e6d08aebf909affb0dbca53e6d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 030395b0d60c5acf8409e4f95d62a1452c924261c88a5e39f378a8809b5d4835... handshake new: [103] 030395b0d60c5acf8409e4f95d62a1452c924261c88a5e39f378a8809b5d4835... record old: [723] 02000065030395b0d60c5acf8409e4f95d62a1452c924261c88a5e39f378a880... record new: [725] 02000067030395b0d60c5acf8409e4f95d62a1452c924261c88a5e39f378a880... server: Filtered packet: [730] 16030302d502000067030395b0d60c5acf8409e4f95d62a1452c924261c88a5e... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 030169569207b4a4d7562df26691f19908f96f123fb09f1140f41fe8cca7c328... handshake new: [102] 030169569207b4a4d7562df26691f19908f96f123fb09f1140f41fe8cca7c328... record old: [721] 02000065030169569207b4a4d7562df26691f19908f96f123fb09f1140f41fe8... record new: [722] 02000066030169569207b4a4d7562df26691f19908f96f123fb09f1140f41fe8... server: Filtered packet: [727] 16030102d202000066030169569207b4a4d7562df26691f19908f96f123fb09f... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0302e1b16166e6bb8ce96718fc247894e721c98fadc08ff52e1732de34be8ae6... handshake new: [102] 0302e1b16166e6bb8ce96718fc247894e721c98fadc08ff52e1732de34be8ae6... record old: [721] 020000650302e1b16166e6bb8ce96718fc247894e721c98fadc08ff52e1732de... record new: [722] 020000660302e1b16166e6bb8ce96718fc247894e721c98fadc08ff52e1732de... server: Filtered packet: [727] 16030202d2020000660302e1b16166e6bb8ce96718fc247894e721c98fadc08f... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 03035f2b2e3f11fcadef9bd253acbdd1337961ee581c2238817ed0a880b36abe... handshake new: [102] 03035f2b2e3f11fcadef9bd253acbdd1337961ee581c2238817ed0a880b36abe... record old: [723] 0200006503035f2b2e3f11fcadef9bd253acbdd1337961ee581c2238817ed0a8... record new: [724] 0200006603035f2b2e3f11fcadef9bd253acbdd1337961ee581c2238817ed0a8... server: Filtered packet: [729] 16030302d40200006603035f2b2e3f11fcadef9bd253acbdd1337961ee581c22... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 03018b3a9c931e4ce479423f6a92c60b9c786b1c4da196d5214cfde7bdcd35e8... handshake new: [101] 03018b3a9c931e4ce479423f6a92c60b9c786b1c4da196d5214cfde7bdcd35e8... record old: [721] 0200006503018b3a9c931e4ce479423f6a92c60b9c786b1c4da196d5214cfde7... record new: [721] 0200006503018b3a9c931e4ce479423f6a92c60b9c786b1c4da196d5214cfde7... server: Filtered packet: [726] 16030102d10200006503018b3a9c931e4ce479423f6a92c60b9c786b1c4da196... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0302b0e960c20ba93806fa4562baf30a9aceb925868c0800e22a6dc4c4e9ce07... handshake new: [101] 0302b0e960c20ba93806fa4562baf30a9aceb925868c0800e22a6dc4c4e9ce07... record old: [721] 020000650302b0e960c20ba93806fa4562baf30a9aceb925868c0800e22a6dc4... record new: [721] 020000650302b0e960c20ba93806fa4562baf30a9aceb925868c0800e22a6dc4... server: Filtered packet: [726] 16030202d1020000650302b0e960c20ba93806fa4562baf30a9aceb925868c08... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 030358f8ff2ecc67749364940cc374e342b426a836611e339b7870d36baee892... handshake new: [101] 030358f8ff2ecc67749364940cc374e342b426a836611e339b7870d36baee892... record old: [723] 02000065030358f8ff2ecc67749364940cc374e342b426a836611e339b7870d3... record new: [723] 02000065030358f8ff2ecc67749364940cc374e342b426a836611e339b7870d3... server: Filtered packet: [728] 16030302d302000065030358f8ff2ecc67749364940cc374e342b426a836611e... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 03014a3f4e828274d4823b988cf83bcd0f34dd0ff4bef9b611e04af0c6867f1d... handshake new: [101] 03014a3f4e828274d4823b988cf83bcd0f34dd0ff4bef9b611e04af0c6867f1d... record old: [721] 0200006503014a3f4e828274d4823b988cf83bcd0f34dd0ff4bef9b611e04af0... record new: [721] 0200006503014a3f4e828274d4823b988cf83bcd0f34dd0ff4bef9b611e04af0... server: Filtered packet: [726] 16030102d10200006503014a3f4e828274d4823b988cf83bcd0f34dd0ff4bef9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 03025a7c9449ecd1de1af55e18d0ff88dc50018d84a45bdd3d7926fc110c25a4... handshake new: [101] 03025a7c9449ecd1de1af55e18d0ff88dc50018d84a45bdd3d7926fc110c25a4... record old: [721] 0200006503025a7c9449ecd1de1af55e18d0ff88dc50018d84a45bdd3d7926fc... record new: [721] 0200006503025a7c9449ecd1de1af55e18d0ff88dc50018d84a45bdd3d7926fc... server: Filtered packet: [726] 16030202d10200006503025a7c9449ecd1de1af55e18d0ff88dc50018d84a45b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 0303fe3ead04aaeba2575cac9fd52aa977ac269204fb11b0d6c4b76a22c94ef4... handshake new: [101] 0303fe3ead04aaeba2575cac9fd52aa977ac269204fb11b0d6c4b76a22c94ef4... record old: [723] 020000650303fe3ead04aaeba2575cac9fd52aa977ac269204fb11b0d6c4b76a... record new: [723] 020000650303fe3ead04aaeba2575cac9fd52aa977ac269204fb11b0d6c4b76a... server: Filtered packet: [728] 16030302d3020000650303fe3ead04aaeba2575cac9fd52aa977ac269204fb11... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 030135b709f2db6e2ef77c1f10f873ad12d1f0f838a2f9e831d177a98d4436f1... handshake new: [116] 030135b709f2db6e2ef77c1f10f873ad12d1f0f838a2f9e831d177a98d4436f1... record old: [121] 01000075030135b709f2db6e2ef77c1f10f873ad12d1f0f838a2f9e831d177a9... record new: [120] 01000074030135b709f2db6e2ef77c1f10f873ad12d1f0f838a2f9e831d177a9... client: Filtered packet: [125] 160301007801000074030135b709f2db6e2ef77c1f10f873ad12d1f0f838a2f9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 0302707afea57a08df32666513cccbfa78212953448adc60676eeccdb0335d0f... handshake new: [116] 0302707afea57a08df32666513cccbfa78212953448adc60676eeccdb0335d0f... record old: [121] 010000750302707afea57a08df32666513cccbfa78212953448adc60676eeccd... record new: [120] 010000740302707afea57a08df32666513cccbfa78212953448adc60676eeccd... client: Filtered packet: [125] 1603010078010000740302707afea57a08df32666513cccbfa78212953448adc... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [187] 0303baf1d6243a94c49381cedeb400780c423942464d345f697d6072c2f38c01... handshake new: [186] 0303baf1d6243a94c49381cedeb400780c423942464d345f697d6072c2f38c01... record old: [191] 010000bb0303baf1d6243a94c49381cedeb400780c423942464d345f697d6072... record new: [190] 010000ba0303baf1d6243a94c49381cedeb400780c423942464d345f697d6072... client: Filtered packet: [195] 16030100be010000ba0303baf1d6243a94c49381cedeb400780c423942464d34... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 030119c1a8891bacbee0a34e622655ae966fdbaffa56558ff396f8297217b76f... handshake new: [118] 030119c1a8891bacbee0a34e622655ae966fdbaffa56558ff396f8297217b76f... record old: [121] 01000075030119c1a8891bacbee0a34e622655ae966fdbaffa56558ff396f829... record new: [122] 01000076030119c1a8891bacbee0a34e622655ae966fdbaffa56558ff396f829... client: Filtered packet: [127] 160301007a01000076030119c1a8891bacbee0a34e622655ae966fdbaffa5655... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 0302ff5b3ea69622c1a984e1ea1aaeefcfa92dce7751bb6ca2311a5aed097e13... handshake new: [118] 0302ff5b3ea69622c1a984e1ea1aaeefcfa92dce7751bb6ca2311a5aed097e13... record old: [121] 010000750302ff5b3ea69622c1a984e1ea1aaeefcfa92dce7751bb6ca2311a5a... record new: [122] 010000760302ff5b3ea69622c1a984e1ea1aaeefcfa92dce7751bb6ca2311a5a... client: Filtered packet: [127] 160301007a010000760302ff5b3ea69622c1a984e1ea1aaeefcfa92dce7751bb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [187] 0303553e85f93bcbfb1b54dd598add7a5d1c50457bf45f6a540dfce752c72027... handshake new: [188] 0303553e85f93bcbfb1b54dd598add7a5d1c50457bf45f6a540dfce752c72027... record old: [191] 010000bb0303553e85f93bcbfb1b54dd598add7a5d1c50457bf45f6a540dfce7... record new: [192] 010000bc0303553e85f93bcbfb1b54dd598add7a5d1c50457bf45f6a540dfce7... client: Filtered packet: [197] 16030100c0010000bc0303553e85f93bcbfb1b54dd598add7a5d1c50457bf45f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 03014680fe80e72cdb99619d67588534aae8db0055162c96800857a403096f01... handshake new: [118] 03014680fe80e72cdb99619d67588534aae8db0055162c96800857a403096f01... record old: [121] 0100007503014680fe80e72cdb99619d67588534aae8db0055162c96800857a4... record new: [122] 0100007603014680fe80e72cdb99619d67588534aae8db0055162c96800857a4... client: Filtered packet: [127] 160301007a0100007603014680fe80e72cdb99619d67588534aae8db0055162c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 0302183640b7d915dc3d772443db06b45d5974856109fa4cb6f7fcf1ecc11e0d... handshake new: [118] 0302183640b7d915dc3d772443db06b45d5974856109fa4cb6f7fcf1ecc11e0d... record old: [121] 010000750302183640b7d915dc3d772443db06b45d5974856109fa4cb6f7fcf1... record new: [122] 010000760302183640b7d915dc3d772443db06b45d5974856109fa4cb6f7fcf1... client: Filtered packet: [127] 160301007a010000760302183640b7d915dc3d772443db06b45d5974856109fa... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [187] 0303108ea286037def080d028a4fa26a5c15a08dfc1f2a48eea5fac1d63be2b0... handshake new: [188] 0303108ea286037def080d028a4fa26a5c15a08dfc1f2a48eea5fac1d63be2b0... record old: [191] 010000bb0303108ea286037def080d028a4fa26a5c15a08dfc1f2a48eea5fac1... record new: [192] 010000bc0303108ea286037def080d028a4fa26a5c15a08dfc1f2a48eea5fac1... client: Filtered packet: [197] 16030100c0010000bc0303108ea286037def080d028a4fa26a5c15a08dfc1f2a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 03010b4657bd7100e6e8b8bd8c1893c90a8330871be904dab41a33ee6adbed00... handshake new: [117] 03010b4657bd7100e6e8b8bd8c1893c90a8330871be904dab41a33ee6adbed00... record old: [121] 0100007503010b4657bd7100e6e8b8bd8c1893c90a8330871be904dab41a33ee... record new: [121] 0100007503010b4657bd7100e6e8b8bd8c1893c90a8330871be904dab41a33ee... client: Filtered packet: [126] 16030100790100007503010b4657bd7100e6e8b8bd8c1893c90a8330871be904... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 0302ba71dc53c24babbf0491f23ac875adc2fe67023d6616bc8eac7900936282... handshake new: [117] 0302ba71dc53c24babbf0491f23ac875adc2fe67023d6616bc8eac7900936282... record old: [121] 010000750302ba71dc53c24babbf0491f23ac875adc2fe67023d6616bc8eac79... record new: [121] 010000750302ba71dc53c24babbf0491f23ac875adc2fe67023d6616bc8eac79... client: Filtered packet: [126] 1603010079010000750302ba71dc53c24babbf0491f23ac875adc2fe67023d66... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [187] 03034afda85612f848da84e8f98805bd445b647d0d8ec0cba440ba7e94701e29... handshake new: [187] 03034afda85612f848da84e8f98805bd445b647d0d8ec0cba440ba7e94701e29... record old: [191] 010000bb03034afda85612f848da84e8f98805bd445b647d0d8ec0cba440ba7e... record new: [191] 010000bb03034afda85612f848da84e8f98805bd445b647d0d8ec0cba440ba7e... client: Filtered packet: [196] 16030100bf010000bb03034afda85612f848da84e8f98805bd445b647d0d8ec0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 0301d9b3a8a10aa6341173563bcdb327608db742b5557feab176f4bc37f5b8ec... handshake new: [118] 0301d9b3a8a10aa6341173563bcdb327608db742b5557feab176f4bc37f5b8ec... record old: [121] 010000750301d9b3a8a10aa6341173563bcdb327608db742b5557feab176f4bc... record new: [122] 010000760301d9b3a8a10aa6341173563bcdb327608db742b5557feab176f4bc... client: Filtered packet: [127] 160301007a010000760301d9b3a8a10aa6341173563bcdb327608db742b5557f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 0302afe2419b4e66528ae6d01cf08860d4c1c3120c861d9c549c9f3540a6b874... handshake new: [118] 0302afe2419b4e66528ae6d01cf08860d4c1c3120c861d9c549c9f3540a6b874... record old: [121] 010000750302afe2419b4e66528ae6d01cf08860d4c1c3120c861d9c549c9f35... record new: [122] 010000760302afe2419b4e66528ae6d01cf08860d4c1c3120c861d9c549c9f35... client: Filtered packet: [127] 160301007a010000760302afe2419b4e66528ae6d01cf08860d4c1c3120c861d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [187] 03035a62f69868f72cfe08048271ed98bfc01ffbe3dc7b7d7d5c7855b73a63b3... handshake new: [188] 03035a62f69868f72cfe08048271ed98bfc01ffbe3dc7b7d7d5c7855b73a63b3... record old: [191] 010000bb03035a62f69868f72cfe08048271ed98bfc01ffbe3dc7b7d7d5c7855... record new: [192] 010000bc03035a62f69868f72cfe08048271ed98bfc01ffbe3dc7b7d7d5c7855... client: Filtered packet: [197] 16030100c0010000bc03035a62f69868f72cfe08048271ed98bfc01ffbe3dc7b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 0301152144d0df0b17eb6de04cbe3a2b7e4e12652ff5b759378fccb8e8fe61e2... handshake new: [116] 0301152144d0df0b17eb6de04cbe3a2b7e4e12652ff5b759378fccb8e8fe61e2... record old: [121] 010000750301152144d0df0b17eb6de04cbe3a2b7e4e12652ff5b759378fccb8... record new: [120] 010000740301152144d0df0b17eb6de04cbe3a2b7e4e12652ff5b759378fccb8... client: Filtered packet: [125] 1603010078010000740301152144d0df0b17eb6de04cbe3a2b7e4e12652ff5b7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 0302edfa0576ada137e16014fed6f6a6c9765899bc176b6be6bc0735ed7ddc55... handshake new: [116] 0302edfa0576ada137e16014fed6f6a6c9765899bc176b6be6bc0735ed7ddc55... record old: [121] 010000750302edfa0576ada137e16014fed6f6a6c9765899bc176b6be6bc0735... record new: [120] 010000740302edfa0576ada137e16014fed6f6a6c9765899bc176b6be6bc0735... client: Filtered packet: [125] 1603010078010000740302edfa0576ada137e16014fed6f6a6c9765899bc176b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [187] 0303b761665371431c89db163956755817145658ad4b578cdec7756007bbde54... handshake new: [186] 0303b761665371431c89db163956755817145658ad4b578cdec7756007bbde54... record old: [191] 010000bb0303b761665371431c89db163956755817145658ad4b578cdec77560... record new: [190] 010000ba0303b761665371431c89db163956755817145658ad4b578cdec77560... client: Filtered packet: [195] 16030100be010000ba0303b761665371431c89db163956755817145658ad4b57... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (2 ms) [----------] 39 tests from ExtensionPre13Stream/TlsExtensionTestPre13 (107 ms total) [----------] 52 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 03021d524d96b6e26b2ac4e527ba4b9883d3c96e84bce83aba52132abedd218f... handshake new: [99] 03021d524d96b6e26b2ac4e527ba4b9883d3c96e84bce83aba52132abedd218f... record old: [721] 0200006503021d524d96b6e26b2ac4e527ba4b9883d3c96e84bce83aba52132a... record new: [719] 0200006303021d524d96b6e26b2ac4e527ba4b9883d3c96e84bce83aba52132a... server: Filtered packet: [724] 16030202cf0200006303021d524d96b6e26b2ac4e527ba4b9883d3c96e84bce8... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 030311a9e1d19390321ce7af4d951e0b7efee33849e4dfa09b8a145c76688afd... handshake new: [99] 030311a9e1d19390321ce7af4d951e0b7efee33849e4dfa09b8a145c76688afd... record old: [723] 02000065030311a9e1d19390321ce7af4d951e0b7efee33849e4dfa09b8a145c... record new: [721] 02000063030311a9e1d19390321ce7af4d951e0b7efee33849e4dfa09b8a145c... server: Filtered packet: [726] 16030302d102000063030311a9e1d19390321ce7af4d951e0b7efee33849e4df... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] feff3c19805bb76e87c324768f5d9ae75b3f2071f1487e85437b2c32156a73fa... handshake new: [99] feff3c19805bb76e87c324768f5d9ae75b3f2071f1487e85437b2c32156a73fa... record old: [113] 020000650000000000000065feff3c19805bb76e87c324768f5d9ae75b3f2071... record new: [111] 020000630000000000000063feff3c19805bb76e87c324768f5d9ae75b3f2071... server: Filtered packet: [803] 16feff0000000000000000006f020000630000000000000063feff3c19805bb7... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] fefdd7ef0ef19a50ed5bf3c8775704dd9df33d111ec7b93ade0bb2abfb03200c... handshake new: [99] fefdd7ef0ef19a50ed5bf3c8775704dd9df33d111ec7b93ade0bb2abfb03200c... record old: [113] 020000650000000000000065fefdd7ef0ef19a50ed5bf3c8775704dd9df33d11... record new: [111] 020000630000000000000063fefdd7ef0ef19a50ed5bf3c8775704dd9df33d11... server: Filtered packet: [805] 16fefd0000000000000000006f020000630000000000000063fefdd7ef0ef19a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 0302a388a406da6f5fc7ddefeff49664596980ad1783e6ef9c84e8d49a7052f7... handshake new: [100] 0302a388a406da6f5fc7ddefeff49664596980ad1783e6ef9c84e8d49a7052f7... record old: [721] 020000650302a388a406da6f5fc7ddefeff49664596980ad1783e6ef9c84e8d4... record new: [720] 020000640302a388a406da6f5fc7ddefeff49664596980ad1783e6ef9c84e8d4... server: Filtered packet: [725] 16030202d0020000640302a388a406da6f5fc7ddefeff49664596980ad1783e6... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 030390a32887099688e6d72099917987a748471e57b7876e0a36c5ef13dae240... handshake new: [100] 030390a32887099688e6d72099917987a748471e57b7876e0a36c5ef13dae240... record old: [723] 02000065030390a32887099688e6d72099917987a748471e57b7876e0a36c5ef... record new: [722] 02000064030390a32887099688e6d72099917987a748471e57b7876e0a36c5ef... server: Filtered packet: [727] 16030302d202000064030390a32887099688e6d72099917987a748471e57b787... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] fefff459fca39362f7e3887d4c0e262d59f73a31104c72f1f400d0a3740d76fd... handshake new: [100] fefff459fca39362f7e3887d4c0e262d59f73a31104c72f1f400d0a3740d76fd... record old: [113] 020000650000000000000065fefff459fca39362f7e3887d4c0e262d59f73a31... record new: [112] 020000640000000000000064fefff459fca39362f7e3887d4c0e262d59f73a31... server: Filtered packet: [804] 16feff00000000000000000070020000640000000000000064fefff459fca393... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] fefd862cf18808968b3fc4aa0906c31108dc87077121630cc91790edafbaeea0... handshake new: [100] fefd862cf18808968b3fc4aa0906c31108dc87077121630cc91790edafbaeea0... record old: [113] 020000650000000000000065fefd862cf18808968b3fc4aa0906c31108dc8707... record new: [112] 020000640000000000000064fefd862cf18808968b3fc4aa0906c31108dc8707... server: Filtered packet: [806] 16fefd00000000000000000070020000640000000000000064fefd862cf18808... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 0302acdc70168b5f3bf9209325882a473a4f5443e0a15629afa800da53421dbb... handshake new: [102] 0302acdc70168b5f3bf9209325882a473a4f5443e0a15629afa800da53421dbb... record old: [721] 020000650302acdc70168b5f3bf9209325882a473a4f5443e0a15629afa800da... record new: [722] 020000660302acdc70168b5f3bf9209325882a473a4f5443e0a15629afa800da... server: Filtered packet: [727] 16030202d2020000660302acdc70168b5f3bf9209325882a473a4f5443e0a156... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 03032e8193d1ca72aff14521f08ed8b8339ca24ec6c2b45478d5318d4610dd0d... handshake new: [102] 03032e8193d1ca72aff14521f08ed8b8339ca24ec6c2b45478d5318d4610dd0d... record old: [723] 0200006503032e8193d1ca72aff14521f08ed8b8339ca24ec6c2b45478d5318d... record new: [724] 0200006603032e8193d1ca72aff14521f08ed8b8339ca24ec6c2b45478d5318d... server: Filtered packet: [729] 16030302d40200006603032e8193d1ca72aff14521f08ed8b8339ca24ec6c2b4... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] feff87bcac55f8ad4de36e0fefb093d69b073f5fb75437404cf2735c38b6b141... handshake new: [102] feff87bcac55f8ad4de36e0fefb093d69b073f5fb75437404cf2735c38b6b141... record old: [113] 020000650000000000000065feff87bcac55f8ad4de36e0fefb093d69b073f5f... record new: [114] 020000660000000000000066feff87bcac55f8ad4de36e0fefb093d69b073f5f... server: Filtered packet: [806] 16feff00000000000000000072020000660000000000000066feff87bcac55f8... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] fefdec91640700ba230da196f922e626d735663e0b0e8d0f0754ce82bbe0f992... handshake new: [102] fefdec91640700ba230da196f922e626d735663e0b0e8d0f0754ce82bbe0f992... record old: [113] 020000650000000000000065fefdec91640700ba230da196f922e626d735663e... record new: [114] 020000660000000000000066fefdec91640700ba230da196f922e626d735663e... server: Filtered packet: [808] 16fefd00000000000000000072020000660000000000000066fefdec91640700... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 0302d3a2ec1e15a2f48d7dc64e779013fcfe441031c8f5a664c94f866e92a9e7... handshake new: [103] 0302d3a2ec1e15a2f48d7dc64e779013fcfe441031c8f5a664c94f866e92a9e7... record old: [721] 020000650302d3a2ec1e15a2f48d7dc64e779013fcfe441031c8f5a664c94f86... record new: [723] 020000670302d3a2ec1e15a2f48d7dc64e779013fcfe441031c8f5a664c94f86... server: Filtered packet: [728] 16030202d3020000670302d3a2ec1e15a2f48d7dc64e779013fcfe441031c8f5... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 03035e48981de41c9c70d4c0189c0090f0bf4d19861c1ecd1ee696205ae6a496... handshake new: [103] 03035e48981de41c9c70d4c0189c0090f0bf4d19861c1ecd1ee696205ae6a496... record old: [723] 0200006503035e48981de41c9c70d4c0189c0090f0bf4d19861c1ecd1ee69620... record new: [725] 0200006703035e48981de41c9c70d4c0189c0090f0bf4d19861c1ecd1ee69620... server: Filtered packet: [730] 16030302d50200006703035e48981de41c9c70d4c0189c0090f0bf4d19861c1e... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] feff22080954f5cfb4c159b42251b95e31c5696305eac86b7688487914c7d9b1... handshake new: [103] feff22080954f5cfb4c159b42251b95e31c5696305eac86b7688487914c7d9b1... record old: [113] 020000650000000000000065feff22080954f5cfb4c159b42251b95e31c56963... record new: [115] 020000670000000000000067feff22080954f5cfb4c159b42251b95e31c56963... server: Filtered packet: [807] 16feff00000000000000000073020000670000000000000067feff22080954f5... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] fefddf1a31bfc24939695ca1adc0f4cace5079844563afab72404afb1590a570... handshake new: [103] fefddf1a31bfc24939695ca1adc0f4cace5079844563afab72404afb1590a570... record old: [113] 020000650000000000000065fefddf1a31bfc24939695ca1adc0f4cace507984... record new: [115] 020000670000000000000067fefddf1a31bfc24939695ca1adc0f4cace507984... server: Filtered packet: [809] 16fefd00000000000000000073020000670000000000000067fefddf1a31bfc2... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0302c3faddbcd584b92b76ec58f6c3bda5c1f86822f92c0e14c30c16a671f660... handshake new: [102] 0302c3faddbcd584b92b76ec58f6c3bda5c1f86822f92c0e14c30c16a671f660... record old: [721] 020000650302c3faddbcd584b92b76ec58f6c3bda5c1f86822f92c0e14c30c16... record new: [722] 020000660302c3faddbcd584b92b76ec58f6c3bda5c1f86822f92c0e14c30c16... server: Filtered packet: [727] 16030202d2020000660302c3faddbcd584b92b76ec58f6c3bda5c1f86822f92c... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 030376b8a0d9c67698b24abca3dbf36177ffd796b0fc6a6a377294c10ae30638... handshake new: [102] 030376b8a0d9c67698b24abca3dbf36177ffd796b0fc6a6a377294c10ae30638... record old: [723] 02000065030376b8a0d9c67698b24abca3dbf36177ffd796b0fc6a6a377294c1... record new: [724] 02000066030376b8a0d9c67698b24abca3dbf36177ffd796b0fc6a6a377294c1... server: Filtered packet: [729] 16030302d402000066030376b8a0d9c67698b24abca3dbf36177ffd796b0fc6a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] feff11fb817236c2784b114ef855cf37a326fc3b36d796a509e8beefc7d01beb... handshake new: [102] feff11fb817236c2784b114ef855cf37a326fc3b36d796a509e8beefc7d01beb... record old: [113] 020000650000000000000065feff11fb817236c2784b114ef855cf37a326fc3b... record new: [114] 020000660000000000000066feff11fb817236c2784b114ef855cf37a326fc3b... server: Filtered packet: [806] 16feff00000000000000000072020000660000000000000066feff11fb817236... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] fefd9cf5ec5773029813583fc7b45f4b23f229e0bdde8ab3b769e5180ee7fb43... handshake new: [102] fefd9cf5ec5773029813583fc7b45f4b23f229e0bdde8ab3b769e5180ee7fb43... record old: [113] 020000650000000000000065fefd9cf5ec5773029813583fc7b45f4b23f229e0... record new: [114] 020000660000000000000066fefd9cf5ec5773029813583fc7b45f4b23f229e0... server: Filtered packet: [808] 16fefd00000000000000000072020000660000000000000066fefd9cf5ec5773... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0302b7bc6953f24800054602daf29e9c1d4e642f2f92583d052e603e73188e51... handshake new: [101] 0302b7bc6953f24800054602daf29e9c1d4e642f2f92583d052e603e73188e51... record old: [721] 020000650302b7bc6953f24800054602daf29e9c1d4e642f2f92583d052e603e... record new: [721] 020000650302b7bc6953f24800054602daf29e9c1d4e642f2f92583d052e603e... server: Filtered packet: [726] 16030202d1020000650302b7bc6953f24800054602daf29e9c1d4e642f2f9258... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0303cb05b28a5017f29a39562fc14f15815fa17c82425a2a258b1bccaddec336... handshake new: [101] 0303cb05b28a5017f29a39562fc14f15815fa17c82425a2a258b1bccaddec336... record old: [723] 020000650303cb05b28a5017f29a39562fc14f15815fa17c82425a2a258b1bcc... record new: [723] 020000650303cb05b28a5017f29a39562fc14f15815fa17c82425a2a258b1bcc... server: Filtered packet: [728] 16030302d3020000650303cb05b28a5017f29a39562fc14f15815fa17c82425a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] fefffea0a9f7d063931f7afaa32a10f72b3513b55287cc621f9c75de1bf7b822... handshake new: [101] fefffea0a9f7d063931f7afaa32a10f72b3513b55287cc621f9c75de1bf7b822... record old: [113] 020000650000000000000065fefffea0a9f7d063931f7afaa32a10f72b3513b5... record new: [113] 020000650000000000000065fefffea0a9f7d063931f7afaa32a10f72b3513b5... server: Filtered packet: [805] 16feff00000000000000000071020000650000000000000065fefffea0a9f7d0... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] fefd952cfa28daa328030e3469a141dd73216f58bc37fc1ff3c94f299e913341... handshake new: [101] fefd952cfa28daa328030e3469a141dd73216f58bc37fc1ff3c94f299e913341... record old: [113] 020000650000000000000065fefd952cfa28daa328030e3469a141dd73216f58... record new: [113] 020000650000000000000065fefd952cfa28daa328030e3469a141dd73216f58... server: Filtered packet: [807] 16fefd00000000000000000071020000650000000000000065fefd952cfa28da... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 0302ad76d3b84f2de1d8ffff26f521ab2838823a7cec32736b5d5ed7d9bd6bbc... handshake new: [101] 0302ad76d3b84f2de1d8ffff26f521ab2838823a7cec32736b5d5ed7d9bd6bbc... record old: [721] 020000650302ad76d3b84f2de1d8ffff26f521ab2838823a7cec32736b5d5ed7... record new: [721] 020000650302ad76d3b84f2de1d8ffff26f521ab2838823a7cec32736b5d5ed7... server: Filtered packet: [726] 16030202d1020000650302ad76d3b84f2de1d8ffff26f521ab2838823a7cec32... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 03038675c10308f5c7d3ec037b93a3dbdd026b442ab89e5ea6a423ecca342f6a... handshake new: [101] 03038675c10308f5c7d3ec037b93a3dbdd026b442ab89e5ea6a423ecca342f6a... record old: [723] 0200006503038675c10308f5c7d3ec037b93a3dbdd026b442ab89e5ea6a423ec... record new: [723] 0200006503038675c10308f5c7d3ec037b93a3dbdd026b442ab89e5ea6a423ec... server: Filtered packet: [728] 16030302d30200006503038675c10308f5c7d3ec037b93a3dbdd026b442ab89e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] feff156b5d8e233c58589196335ccb7501d77383b7e095c256c22bab47f9c665... handshake new: [101] feff156b5d8e233c58589196335ccb7501d77383b7e095c256c22bab47f9c665... record old: [113] 020000650000000000000065feff156b5d8e233c58589196335ccb7501d77383... record new: [113] 020000650000000000000065feff156b5d8e233c58589196335ccb7501d77383... server: Filtered packet: [805] 16feff00000000000000000071020000650000000000000065feff156b5d8e23... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] fefd24da02c9e479da10ed4622dd2895cd0e9f605ef0531d7f7ffec59e17dbc8... handshake new: [101] fefd24da02c9e479da10ed4622dd2895cd0e9f605ef0531d7f7ffec59e17dbc8... record old: [113] 020000650000000000000065fefd24da02c9e479da10ed4622dd2895cd0e9f60... record new: [113] 020000650000000000000065fefd24da02c9e479da10ed4622dd2895cd0e9f60... server: Filtered packet: [807] 16fefd00000000000000000071020000650000000000000065fefd24da02c9e4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 03025a889dc09656c334fcfea9a22754790c357fd417c7483c973c41c7fbd798... handshake new: [116] 03025a889dc09656c334fcfea9a22754790c357fd417c7483c973c41c7fbd798... record old: [121] 0100007503025a889dc09656c334fcfea9a22754790c357fd417c7483c973c41... record new: [120] 0100007403025a889dc09656c334fcfea9a22754790c357fd417c7483c973c41... client: Filtered packet: [125] 16030100780100007403025a889dc09656c334fcfea9a22754790c357fd417c7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [187] 03036d07b04055329582185a55d4830b672c8e4c6eb86c4d64d33a810ef9b429... handshake new: [186] 03036d07b04055329582185a55d4830b672c8e4c6eb86c4d64d33a810ef9b429... record old: [191] 010000bb03036d07b04055329582185a55d4830b672c8e4c6eb86c4d64d33a81... record new: [190] 010000ba03036d07b04055329582185a55d4830b672c8e4c6eb86c4d64d33a81... client: Filtered packet: [195] 16030100be010000ba03036d07b04055329582185a55d4830b672c8e4c6eb86c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [114] fefff0da6c4b2f4ed31d78a13d9671021f010c48b9372bcde86a170e7f8b734a... handshake new: [113] fefff0da6c4b2f4ed31d78a13d9671021f010c48b9372bcde86a170e7f8b734a... record old: [126] 010000720000000000000072fefff0da6c4b2f4ed31d78a13d9671021f010c48... record new: [125] 010000710000000000000071fefff0da6c4b2f4ed31d78a13d9671021f010c48... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071fefff0da6c4b2f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [184] fefdf7d35d52bb71cf504ffb522fcf9cd4753cd4e25217d1b405d62eb522978a... handshake new: [183] fefdf7d35d52bb71cf504ffb522fcf9cd4753cd4e25217d1b405d62eb522978a... record old: [196] 010000b800000000000000b8fefdf7d35d52bb71cf504ffb522fcf9cd4753cd4... record new: [195] 010000b700000000000000b7fefdf7d35d52bb71cf504ffb522fcf9cd4753cd4... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefdf7d35d52bb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 03023a74eec924033ed3d05bc7cae52afd1033855e9e0655c8ee2332a1b0ce4d... handshake new: [118] 03023a74eec924033ed3d05bc7cae52afd1033855e9e0655c8ee2332a1b0ce4d... record old: [121] 0100007503023a74eec924033ed3d05bc7cae52afd1033855e9e0655c8ee2332... record new: [122] 0100007603023a74eec924033ed3d05bc7cae52afd1033855e9e0655c8ee2332... client: Filtered packet: [127] 160301007a0100007603023a74eec924033ed3d05bc7cae52afd1033855e9e06... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [187] 0303218fb73cd0ac359b0af0491d7116afb7687513c605c8e67960d1d951db4a... handshake new: [188] 0303218fb73cd0ac359b0af0491d7116afb7687513c605c8e67960d1d951db4a... record old: [191] 010000bb0303218fb73cd0ac359b0af0491d7116afb7687513c605c8e67960d1... record new: [192] 010000bc0303218fb73cd0ac359b0af0491d7116afb7687513c605c8e67960d1... client: Filtered packet: [197] 16030100c0010000bc0303218fb73cd0ac359b0af0491d7116afb7687513c605... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [114] feffb277a5f111c5bdd778352962349698dbe9900f338a3df9a4080811a219a5... handshake new: [115] feffb277a5f111c5bdd778352962349698dbe9900f338a3df9a4080811a219a5... record old: [126] 010000720000000000000072feffb277a5f111c5bdd778352962349698dbe990... record new: [127] 010000730000000000000073feffb277a5f111c5bdd778352962349698dbe990... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feffb277a5f111... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [184] fefd0da937cc3d398e2adfb439b093d382d171972e6c9efaec5d07de8e451264... handshake new: [185] fefd0da937cc3d398e2adfb439b093d382d171972e6c9efaec5d07de8e451264... record old: [196] 010000b800000000000000b8fefd0da937cc3d398e2adfb439b093d382d17197... record new: [197] 010000b900000000000000b9fefd0da937cc3d398e2adfb439b093d382d17197... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefd0da937cc3d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 0302824a3c9f8bf8e9d32fe6b5eba58635f94cea6c585b561e47b1b6704cf32f... handshake new: [118] 0302824a3c9f8bf8e9d32fe6b5eba58635f94cea6c585b561e47b1b6704cf32f... record old: [121] 010000750302824a3c9f8bf8e9d32fe6b5eba58635f94cea6c585b561e47b1b6... record new: [122] 010000760302824a3c9f8bf8e9d32fe6b5eba58635f94cea6c585b561e47b1b6... client: Filtered packet: [127] 160301007a010000760302824a3c9f8bf8e9d32fe6b5eba58635f94cea6c585b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [187] 0303ad1711f33261245044aa32a9cfed34a549284e780be030d657c40f8110da... handshake new: [188] 0303ad1711f33261245044aa32a9cfed34a549284e780be030d657c40f8110da... record old: [191] 010000bb0303ad1711f33261245044aa32a9cfed34a549284e780be030d657c4... record new: [192] 010000bc0303ad1711f33261245044aa32a9cfed34a549284e780be030d657c4... client: Filtered packet: [197] 16030100c0010000bc0303ad1711f33261245044aa32a9cfed34a549284e780b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [114] feff2476b48aacd4797493ce1abc54e720df3b18e58a16c6a13fbf817c42a3e7... handshake new: [115] feff2476b48aacd4797493ce1abc54e720df3b18e58a16c6a13fbf817c42a3e7... record old: [126] 010000720000000000000072feff2476b48aacd4797493ce1abc54e720df3b18... record new: [127] 010000730000000000000073feff2476b48aacd4797493ce1abc54e720df3b18... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feff2476b48aac... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [184] fefd1223018176727bb6a7558ec01b070d303c9b00910db08b43455313bb2dcf... handshake new: [185] fefd1223018176727bb6a7558ec01b070d303c9b00910db08b43455313bb2dcf... record old: [196] 010000b800000000000000b8fefd1223018176727bb6a7558ec01b070d303c9b... record new: [197] 010000b900000000000000b9fefd1223018176727bb6a7558ec01b070d303c9b... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefd1223018176... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 0302091ebeeeb513b42604acf4df7eec749fe5fff74aca641b3373a7d5cc9695... handshake new: [117] 0302091ebeeeb513b42604acf4df7eec749fe5fff74aca641b3373a7d5cc9695... record old: [121] 010000750302091ebeeeb513b42604acf4df7eec749fe5fff74aca641b3373a7... record new: [121] 010000750302091ebeeeb513b42604acf4df7eec749fe5fff74aca641b3373a7... client: Filtered packet: [126] 1603010079010000750302091ebeeeb513b42604acf4df7eec749fe5fff74aca... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [187] 030371b8b9fe4141121b302df3c13583565e85786f0efd9c69971fc40274b2c2... handshake new: [187] 030371b8b9fe4141121b302df3c13583565e85786f0efd9c69971fc40274b2c2... record old: [191] 010000bb030371b8b9fe4141121b302df3c13583565e85786f0efd9c69971fc4... record new: [191] 010000bb030371b8b9fe4141121b302df3c13583565e85786f0efd9c69971fc4... client: Filtered packet: [196] 16030100bf010000bb030371b8b9fe4141121b302df3c13583565e85786f0efd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [114] fefff6272676b1ffa7a8a9d639a1451761af7d4ab2f91c16c8d3fc11ba9a67ac... handshake new: [114] fefff6272676b1ffa7a8a9d639a1451761af7d4ab2f91c16c8d3fc11ba9a67ac... record old: [126] 010000720000000000000072fefff6272676b1ffa7a8a9d639a1451761af7d4a... record new: [126] 010000720000000000000072fefff6272676b1ffa7a8a9d639a1451761af7d4a... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072fefff6272676b1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [184] fefdbf1c946e96bbed5cfe726248e86d6c631daac3bcaa75a597a741dbf633cd... handshake new: [184] fefdbf1c946e96bbed5cfe726248e86d6c631daac3bcaa75a597a741dbf633cd... record old: [196] 010000b800000000000000b8fefdbf1c946e96bbed5cfe726248e86d6c631daa... record new: [196] 010000b800000000000000b8fefdbf1c946e96bbed5cfe726248e86d6c631daa... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefdbf1c946e96... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 0302a25c87649b8063a9f5fdb0b8e1fc9ba824ec1c02c1293cbe392176125a8a... handshake new: [118] 0302a25c87649b8063a9f5fdb0b8e1fc9ba824ec1c02c1293cbe392176125a8a... record old: [121] 010000750302a25c87649b8063a9f5fdb0b8e1fc9ba824ec1c02c1293cbe3921... record new: [122] 010000760302a25c87649b8063a9f5fdb0b8e1fc9ba824ec1c02c1293cbe3921... client: Filtered packet: [127] 160301007a010000760302a25c87649b8063a9f5fdb0b8e1fc9ba824ec1c02c1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [187] 0303eb2c914befd34c4bf301f9f76505b077862083305847a7f0d266d15cdffb... handshake new: [188] 0303eb2c914befd34c4bf301f9f76505b077862083305847a7f0d266d15cdffb... record old: [191] 010000bb0303eb2c914befd34c4bf301f9f76505b077862083305847a7f0d266... record new: [192] 010000bc0303eb2c914befd34c4bf301f9f76505b077862083305847a7f0d266... client: Filtered packet: [197] 16030100c0010000bc0303eb2c914befd34c4bf301f9f76505b0778620833058... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [114] feffa2930e4a9dc0cab79f557de41db7c2a21fd3649540cb55efbb9bca867c64... handshake new: [115] feffa2930e4a9dc0cab79f557de41db7c2a21fd3649540cb55efbb9bca867c64... record old: [126] 010000720000000000000072feffa2930e4a9dc0cab79f557de41db7c2a21fd3... record new: [127] 010000730000000000000073feffa2930e4a9dc0cab79f557de41db7c2a21fd3... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feffa2930e4a9d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [184] fefd1257039d23bdb6320be88cdc4586802cf1e76c711450e643d28986f20b63... handshake new: [185] fefd1257039d23bdb6320be88cdc4586802cf1e76c711450e643d28986f20b63... record old: [196] 010000b800000000000000b8fefd1257039d23bdb6320be88cdc4586802cf1e7... record new: [197] 010000b900000000000000b9fefd1257039d23bdb6320be88cdc4586802cf1e7... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefd1257039d23... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 03020c1105075bace13e295ae2802d405b7885c265e2dfa274b29e7d70db7d93... handshake new: [116] 03020c1105075bace13e295ae2802d405b7885c265e2dfa274b29e7d70db7d93... record old: [121] 0100007503020c1105075bace13e295ae2802d405b7885c265e2dfa274b29e7d... record new: [120] 0100007403020c1105075bace13e295ae2802d405b7885c265e2dfa274b29e7d... client: Filtered packet: [125] 16030100780100007403020c1105075bace13e295ae2802d405b7885c265e2df... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [187] 0303a95b1862cc677655ce8e7168d25836c9306e3345b9d58b1b12feaa0f9657... handshake new: [186] 0303a95b1862cc677655ce8e7168d25836c9306e3345b9d58b1b12feaa0f9657... record old: [191] 010000bb0303a95b1862cc677655ce8e7168d25836c9306e3345b9d58b1b12fe... record new: [190] 010000ba0303a95b1862cc677655ce8e7168d25836c9306e3345b9d58b1b12fe... client: Filtered packet: [195] 16030100be010000ba0303a95b1862cc677655ce8e7168d25836c9306e3345b9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [114] feffd25cff1087bffc465f24a00a62b9738f19f8125a27e0c763f9b89a33b6b1... handshake new: [113] feffd25cff1087bffc465f24a00a62b9738f19f8125a27e0c763f9b89a33b6b1... record old: [126] 010000720000000000000072feffd25cff1087bffc465f24a00a62b9738f19f8... record new: [125] 010000710000000000000071feffd25cff1087bffc465f24a00a62b9738f19f8... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feffd25cff1087... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [184] fefdafbc7474bcb155b5844f31f770628d30f0ae5032c51b70de0ec5584cc167... handshake new: [183] fefdafbc7474bcb155b5844f31f770628d30f0ae5032c51b70de0ec5584cc167... record old: [196] 010000b800000000000000b8fefdafbc7474bcb155b5844f31f770628d30f0ae... record new: [195] 010000b700000000000000b7fefdafbc7474bcb155b5844f31f770628d30f0ae... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefdafbc7474bc... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 (2 ms) [----------] 52 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 (141 ms total) [----------] 6 tests from ExtensionDatagramOnly/TlsExtensionTestDtls [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [192] fefd78c453185283c4700636204997f9b4fbb592cfe3f5b33314c9a398cdec82... handshake new: [188] fefd78c453185283c4700636204997f9b4fbb592cfe3f5b33314c9a398cdec82... record old: [204] 010000c000000000000000c0fefd78c453185283c4700636204997f9b4fbb592... record new: [200] 010000bc00000000000000bcfefd78c453185283c4700636204997f9b4fbb592... client: Filtered packet: [213] 16feff000000000000000000c8010000bc00000000000000bcfefd78c4531852... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 (3 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [195] fefd86a6fdaad788c4179ccfb2a4ee856f240bcef892dca930954255fef1e69a... handshake new: [191] fefd86a6fdaad788c4179ccfb2a4ee856f240bcef892dca930954255fef1e69a... record old: [207] 010000c300000000000000c3fefd86a6fdaad788c4179ccfb2a4ee856f240bce... record new: [203] 010000bf00000000000000bffefd86a6fdaad788c4179ccfb2a4ee856f240bce... client: Filtered packet: [216] 16feff000000000000000000cb010000bf00000000000000bffefd86a6fdaad7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [125] feff165e0f2f1292f1ea27e58ffda4c4b7ade4f05a1e51cc541a7456b75cd824... handshake new: [121] feff165e0f2f1292f1ea27e58ffda4c4b7ade4f05a1e51cc541a7456b75cd824... record old: [137] 0100007d000000000000007dfeff165e0f2f1292f1ea27e58ffda4c4b7ade4f0... record new: [133] 010000790000000000000079feff165e0f2f1292f1ea27e58ffda4c4b7ade4f0... client: Filtered packet: [146] 16feff00000000000000000085010000790000000000000079feff165e0f2f12... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/2 (3 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [192] fefd3d3a66b11565f67b1b4297bb2f5f992581cea3fe90543bb151732c92f803... handshake new: [189] fefd3d3a66b11565f67b1b4297bb2f5f992581cea3fe90543bb151732c92f803... record old: [204] 010000c000000000000000c0fefd3d3a66b11565f67b1b4297bb2f5f992581ce... record new: [201] 010000bd00000000000000bdfefd3d3a66b11565f67b1b4297bb2f5f992581ce... client: Filtered packet: [214] 16feff000000000000000000c9010000bd00000000000000bdfefd3d3a66b115... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [195] fefd9302d74f8cb8d60a9c1843a53024f400523a941265dc241628ff5e891499... handshake new: [192] fefd9302d74f8cb8d60a9c1843a53024f400523a941265dc241628ff5e891499... record old: [207] 010000c300000000000000c3fefd9302d74f8cb8d60a9c1843a53024f400523a... record new: [204] 010000c000000000000000c0fefd9302d74f8cb8d60a9c1843a53024f400523a... client: Filtered packet: [217] 16feff000000000000000000cc010000c000000000000000c0fefd9302d74f8c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 (3 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [125] feff9b6f045a746491bedddee7f32137889c771cf8f8d65a61971782eea2858d... handshake new: [122] feff9b6f045a746491bedddee7f32137889c771cf8f8d65a61971782eea2858d... record old: [137] 0100007d000000000000007dfeff9b6f045a746491bedddee7f32137889c771c... record new: [134] 0100007a000000000000007afeff9b6f045a746491bedddee7f32137889c771c... client: Filtered packet: [147] 16feff000000000000000000860100007a000000000000007afeff9b6f045a74... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/2 (2 ms) [----------] 6 tests from ExtensionDatagramOnly/TlsExtensionTestDtls (15 ms total) [----------] 20 tests from ExtensionTls12Plus/TlsExtensionTest12Plus [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [1] 00 handshake old: [180] 03039d006856789e32f81a1f90fdb5a2e5e872a569eef755ed17b2ba450d6bfd... handshake new: [157] 03039d006856789e32f81a1f90fdb5a2e5e872a569eef755ed17b2ba450d6bfd... record old: [184] 010000b403039d006856789e32f81a1f90fdb5a2e5e872a569eef755ed17b2ba... record new: [161] 0100009d03039d006856789e32f81a1f90fdb5a2e5e872a569eef755ed17b2ba... client: Filtered packet: [166] 16030100a10100009d03039d006856789e32f81a1f90fdb5a2e5e872a569eef7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [1] 00 handshake old: [187] 0303d5410bbda8308248869d7d9a3fa590d0da6428ec6eafbf659ab9d0cdb75b... handshake new: [156] 0303d5410bbda8308248869d7d9a3fa590d0da6428ec6eafbf659ab9d0cdb75b... record old: [191] 010000bb0303d5410bbda8308248869d7d9a3fa590d0da6428ec6eafbf659ab9... record new: [160] 0100009c0303d5410bbda8308248869d7d9a3fa590d0da6428ec6eafbf659ab9... client: Filtered packet: [165] 16030100a00100009c0303d5410bbda8308248869d7d9a3fa590d0da6428ec6e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [1] 00 handshake old: [181] fefdd8a76624222589a8f439411e2d3ff5503a24afa1ac6b698848b8affeed55... handshake new: [158] fefdd8a76624222589a8f439411e2d3ff5503a24afa1ac6b698848b8affeed55... record old: [193] 010000b500000000000000b5fefdd8a76624222589a8f439411e2d3ff5503a24... record new: [170] 0100009e000000000000009efefdd8a76624222589a8f439411e2d3ff5503a24... client: Filtered packet: [183] 16feff000000000000000000aa0100009e000000000000009efefdd8a7662422... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [1] 00 handshake old: [184] fefdeede1f3336067dcefb98736ee4b1775dec31611e2e04f1f1a9cda23eb969... handshake new: [153] fefdeede1f3336067dcefb98736ee4b1775dec31611e2e04f1f1a9cda23eb969... record old: [196] 010000b800000000000000b8fefdeede1f3336067dcefb98736ee4b1775dec31... record new: [165] 010000990000000000000099fefdeede1f3336067dcefb98736ee4b1775dec31... client: Filtered packet: [178] 16feff000000000000000000a5010000990000000000000099fefdeede1f3336... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/3 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [5] 0002040100 handshake old: [180] 0303f9430221cf3561cebfdf9d20eb6fdbf2bb162957164c1e0e3f1f4ec0b70a... handshake new: [161] 0303f9430221cf3561cebfdf9d20eb6fdbf2bb162957164c1e0e3f1f4ec0b70a... record old: [184] 010000b40303f9430221cf3561cebfdf9d20eb6fdbf2bb162957164c1e0e3f1f... record new: [165] 010000a10303f9430221cf3561cebfdf9d20eb6fdbf2bb162957164c1e0e3f1f... client: Filtered packet: [170] 16030100a5010000a10303f9430221cf3561cebfdf9d20eb6fdbf2bb16295716... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [5] 0002040100 handshake old: [187] 030333655caa3559a309eafdb666ae5a5dcc930a0b0dff555856b359ee53d9af... handshake new: [160] 030333655caa3559a309eafdb666ae5a5dcc930a0b0dff555856b359ee53d9af... record old: [191] 010000bb030333655caa3559a309eafdb666ae5a5dcc930a0b0dff555856b359... record new: [164] 010000a0030333655caa3559a309eafdb666ae5a5dcc930a0b0dff555856b359... client: Filtered packet: [169] 16030100a4010000a0030333655caa3559a309eafdb666ae5a5dcc930a0b0dff... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [5] 0002040100 handshake old: [181] fefdcde4398c9744bf8562bab5a2ae8e057a20da49c1c3a8331e56899a52ec29... handshake new: [162] fefdcde4398c9744bf8562bab5a2ae8e057a20da49c1c3a8331e56899a52ec29... record old: [193] 010000b500000000000000b5fefdcde4398c9744bf8562bab5a2ae8e057a20da... record new: [174] 010000a200000000000000a2fefdcde4398c9744bf8562bab5a2ae8e057a20da... client: Filtered packet: [187] 16feff000000000000000000ae010000a200000000000000a2fefdcde4398c97... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [5] 0002040100 handshake old: [184] fefd9dcf32cb1091bc6e54b10d5c794e000a63a7714938bba69ac6478e2796a9... handshake new: [157] fefd9dcf32cb1091bc6e54b10d5c794e000a63a7714938bba69ac6478e2796a9... record old: [196] 010000b800000000000000b8fefd9dcf32cb1091bc6e54b10d5c794e000a63a7... record new: [169] 0100009d000000000000009dfefd9dcf32cb1091bc6e54b10d5c794e000a63a7... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefd9dcf32cb10... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/3 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [2] 0000 handshake old: [180] 0303c645c57fab2ae489fb27acfd2b748c7680c3df82c313dfa79aab3506c9e6... handshake new: [158] 0303c645c57fab2ae489fb27acfd2b748c7680c3df82c313dfa79aab3506c9e6... record old: [184] 010000b40303c645c57fab2ae489fb27acfd2b748c7680c3df82c313dfa79aab... record new: [162] 0100009e0303c645c57fab2ae489fb27acfd2b748c7680c3df82c313dfa79aab... client: Filtered packet: [167] 16030100a20100009e0303c645c57fab2ae489fb27acfd2b748c7680c3df82c3... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [2] 0000 handshake old: [187] 0303f78ada1a17f3964b7f56d3b2c1f7b03310ef7107ee2b3597eff0b50f3710... handshake new: [157] 0303f78ada1a17f3964b7f56d3b2c1f7b03310ef7107ee2b3597eff0b50f3710... record old: [191] 010000bb0303f78ada1a17f3964b7f56d3b2c1f7b03310ef7107ee2b3597eff0... record new: [161] 0100009d0303f78ada1a17f3964b7f56d3b2c1f7b03310ef7107ee2b3597eff0... client: Filtered packet: [166] 16030100a10100009d0303f78ada1a17f3964b7f56d3b2c1f7b03310ef7107ee... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [2] 0000 handshake old: [181] fefd771c2c6c0443d433e31847fd91a842093d92bad3e7d83a4fec86c2791aa4... handshake new: [159] fefd771c2c6c0443d433e31847fd91a842093d92bad3e7d83a4fec86c2791aa4... record old: [193] 010000b500000000000000b5fefd771c2c6c0443d433e31847fd91a842093d92... record new: [171] 0100009f000000000000009ffefd771c2c6c0443d433e31847fd91a842093d92... client: Filtered packet: [184] 16feff000000000000000000ab0100009f000000000000009ffefd771c2c6c04... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [2] 0000 handshake old: [184] fefd82d8f8ee6d9d8d5c399a094b1f47e8f8c8c7291908f44d9faa7e41c130bd... handshake new: [154] fefd82d8f8ee6d9d8d5c399a094b1f47e8f8c8c7291908f44d9faa7e41c130bd... record old: [196] 010000b800000000000000b8fefd82d8f8ee6d9d8d5c399a094b1f47e8f8c8c7... record new: [166] 0100009a000000000000009afefd82d8f8ee6d9d8d5c399a094b1f47e8f8c8c7... client: Filtered packet: [179] 16feff000000000000000000a60100009a000000000000009afefd82d8f8ee6d... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/3 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 0002ffff handshake old: [180] 0303b27bc8f06f3983f3cd0cab2244478c21753299b838f0842aedc7732b512d... handshake new: [160] 0303b27bc8f06f3983f3cd0cab2244478c21753299b838f0842aedc7732b512d... record old: [184] 010000b40303b27bc8f06f3983f3cd0cab2244478c21753299b838f0842aedc7... record new: [164] 010000a00303b27bc8f06f3983f3cd0cab2244478c21753299b838f0842aedc7... client: Filtered packet: [169] 16030100a4010000a00303b27bc8f06f3983f3cd0cab2244478c21753299b838... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [4] 0002ffff handshake old: [187] 03030f2769537e38864b9b11f7a6569acc60e2cfd22dbb9f5e83706f157fdfba... handshake new: [159] 03030f2769537e38864b9b11f7a6569acc60e2cfd22dbb9f5e83706f157fdfba... record old: [191] 010000bb03030f2769537e38864b9b11f7a6569acc60e2cfd22dbb9f5e83706f... record new: [163] 0100009f03030f2769537e38864b9b11f7a6569acc60e2cfd22dbb9f5e83706f... client: Filtered packet: [168] 16030100a30100009f03030f2769537e38864b9b11f7a6569acc60e2cfd22dbb... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 0002ffff handshake old: [181] fefdbbd0848caa59221e4350b327031d6e72fe7c2bfc69d43601edb95cf10885... handshake new: [161] fefdbbd0848caa59221e4350b327031d6e72fe7c2bfc69d43601edb95cf10885... record old: [193] 010000b500000000000000b5fefdbbd0848caa59221e4350b327031d6e72fe7c... record new: [173] 010000a100000000000000a1fefdbbd0848caa59221e4350b327031d6e72fe7c... client: Filtered packet: [186] 16feff000000000000000000ad010000a100000000000000a1fefdbbd0848caa... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [4] 0002ffff handshake old: [184] fefd741eb22387240935d104304c21c8922048d495831522e352bb655a56539f... handshake new: [156] fefd741eb22387240935d104304c21c8922048d495831522e352bb655a56539f... record old: [196] 010000b800000000000000b8fefd741eb22387240935d104304c21c8922048d4... record new: [168] 0100009c000000000000009cfefd741eb22387240935d104304c21c8922048d4... client: Filtered packet: [181] 16feff000000000000000000a80100009c000000000000009cfefd741eb22387... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/3 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [3] 000104 handshake old: [180] 030349668a7b4be674201061c1292c86ca02c0d56e9655f02de958d9c9ff4d88... handshake new: [159] 030349668a7b4be674201061c1292c86ca02c0d56e9655f02de958d9c9ff4d88... record old: [184] 010000b4030349668a7b4be674201061c1292c86ca02c0d56e9655f02de958d9... record new: [163] 0100009f030349668a7b4be674201061c1292c86ca02c0d56e9655f02de958d9... client: Filtered packet: [168] 16030100a30100009f030349668a7b4be674201061c1292c86ca02c0d56e9655... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [3] 000104 handshake old: [187] 03030442dfd7ae3d36bd945924b53c28d932944fdbcb92def79a98576236fc84... handshake new: [158] 03030442dfd7ae3d36bd945924b53c28d932944fdbcb92def79a98576236fc84... record old: [191] 010000bb03030442dfd7ae3d36bd945924b53c28d932944fdbcb92def79a9857... record new: [162] 0100009e03030442dfd7ae3d36bd945924b53c28d932944fdbcb92def79a9857... client: Filtered packet: [167] 16030100a20100009e03030442dfd7ae3d36bd945924b53c28d932944fdbcb92... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [3] 000104 handshake old: [181] fefd7501812b0c1887cd8659cf384606b01c3b6e7f01026d7fccfaed9896a996... handshake new: [160] fefd7501812b0c1887cd8659cf384606b01c3b6e7f01026d7fccfaed9896a996... record old: [193] 010000b500000000000000b5fefd7501812b0c1887cd8659cf384606b01c3b6e... record new: [172] 010000a000000000000000a0fefd7501812b0c1887cd8659cf384606b01c3b6e... client: Filtered packet: [185] 16feff000000000000000000ac010000a000000000000000a0fefd7501812b0c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [3] 000104 handshake old: [184] fefd03b99c8ff901d2fe10b40b4fc73331a78add3c6617e4f2815d1f64743233... handshake new: [155] fefd03b99c8ff901d2fe10b40b4fc73331a78add3c6617e4f2815d1f64743233... record old: [196] 010000b800000000000000b8fefd03b99c8ff901d2fe10b40b4fc73331a78add... record new: [167] 0100009b000000000000009bfefd03b99c8ff901d2fe10b40b4fc73331a78add... client: Filtered packet: [180] 16feff000000000000000000a70100009b000000000000009bfefd03b99c8ff9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/3 (2 ms) [----------] 20 tests from ExtensionTls12Plus/TlsExtensionTest12Plus (51 ms total) [----------] 6 tests from ExtensionTls12/TlsExtensionTest12 [ RUN ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/0 (10 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/1 (10 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/0 (3 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/1 (3 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/0 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/0 (11 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/1 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/1 (10 ms) [----------] 6 tests from ExtensionTls12/TlsExtensionTest12 (47 ms total) [----------] 20 tests from ExtensionTls13/TlsExtensionTest13 [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [38] 0024001d002097ab03b64ef9abdb519ba273e7bad6f50a0d362a6dfa81a5fd73... extension new: [2] 0024 handshake old: [180] 0303a188a588af768e92c725282d3446d3cf08d147997ed3a0b3be2d2b04023c... handshake new: [144] 0303a188a588af768e92c725282d3446d3cf08d147997ed3a0b3be2d2b04023c... record old: [184] 010000b40303a188a588af768e92c725282d3446d3cf08d147997ed3a0b3be2d... record new: [148] 010000900303a188a588af768e92c725282d3446d3cf08d147997ed3a0b3be2d... client: Filtered packet: [153] 1603010094010000900303a188a588af768e92c725282d3446d3cf08d147997e... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/0 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [38] 0024001d0020ca8888d72b903ae75c046a2f0e159f70a4125f50e75911276fc7... extension new: [2] 0024 handshake old: [181] fefd52761297f8a61f22aa58812a6f5c192b31e0bd8fba241fdbb787c325d171... handshake new: [145] fefd52761297f8a61f22aa58812a6f5c192b31e0bd8fba241fdbb787c325d171... record old: [193] 010000b500000000000000b5fefd52761297f8a61f22aa58812a6f5c192b31e0... record new: [157] 010000910000000000000091fefd52761297f8a61f22aa58812a6f5c192b31e0... client: Filtered packet: [170] 16feff0000000000000000009d010000910000000000000091fefd52761297f8... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/1 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/0 (4 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/1 (4 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 020303 handshake old: [180] 03037695b11ebd72d4d1bf2245d1f4fc2b525d22d84382a1a02450c062d48428... handshake new: [180] 03037695b11ebd72d4d1bf2245d1f4fc2b525d22d84382a1a02450c062d48428... record old: [184] 010000b403037695b11ebd72d4d1bf2245d1f4fc2b525d22d84382a1a02450c0... record new: [184] 010000b403037695b11ebd72d4d1bf2245d1f4fc2b525d22d84382a1a02450c0... client: Filtered packet: [189] 16030100b8010000b403037695b11ebd72d4d1bf2245d1f4fc2b525d22d84382... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [3] 02fefd handshake old: [181] fefd179efb4ec3fc1173e183715e8c8c14b8c8eb08937e42a61579afa758c185... handshake new: [181] fefd179efb4ec3fc1173e183715e8c8c14b8c8eb08937e42a61579afa758c185... record old: [193] 010000b500000000000000b5fefd179efb4ec3fc1173e183715e8c8c14b8c8eb... record new: [193] 010000b500000000000000b5fefd179efb4ec3fc1173e183715e8c8c14b8c8eb... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefd179efb4ec3... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/1 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 020303 handshake old: [180] 030306d8d0b7681d61902d10f1d9a471d7e2c64b30130dcaee07eb80e8b74780... handshake new: [180] 030306d8d0b7681d61902d10f1d9a471d7e2c64b30130dcaee07eb80e8b74780... record old: [184] 010000b4030306d8d0b7681d61902d10f1d9a471d7e2c64b30130dcaee07eb80... record new: [184] 010000b4030306d8d0b7681d61902d10f1d9a471d7e2c64b30130dcaee07eb80... client: Filtered packet: [189] 16030100b8010000b4030306d8d0b7681d61902d10f1d9a471d7e2c64b30130d... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [3] 02fefd handshake old: [181] fefde2e580b4014d4c9b0ec7640e85c3b406506580fbdefae6f1cb7e73621540... handshake new: [181] fefde2e580b4014d4c9b0ec7640e85c3b406506580fbdefae6f1cb7e73621540... record old: [193] 010000b500000000000000b5fefde2e580b4014d4c9b0ec7640e85c3b4065065... record new: [193] 010000b500000000000000b5fefde2e580b4014d4c9b0ec7640e85c3b4065065... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefde2e580b401... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020303 handshake old: [508] 03035000f84ab17da04e654afe294fdf15da5c3164f27d969096d50a5f525e41... handshake new: [506] 03035000f84ab17da04e654afe294fdf15da5c3164f27d969096d50a5f525e41... record old: [512] 010001fc03035000f84ab17da04e654afe294fdf15da5c3164f27d969096d50a... record new: [510] 010001fa03035000f84ab17da04e654afe294fdf15da5c3164f27d969096d50a... client: Filtered packet: [515] 16030101fe010001fa03035000f84ab17da04e654afe294fdf15da5c3164f27d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 047f26fefd extension new: [3] 02fefd handshake old: [257] fefd8797f0c234f7802ea59fadc57470c2ebf55dccf64a2371368bef22022293... handshake new: [255] fefd8797f0c234f7802ea59fadc57470c2ebf55dccf64a2371368bef22022293... record old: [269] 010001010000000000000101fefd8797f0c234f7802ea59fadc57470c2ebf55d... record new: [267] 010000ff00000000000000fffefd8797f0c234f7802ea59fadc57470c2ebf55d... client: Filtered packet: [280] 16feff0000000000000000010b010000ff00000000000000fffefd8797f0c234... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/1 (4 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [508] 03036b3611789f96448e454ca261d58b7385bac9479d86047a9d412a5c96b137... handshake new: [480] 03036b3611789f96448e454ca261d58b7385bac9479d86047a9d412a5c96b137... record old: [512] 010001fc03036b3611789f96448e454ca261d58b7385bac9479d86047a9d412a... record new: [484] 010001e003036b3611789f96448e454ca261d58b7385bac9479d86047a9d412a... client: Filtered packet: [489] 16030301e4010001e003036b3611789f96448e454ca261d58b7385bac9479d86... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/0 (7 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefdfb108cd8b415d7b1096a20b6749d157dea58509c6c2f492ed67de8150c54... handshake new: [259] fefdfb108cd8b415d7b1096a20b6749d157dea58509c6c2f492ed67de8150c54... record old: [299] 0100011f000100000000011ffefdfb108cd8b415d7b1096a20b6749d157dea58... record new: [271] 010001030001000000000103fefdfb108cd8b415d7b1096a20b6749d157dea58... client: Filtered packet: [284] 16fefd0000000000000000010f010001030001000000000103fefdfb108cd8b4... extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefdfb108cd8b415d7b1096a20b6749d157dea58509c6c2f492ed67de8150c54... handshake new: [259] fefdfb108cd8b415d7b1096a20b6749d157dea58509c6c2f492ed67de8150c54... record old: [299] 0100011f000100000000011ffefdfb108cd8b415d7b1096a20b6749d157dea58... record new: [271] 010001030001000000000103fefdfb108cd8b415d7b1096a20b6749d157dea58... client: Filtered packet: [284] 16fefd0000000000000002010f010001030001000000000103fefdfb108cd8b4... extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefdfb108cd8b415d7b1096a20b6749d157dea58509c6c2f492ed67de8150c54... handshake new: [259] fefdfb108cd8b415d7b1096a20b6749d157dea58509c6c2f492ed67de8150c54... record old: [299] 0100011f000100000000011ffefdfb108cd8b415d7b1096a20b6749d157dea58... record new: [271] 010001030001000000000103fefdfb108cd8b415d7b1096a20b6749d157dea58... client: Filtered packet: [284] 16fefd0000000000000003010f010001030001000000000103fefdfb108cd8b4... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/1 (160 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [38] 0024001d0020aeef104626cb04a7a9a4fff12ed2ad506cd049e7fbcef1e8f42f... handshake old: [508] 03035d0e69cfb36e84ca9c05a262459b3574bf5cde7e2f3b7962d00499a33701... handshake new: [466] 03035d0e69cfb36e84ca9c05a262459b3574bf5cde7e2f3b7962d00499a33701... record old: [512] 010001fc03035d0e69cfb36e84ca9c05a262459b3574bf5cde7e2f3b7962d004... record new: [470] 010001d203035d0e69cfb36e84ca9c05a262459b3574bf5cde7e2f3b7962d004... client: Filtered packet: [475] 16030301d6010001d203035d0e69cfb36e84ca9c05a262459b3574bf5cde7e2f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/0 (7 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [38] 0024001d0020dddb386d1119d4bfef059492fef556dc5084416bdf5557bc021e... handshake old: [287] fefdff95a3edb59d39f169aeb5771c54861cef02a66dd2a60fa81a4e0902948f... handshake new: [245] fefdff95a3edb59d39f169aeb5771c54861cef02a66dd2a60fa81a4e0902948f... record old: [299] 0100011f000100000000011ffefdff95a3edb59d39f169aeb5771c54861cef02... record new: [257] 010000f500010000000000f5fefdff95a3edb59d39f169aeb5771c54861cef02... client: Filtered packet: [270] 16fefd00000000000000000101010000f500010000000000f5fefdff95a3edb5... extension drop: [38] 0024001d0020dddb386d1119d4bfef059492fef556dc5084416bdf5557bc021e... handshake old: [287] fefdff95a3edb59d39f169aeb5771c54861cef02a66dd2a60fa81a4e0902948f... handshake new: [245] fefdff95a3edb59d39f169aeb5771c54861cef02a66dd2a60fa81a4e0902948f... record old: [299] 0100011f000100000000011ffefdff95a3edb59d39f169aeb5771c54861cef02... record new: [257] 010000f500010000000000f5fefdff95a3edb59d39f169aeb5771c54861cef02... client: Filtered packet: [270] 16fefd00000000000000020101010000f500010000000000f5fefdff95a3edb5... extension drop: [38] 0024001d0020dddb386d1119d4bfef059492fef556dc5084416bdf5557bc021e... handshake old: [287] fefdff95a3edb59d39f169aeb5771c54861cef02a66dd2a60fa81a4e0902948f... handshake new: [245] fefdff95a3edb59d39f169aeb5771c54861cef02a66dd2a60fa81a4e0902948f... record old: [299] 0100011f000100000000011ffefdff95a3edb59d39f169aeb5771c54861cef02... record new: [257] 010000f500010000000000f5fefdff95a3edb59d39f169aeb5771c54861cef02... client: Filtered packet: [270] 16fefd00000000000000030101010000f500010000000000f5fefdff95a3edb5... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/1 (160 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [6] 00040018001d handshake old: [508] 0303eb4d90a764c0006bf63573d7a31dbd701cf18b0cb4a6edbdd6a91eecf65e... handshake new: [498] 0303eb4d90a764c0006bf63573d7a31dbd701cf18b0cb4a6edbdd6a91eecf65e... record old: [512] 010001fc0303eb4d90a764c0006bf63573d7a31dbd701cf18b0cb4a6edbdd6a9... record new: [502] 010001f20303eb4d90a764c0006bf63573d7a31dbd701cf18b0cb4a6edbdd6a9... client: Filtered packet: [507] 16030301f6010001f20303eb4d90a764c0006bf63573d7a31dbd701cf18b0cb4... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/0 (7 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [6] 00040018001d handshake old: [287] fefd21f66b1200a901afb89eaa41e0ab0fb6836f38cdffabfef64a3293ba0d1c... handshake new: [277] fefd21f66b1200a901afb89eaa41e0ab0fb6836f38cdffabfef64a3293ba0d1c... record old: [299] 0100011f000100000000011ffefd21f66b1200a901afb89eaa41e0ab0fb6836f... record new: [289] 010001150001000000000115fefd21f66b1200a901afb89eaa41e0ab0fb6836f... client: Filtered packet: [302] 16fefd00000000000000000121010001150001000000000115fefd21f66b1200... extension drop: [6] 00040018001d handshake old: [287] fefd21f66b1200a901afb89eaa41e0ab0fb6836f38cdffabfef64a3293ba0d1c... handshake new: [277] fefd21f66b1200a901afb89eaa41e0ab0fb6836f38cdffabfef64a3293ba0d1c... record old: [299] 0100011f000100000000011ffefd21f66b1200a901afb89eaa41e0ab0fb6836f... record new: [289] 010001150001000000000115fefd21f66b1200a901afb89eaa41e0ab0fb6836f... client: Filtered packet: [302] 16fefd00000000000000020121010001150001000000000115fefd21f66b1200... extension drop: [6] 00040018001d handshake old: [287] fefd21f66b1200a901afb89eaa41e0ab0fb6836f38cdffabfef64a3293ba0d1c... handshake new: [277] fefd21f66b1200a901afb89eaa41e0ab0fb6836f38cdffabfef64a3293ba0d1c... record old: [299] 0100011f000100000000011ffefd21f66b1200a901afb89eaa41e0ab0fb6836f... record new: [289] 010001150001000000000115fefd21f66b1200a901afb89eaa41e0ab0fb6836f... client: Filtered packet: [302] 16fefd00000000000000030121010001150001000000000115fefd21f66b1200... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/1 (159 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [2] 0000 handshake old: [180] 030350253ab73c4662a376bbd4c993bc7ab3877c2c308fd13801ae284376058b... handshake new: [179] 030350253ab73c4662a376bbd4c993bc7ab3877c2c308fd13801ae284376058b... record old: [184] 010000b4030350253ab73c4662a376bbd4c993bc7ab3877c2c308fd13801ae28... record new: [183] 010000b3030350253ab73c4662a376bbd4c993bc7ab3877c2c308fd13801ae28... client: Filtered packet: [188] 16030100b7010000b3030350253ab73c4662a376bbd4c993bc7ab3877c2c308f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [2] 0000 handshake old: [181] fefdf4f84daed0a881848b21528ed9f4bde56d7982c1e48335870f35cd8f836f... handshake new: [180] fefdf4f84daed0a881848b21528ed9f4bde56d7982c1e48335870f35cd8f836f... record old: [193] 010000b500000000000000b5fefdf4f84daed0a881848b21528ed9f4bde56d79... record new: [192] 010000b400000000000000b4fefdf4f84daed0a881848b21528ed9f4bde56d79... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefdf4f84daed0... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/1 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.OddVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 000100 handshake old: [180] 03037fc4e16bc1a19adb5ee0254247de03a0167c2d39385d1f8ce2365d3e50bc... handshake new: [180] 03037fc4e16bc1a19adb5ee0254247de03a0167c2d39385d1f8ce2365d3e50bc... record old: [184] 010000b403037fc4e16bc1a19adb5ee0254247de03a0167c2d39385d1f8ce236... record new: [184] 010000b403037fc4e16bc1a19adb5ee0254247de03a0167c2d39385d1f8ce236... client: Filtered packet: [189] 16030100b8010000b403037fc4e16bc1a19adb5ee0254247de03a0167c2d3938... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.OddVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.OddVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [3] 000100 handshake old: [181] fefd6357296e33b557369f2bda36dd5a4bf79a379ae501db9f725ca48e769672... handshake new: [181] fefd6357296e33b557369f2bda36dd5a4bf79a379ae501db9f725ca48e769672... record old: [193] 010000b500000000000000b5fefd6357296e33b557369f2bda36dd5a4bf79a37... record new: [193] 010000b500000000000000b5fefd6357296e33b557369f2bda36dd5a4bf79a37... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefd6357296e33... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.OddVersionList/1 (2 ms) [----------] 20 tests from ExtensionTls13/TlsExtensionTest13 (541 ms total) [----------] 3 tests from BogusExtensionStream/TlsBogusExtensionTestPre13 [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0301c53b738cc6e03893077c1ae72db842c73795ec6057ac7d3a125ca5e06f33... handshake new: [97] 0301c53b738cc6e03893077c1ae72db842c73795ec6057ac7d3a125ca5e06f33... record old: [713] 0200005d0301c53b738cc6e03893077c1ae72db842c73795ec6057ac7d3a125c... record new: [717] 020000610301c53b738cc6e03893077c1ae72db842c73795ec6057ac7d3a125c... server: Filtered packet: [722] 16030102cd020000610301c53b738cc6e03893077c1ae72db842c73795ec6057... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 (3 ms) [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03029532a46970a4ea678cee72b22d499602c27e0bd378431236b0022e8321dc... handshake new: [97] 03029532a46970a4ea678cee72b22d499602c27e0bd378431236b0022e8321dc... record old: [713] 0200005d03029532a46970a4ea678cee72b22d499602c27e0bd378431236b002... record new: [717] 0200006103029532a46970a4ea678cee72b22d499602c27e0bd378431236b002... server: Filtered packet: [722] 16030202cd0200006103029532a46970a4ea678cee72b22d499602c27e0bd378... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 (3 ms) [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0303f784ccfdfcc40c0a4e7327da129e258254caafd497ebf83646bcfc7f7060... handshake new: [97] 0303f784ccfdfcc40c0a4e7327da129e258254caafd497ebf83646bcfc7f7060... record old: [715] 0200005d0303f784ccfdfcc40c0a4e7327da129e258254caafd497ebf83646bc... record new: [719] 020000610303f784ccfdfcc40c0a4e7327da129e258254caafd497ebf83646bc... server: Filtered packet: [724] 16030302cf020000610303f784ccfdfcc40c0a4e7327da129e258254caafd497... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/2 (3 ms) [----------] 3 tests from BogusExtensionStream/TlsBogusExtensionTestPre13 (9 ms total) [----------] 2 tests from BogusExtensionDatagram/TlsBogusExtensionTestPre13 [ RUN ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] feff1ed288d8f542bebd17d50a993b49eef1c7ada981040777762e0d90b28195... handshake new: [97] feff1ed288d8f542bebd17d50a993b49eef1c7ada981040777762e0d90b28195... record old: [105] 0200005d000000000000005dfeff1ed288d8f542bebd17d50a993b49eef1c7ad... record new: [109] 020000610000000000000061feff1ed288d8f542bebd17d50a993b49eef1c7ad... server: Filtered packet: [801] 16feff0000000000000000006d020000610000000000000061feff1ed288d8f5... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 (3 ms) [ RUN ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] fefd624e24c6b93885333be5f37ad8db94e23ee036a4c06164158be9e447e7e2... handshake new: [97] fefd624e24c6b93885333be5f37ad8db94e23ee036a4c06164158be9e447e7e2... record old: [105] 0200005d000000000000005dfefd624e24c6b93885333be5f37ad8db94e23ee0... record new: [109] 020000610000000000000061fefd624e24c6b93885333be5f37ad8db94e23ee0... server: Filtered packet: [803] 16fefd0000000000000000006d020000610000000000000061fefd624e24c6b9... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 (3 ms) [----------] 2 tests from BogusExtensionDatagram/TlsBogusExtensionTestPre13 (6 ms total) [----------] 18 tests from BogusExtension13/TlsBogusExtensionTest13 [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 03036006a7c4aab7d61b53f3c64d4ba49562a25b8d046abb97c853e5c889da30... handshake new: [90] 03036006a7c4aab7d61b53f3c64d4ba49562a25b8d046abb97c853e5c889da30... record old: [90] 0200005603036006a7c4aab7d61b53f3c64d4ba49562a25b8d046abb97c853e5... record new: [94] 0200005a03036006a7c4aab7d61b53f3c64d4ba49562a25b8d046abb97c853e5... server: Filtered packet: [778] 160303005e0200005a03036006a7c4aab7d61b53f3c64d4ba49562a25b8d046a... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] fefd04414680e7ba589da889f93feacfa476e215c93fe6f731ea85d6561e1bad... handshake new: [90] fefd04414680e7ba589da889f93feacfa476e215c93fe6f731ea85d6561e1bad... record old: [98] 020000560000000000000056fefd04414680e7ba589da889f93feacfa476e215... record new: [102] 0200005a000000000000005afefd04414680e7ba589da889f93feacfa476e215... server: Filtered packet: [892] 16fefd000000000000000000660200005a000000000000005afefd04414680e7... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000280026000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a0200005603036f86f8640e530c79fbd7d470377c954cd7ad4b3490... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [52] 0800002800010000000000280026000a00140012001d00170018001901000101... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefd2cbb3dce25... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a0200005603033a49b18b50981300946bef5db4d10441b866b4ab47... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [457] 0b0001bd00020000000001bd000001b90001b0308201ac30820115a003020102... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefddbec2e4814... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [692] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [696] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [813] 160303005a020000560303bb4230faaa166d9fe374f0e4d50f202fb93f2e77e1... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [43] 0d00001f000200000000001f00001c000d001800160403050306030203080408... record new: [47] 0d0000230002000000000023000020000d001800160403050306030203080408... server: Filtered packet: [957] 16fefd00000000000000000062020000560000000000000056fefdea716fcfd4... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [172] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... handshake new: [176] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [176] 020000ac0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... record new: [180] 020000b00303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [185] 16030300b4020000b00303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/0 (7 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [172] fefdcf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... handshake new: [176] fefdcf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [184] 020000ac00000000000000acfefdcf21ad74e59a6111be1d8c021e65b891c2a2... record new: [188] 020000b000000000000000b0fefdcf21ad74e59a6111be1d8c021e65b891c2a2... server: Filtered packet: [201] 16fefd000000000000000000bc020000b000000000000000b0fefdcf21ad74e5... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/1 (7 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000280026000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a0200005603033e82fbde24432a515444f98071df7c8ed15430a7db... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [52] 0800002800010000000000280026000a00140012001d00170018001901000101... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefdfd46d6695f... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a020000560303adbed117f9786319e30511ce7fe2ae8abe00411d60... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [457] 0b0001bd00020000000001bd000001b90001b0308201ac30820115a003020102... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefdda0d182993... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [692] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [696] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [813] 160303005a0200005603036adf98d9f47d5c2d6607b63ba44401fb9b5e1a03cf... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/0 (3 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [43] 0d00001f000200000000001f00001c000d001800160403050306030203080408... record new: [47] 0d0000230002000000000023000020000d001800160403050306030203080408... server: Filtered packet: [957] 16fefd00000000000000000062020000560000000000000056fefd6ef7e48410... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED handshake old: [193] 0002a300200d04d602000000b2f20d429d7a8ea23dcb8b8d9f00000000ca898a... handshake new: [197] 0002a300200d04d602000000b2f20d429d7a8ea23dcb8b8d9f00000000ca898a... record old: [197] 040000c10002a300200d04d602000000b2f20d429d7a8ea23dcb8b8d9f000000... record new: [201] 040000c50002a300200d04d602000000b2f20d429d7a8ea23dcb8b8d9f000000... server: Filtered packet: [223] 17030300da3cd25f3bccec3596a4ac93f5a19f615228e5d1e72584c7b5e68013... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/0 (9 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED handshake old: [193] 0002a3009033120f02000000b2ac6bc43618b350ea4fdf615f0000000040f758... handshake new: [197] 0002a3009033120f02000000b2ac6bc43618b350ea4fdf615f0000000040f758... record old: [205] 040000c100050000000000c10002a3009033120f02000000b2ac6bc43618b350... record new: [209] 040000c500050000000000c50002a3009033120f02000000b2ac6bc43618b350... server: Filtered packet: [231] 2f7c5f00e2aa2403ec91fd07f5dc5758cb249b25d1198d53b24e742d3db14cfb... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/1 (9 ms) [----------] 18 tests from BogusExtension13/TlsBogusExtensionTest13 (87 ms total) [----------] 52 tests from StreamOnly/TlsConnectStream [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/1 Version: TLS 1.2 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/1 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/2 Version: TLS 1.1 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/2 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/3 Version: TLS 1.0 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/3 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ShortRead/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [27] 90f1be7a507dcd7c86f2c6f7205092b55145cf4649e06363f2e37d record new: [27] 90f1be7a507dcd7c86f2c6f7205092b55145cf4649e06363f2e37e client: Filtered packet: [32] 170303001b90f1be7a507dcd7c86f2c6f7205092b55145cf4649e06363f2e37e server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [34] 0000000000000001c8e527e3f3d6464e5255b53880ead1570c5156899c4c693e... record new: [34] 0000000000000001c8e527e3f3d6464e5255b53880ead1570c5156899c4c693e... client: Filtered packet: [39] 17030300220000000000000001c8e527e3f3d6464e5255b53880ead1570c5156... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [48] c4aec2bbbbb4fbbe30873c88590a1b0cef3dae991b401150c13a7b516b73dd39... record new: [48] c4aec2bbbbb4fbbe30873c88590a1b0cef3dae991b401150c13a7b516b73dd39... client: Filtered packet: [53] 1703020030c4aec2bbbbb4fbbe30873c88590a1b0cef3dae991b401150c13a7b... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [32] 14558c6ccedbf8a67130e6d5b39843e20eef2fd01b60373756ed8c40b075ec9b record new: [32] 14558c6ccedbf8a67130e6d5b39843e20eef2fd01b60373756ed8c40b075ec9c client: Filtered packet: [37] 170301002014558c6ccedbf8a67130e6d5b39843e20eef2fd01b60373756ed8c... record old: [32] 33345644d0bf750a28aad02effdcc79d8caaaca2c3483654b1aa8446dd112875 record new: [32] 33345644d0bf750a28aad02effdcc79d8caaaca2c3483654b1aa8446dd112876 client: Filtered packet: [37] 170301002033345644d0bf750a28aad02effdcc79d8caaaca2c3483654b1aa84... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/3 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/3 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/3 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/3 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 03038091381675d6446a338a92b5acb7e4426e22b1adc5f1904cd506f92831d4... handshake new: [92] 03038091381675d6446a338a92b5acb7e4426e22b1adc5f1904cd506f92831d4... record old: [96] 0200005c03038091381675d6446a338a92b5acb7e4426e22b1adc5f1904cd506... record new: [96] 0200005c03038091381675d6446a338a92b5acb7e4426e22b1adc5f1904cd506... server: Filtered packet: [199] 16030300600200005c03038091381675d6446a338a92b5acb7e4426e22b1adc5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/0 (8 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03031cc7ed4ea68626d8cf309995be2c93155b3f1b1fb3c96709e81c36baefcc... handshake new: [89] 03031cc7ed4ea68626d8cf309995be2c93155b3f1b1fb3c96709e81c36baefcc... record old: [93] 0200005903031cc7ed4ea68626d8cf309995be2c93155b3f1b1fb3c96709e81c... record new: [93] 0200005903031cc7ed4ea68626d8cf309995be2c93155b3f1b1fb3c96709e81c... server: Filtered packet: [173] 160303005d0200005903031cc7ed4ea68626d8cf309995be2c93155b3f1b1fb3... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/1 (7 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 0302e3628d9c110f4f16e74924042f02daab398efe0e81df847ae71f3ccea8b8... handshake new: [89] 0302e3628d9c110f4f16e74924042f02daab398efe0e81df847ae71f3ccea8b8... record old: [93] 020000590302e3628d9c110f4f16e74924042f02daab398efe0e81df847ae71f... record new: [93] 020000590302e3628d9c110f4f16e74924042f02daab398efe0e81df847ae71f... server: Filtered packet: [173] 160302005d020000590302e3628d9c110f4f16e74924042f02daab398efe0e81... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/2 (8 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03016efc1a643cbbb8c0d44a23d6179b17ec078dec66bb2844ff1f442fd7d90c... handshake new: [89] 03016efc1a643cbbb8c0d44a23d6179b17ec078dec66bb2844ff1f442fd7d90c... record old: [93] 0200005903016efc1a643cbbb8c0d44a23d6179b17ec078dec66bb2844ff1f44... record new: [93] 0200005903016efc1a643cbbb8c0d44a23d6179b17ec078dec66bb2844ff1f44... server: Filtered packet: [157] 160301005d0200005903016efc1a643cbbb8c0d44a23d6179b17ec078dec66bb... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/3 (7 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RENEGOTIATION_NOT_ALLOWED: Renegotiation is not allowed on this SSL socket. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RENEGOTIATION_NOT_ALLOWED: Renegotiation is not allowed on this SSL socket. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 (1 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/1 (5 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 (1 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/3 (4 ms) [----------] 52 tests from StreamOnly/TlsConnectStream (180 ms total) [----------] 6 tests from HelloRetryRequestKeyExchangeTests/TlsKeyExchange13 [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/0 (8 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/1 (9 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/0 (8 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/1 (9 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/0 (10 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/1 (10 ms) [----------] 6 tests from HelloRetryRequestKeyExchangeTests/TlsKeyExchange13 (54 ms total) [----------] 6 tests from HelloRetryRequestAgentTests/HelloRetryRequestAgentTest [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_RETRY_REQUEST: SSL received an unexpected Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/0 (4 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [77] 16030400000000000000000040020000340000000000000034fefdcf21ad74e5... Process message: [77] 16030400000000000000010040020000340001000000000034fefdcf21ad74e5... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_RETRY_REQUEST: SSL received an unexpected Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/1 (5 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/0 (0 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [77] 16030400000000000000000040020000340000000000000034fefdcf21ad74e5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/1 (1 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [55] 16030400320200002e0303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/0 (0 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [71] 1603040000000000000000003a0200002e000000000000002efefdcf21ad74e5... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/1 (0 ms) [----------] 6 tests from HelloRetryRequestAgentTests/HelloRetryRequestAgentTest (10 ms total) [----------] 6 tests from DatagramHolddown/TlsHolddownTest [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Expiring holddown timer server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/0 (4 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Expiring holddown timer client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/1 (4 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Expiring holddown timer server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/2 (4 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/0 (8 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/1 (8 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/2 (7 ms) [----------] 6 tests from DatagramHolddown/TlsHolddownTest (35 ms total) [----------] 136 tests from GenericStream/TlsConnectGenericResumption [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/7 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/7 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/6 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/0 (15 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/2 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/3 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/4 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/5 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/6 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/7 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/1 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/2 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/4 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/6 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/6 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/7 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/7 (8 ms) [----------] 136 tests from GenericStream/TlsConnectGenericResumption (1177 ms total) [----------] 102 tests from GenericDatagram/TlsConnectGenericResumption [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/0 (14 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/3 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/4 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/5 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/0 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/1 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/2 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/4 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 (8 ms) [----------] 102 tests from GenericDatagram/TlsConnectGenericResumption (903 ms total) [----------] 20 tests from GenericStream/TlsConnectGenericResumptionToken [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/3 (9 ms) [----------] 20 tests from GenericStream/TlsConnectGenericResumptionToken (174 ms total) [----------] 15 tests from GenericDatagram/TlsConnectGenericResumptionToken [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 (9 ms) [----------] 15 tests from GenericDatagram/TlsConnectGenericResumptionToken (134 ms total) [----------] 2 tests from GenericDatagram/TlsConnectTls13ResumptionToken [ RUN ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/1 (10 ms) [----------] 2 tests from GenericDatagram/TlsConnectTls13ResumptionToken (19 ms total) [----------] 60 tests from GenericMasking/VariantSuiteTest [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/0 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/1 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/2 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/3 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/4 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/5 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/0 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/1 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/2 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/3 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/4 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/5 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/2 (1 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/5 (0 ms) [----------] 60 tests from GenericMasking/VariantSuiteTest (1 ms total) [----------] 3 tests from GenericMasking/SuiteTest [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/0 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/0 (0 ms) [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/1 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/1 (0 ms) [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/2 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/2 (0 ms) [----------] 3 tests from GenericMasking/SuiteTest (0 ms total) [----------] 2 tests from GenericMasking/VariantTest [ RUN ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/0 [ OK ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/0 (0 ms) [ RUN ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/1 [ OK ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/1 (0 ms) [----------] 2 tests from GenericMasking/VariantTest (0 ms total) [----------] 88 tests from TlsPadding/TlsPaddingTest [ RUN ] TlsPadding/TlsPaddingTest.Correct/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.Correct/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.Correct/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.Correct/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.Correct/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.Correct/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.Correct/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.Correct/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410101 [ OK ] TlsPadding/TlsPaddingTest.Correct/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.Correct/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414100 [ OK ] TlsPadding/TlsPaddingTest.Correct/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/19 Content length=287 padding length=0 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/20 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/0 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/2 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/4 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/6 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/8 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/12 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/14 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/15 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/16 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/17 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/18 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/19 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/21 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fffefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410f0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fdfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410d0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fcfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410c0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f2f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0f0e [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0d0c [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0c0b [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 (0 ms) [----------] 88 tests from TlsPadding/TlsPaddingTest (2 ms total) [----------] 8 tests from SkipTls10/TlsSkipTest [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 02000057030161141f96b6083be2188b54fbcb3f2eefa3ef90992ebd3b1aa7ac... record new: [95] 02000057030161141f96b6083be2188b54fbcb3f2eefa3ef90992ebd3b1aa7ac... server: Filtered packet: [100] 160301005f02000057030161141f96b6083be2188b54fbcb3f2eefa3ef90992e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (2 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03017cff9db7c2ca06c4651befcf4e1b1f95ad89da1450c672d2d0b4... record new: [271] 0200005d03017cff9db7c2ca06c4651befcf4e1b1f95ad89da1450c672d2d0b4... server: Filtered packet: [276] 160301010f0200005d03017cff9db7c2ca06c4651befcf4e1b1f95ad89da1450... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03016f9aa0a774717691eecedc3096d07f093e84f86dd8b1782147fe... record new: [271] 0200005d03016f9aa0a774717691eecedc3096d07f093e84f86dd8b1782147fe... server: Filtered packet: [276] 160301010f0200005d03016f9aa0a774717691eecedc3096d07f093e84f86dd8... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [529] 0200005d0301f7acbfcd3c721ff08f12d564f892cc6b6270d48c453238f7159a... record new: [214] 0200005d0301f7acbfcd3c721ff08f12d564f892cc6b6270d48c453238f7159a... server: Filtered packet: [219] 16030100d60200005d0301f7acbfcd3c721ff08f12d564f892cc6b6270d48c45... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (4 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [713] 0200005d030186e24686c863d1ce76e91bfb180d1fc119223d8c8014be555ec3... record new: [543] 0200005d030186e24686c863d1ce76e91bfb180d1fc119223d8c8014be555ec3... server: Filtered packet: [548] 160301021f0200005d030186e24686c863d1ce76e91bfb180d1fc119223d8c80... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [529] 0200005d0301ce27d585078e91a2d04cd4b688455c0e4db7bee9873d1930c64c... record new: [416] 0200005d0301ce27d585078e91a2d04cd4b688455c0e4db7bee9873d1930c64c... server: Filtered packet: [421] 16030101a00200005d0301ce27d585078e91a2d04cd4b688455c0e4db7bee987... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (5 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d030103480a68e66b9a93a1242ad1c9e6aee3b1f065d13692a82f3ccf... record new: [271] 0200005d030103480a68e66b9a93a1242ad1c9e6aee3b1f065d13692a82f3ccf... Dropping handshake: 12 record old: [271] 0200005d030103480a68e66b9a93a1242ad1c9e6aee3b1f065d13692a82f3ccf... record new: [101] 0200005d030103480a68e66b9a93a1242ad1c9e6aee3b1f065d13692a82f3ccf... server: Filtered packet: [106] 16030100650200005d030103480a68e66b9a93a1242ad1c9e6aee3b1f065d136... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [529] 0200005d0301919c9efd1e344de7e97e5e4962e98a88de6ae0721ae967f0191b... record new: [214] 0200005d0301919c9efd1e344de7e97e5e4962e98a88de6ae0721ae967f0191b... Dropping handshake: 12 record old: [214] 0200005d0301919c9efd1e344de7e97e5e4962e98a88de6ae0721ae967f0191b... record new: [101] 0200005d0301919c9efd1e344de7e97e5e4962e98a88de6ae0721ae967f0191b... server: Filtered packet: [106] 16030100650200005d0301919c9efd1e344de7e97e5e4962e98a88de6ae0721a... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (4 ms) [----------] 8 tests from SkipTls10/TlsSkipTest (27 ms total) [----------] 32 tests from SkipVariants/TlsSkipTest [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 0200005703022b1669fd552a656d58ab9677cc761d5c6d13f1f39c9a0bdf1476... record new: [95] 0200005703022b1669fd552a656d58ab9677cc761d5c6d13f1f39c9a0bdf1476... server: Filtered packet: [100] 160302005f0200005703022b1669fd552a656d58ab9677cc761d5c6d13f1f39c... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 020000570303ca0cd921b3e9226c070625a0eb11cc6118cd8edcc3f11d1db6f7... record new: [95] 020000570303ca0cd921b3e9226c070625a0eb11cc6118cd8edcc3f11d1db6f7... server: Filtered packet: [100] 160303005f020000570303ca0cd921b3e9226c070625a0eb11cc6118cd8edcc3... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [150] 16feff00000000000000000063020000570000000000000057feff64d1781151... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [150] 16fefd00000000000000000063020000570000000000000057fefda673fe7595... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d0302c1219f0168f84184872b83f45d6c72cf9850cd0ee23b5063e880... record new: [271] 0200005d0302c1219f0168f84184872b83f45d6c72cf9850cd0ee23b5063e880... server: Filtered packet: [276] 160302010f0200005d0302c1219f0168f84184872b83f45d6c72cf9850cd0ee2... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d03036b102e9bff93bd571648ca297edefe095d9de04d2cfb76a1ddf0... record new: [273] 0200005d03036b102e9bff93bd571648ca297edefe095d9de04d2cfb76a1ddf0... server: Filtered packet: [278] 16030301110200005d03036b102e9bff93bd571648ca297edefe095d9de04d2c... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [178] 0c0000a600010000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [347] 16feff000000000000000000690200005d000000000000005dfeffd4e3f12bed... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [180] 0c0000a800010000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [349] 16fefd000000000000000000690200005d000000000000005dfefda10c6658a2... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d0302c85ec5e6b2bacef28bbaa14e015d164028779634d4fce5526ef7... record new: [271] 0200005d0302c85ec5e6b2bacef28bbaa14e015d164028779634d4fce5526ef7... server: Filtered packet: [276] 160302010f0200005d0302c85ec5e6b2bacef28bbaa14e015d164028779634d4... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d030319a66661417e3f3489f78ba97e555e5c5632c89b75a686136571... record new: [273] 0200005d030319a66661417e3f3489f78ba97e555e5c5632c89b75a686136571... server: Filtered packet: [278] 16030301110200005d030319a66661417e3f3489f78ba97e555e5c5632c89b75... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [178] 0c0000a600010000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [347] 16feff000000000000000000690200005d000000000000005dfefffe8cd3ce7b... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [180] 0c0000a800010000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [349] 16fefd000000000000000000690200005d000000000000005dfefdde460d59e2... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [530] 0200005d0302652e5b3ef25a0bb1040c06f48b3bcd0beff921a0c7ca34bcc7e7... record new: [215] 0200005d0302652e5b3ef25a0bb1040c06f48b3bcd0beff921a0c7ca34bcc7e7... server: Filtered packet: [220] 16030200d70200005d0302652e5b3ef25a0bb1040c06f48b3bcd0beff921a0c7... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [530] 0200005d0303c5353f35da3297a738eb262c0b02820101be542ce95d8d1617c8... record new: [215] 0200005d0303c5353f35da3297a738eb262c0b02820101be542ce95d8d1617c8... server: Filtered packet: [220] 16030300d70200005d0303c5353f35da3297a738eb262c0b02820101be542ce9... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [120] 0c00006c000200000000006c03001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [120] 0c00006c000100000000006c03001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [289] 16feff000000000000000000690200005d000000000000005dfeffa6bf51a7a7... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [124] 0c000070000200000000007003001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [124] 0c000070000100000000007003001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [293] 16fefd000000000000000000690200005d000000000000005dfefd4f684d576e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [713] 0200005d0302ee43cb820f9db12f48bde3e3636bc550e52f0aa81c7f24eb984a... record new: [543] 0200005d0302ee43cb820f9db12f48bde3e3636bc550e52f0aa81c7f24eb984a... server: Filtered packet: [548] 160302021f0200005d0302ee43cb820f9db12f48bde3e3636bc550e52f0aa81c... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [715] 0200005d03037dda791f2e3578050ba9e39eecf995464391429f6365bbe889af... record new: [543] 0200005d03037dda791f2e3578050ba9e39eecf995464391429f6365bbe889af... server: Filtered packet: [548] 160303021f0200005d03037dda791f2e3578050ba9e39eecf995464391429f63... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [619] 16feff000000000000000000690200005d000000000000005dfeffa3e53e4044... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [619] 16fefd000000000000000000690200005d000000000000005dfefdcf3794f078... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [530] 0200005d03022307e718d5facab042206dfd2e280abd178fddcd15769fc5d6b0... record new: [416] 0200005d03022307e718d5facab042206dfd2e280abd178fddcd15769fc5d6b0... server: Filtered packet: [421] 16030201a00200005d03022307e718d5facab042206dfd2e280abd178fddcd15... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [530] 0200005d0303bf949dc6d263b92bd5a0985cddd3fafa3d092553b2a62ba2d2d3... record new: [416] 0200005d0303bf949dc6d263b92bd5a0985cddd3fafa3d092553b2a62ba2d2d3... server: Filtered packet: [421] 16030301a00200005d0303bf949dc6d263b92bd5a0985cddd3fafa3d092553b2... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [122] 0c00006e000200000000006e03001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [492] 16feff000000000000000000690200005d000000000000005dfeff461f3b569a... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [122] 0c00006e000200000000006e03001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [492] 16fefd000000000000000000690200005d000000000000005dfefd5c343755a3... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03020732410c23a8470b575a76f975bcc2818848a14db2d5584774cb... record new: [271] 0200005d03020732410c23a8470b575a76f975bcc2818848a14db2d5584774cb... Dropping handshake: 12 record old: [271] 0200005d03020732410c23a8470b575a76f975bcc2818848a14db2d5584774cb... record new: [101] 0200005d03020732410c23a8470b575a76f975bcc2818848a14db2d5584774cb... server: Filtered packet: [106] 16030200650200005d03020732410c23a8470b575a76f975bcc2818848a14db2... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d030352496ba782b89b9a8dc9800d308a3d88ecc8106c145bb8414384... record new: [273] 0200005d030352496ba782b89b9a8dc9800d308a3d88ecc8106c145bb8414384... Dropping handshake: 12 record old: [273] 0200005d030352496ba782b89b9a8dc9800d308a3d88ecc8106c145bb8414384... record new: [101] 0200005d030352496ba782b89b9a8dc9800d308a3d88ecc8106c145bb8414384... server: Filtered packet: [106] 16030300650200005d030352496ba782b89b9a8dc9800d308a3d88ecc8106c14... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [178] 0c0000a600010000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [178] 0c0000a600010000000000a603001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16feff000000000000000000690200005d000000000000005dfeff148316d2ee... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [180] 0c0000a800010000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [180] 0c0000a800010000000000a803001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16fefd000000000000000000690200005d000000000000005dfefd1d286731c4... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [530] 0200005d0302d7bb599482bcd365be95d749d22cddec088efa24619d8cd0d62f... record new: [215] 0200005d0302d7bb599482bcd365be95d749d22cddec088efa24619d8cd0d62f... Dropping handshake: 12 record old: [215] 0200005d0302d7bb599482bcd365be95d749d22cddec088efa24619d8cd0d62f... record new: [101] 0200005d0302d7bb599482bcd365be95d749d22cddec088efa24619d8cd0d62f... server: Filtered packet: [106] 16030200650200005d0302d7bb599482bcd365be95d749d22cddec088efa2461... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 0200005d0303c027c32b458fbeb8f0501fc1001b89f8e30e557af12e15b283f1... record new: [216] 0200005d0303c027c32b458fbeb8f0501fc1001b89f8e30e557af12e15b283f1... Dropping handshake: 12 record old: [216] 0200005d0303c027c32b458fbeb8f0501fc1001b89f8e30e557af12e15b283f1... record new: [101] 0200005d0303c027c32b458fbeb8f0501fc1001b89f8e30e557af12e15b283f1... server: Filtered packet: [106] 16030300650200005d0303c027c32b458fbeb8f0501fc1001b89f8e30e557af1... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [121] 0c00006d000200000000006d03001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [121] 0c00006d000100000000006d03001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [121] 0c00006d000100000000006d03001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16feff000000000000000000690200005d000000000000005dfeff5d52939334... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [122] 0c00006e000200000000006e03001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [122] 0c00006e000100000000006e03001d20c81a800d1882d1fdb78bf3e6bb47343c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [122] 0c00006e000100000000006e03001d20c81a800d1882d1fdb78bf3e6bb47343c... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16fefd000000000000000000690200005d000000000000005dfefded52a02479... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (4 ms) [----------] 32 tests from SkipVariants/TlsSkipTest (108 ms total) [----------] 10 tests from Skip13Variants/Tls13SkipTest [ RUN ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 8 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [617] 0b0001b9000001b50001b0308201ac30820115a003020102020102300d06092a... server: Filtered packet: [734] 160303005a020000560303fa83d2ee3c518444fb09498b2a7520dc69b02b131c... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERTIFICATE: SSL received an unexpected Certificate handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/0 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 8 record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [0] record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [453] 0b0001b900010000000001b9000001b50001b0308201ac30820115a003020102... record old: [144] 0f00008400030000000000840804008063eb483638baa2d56134bd9429412b5b... record new: [144] 0f00008400020000000000840804008063eb483638baa2d56134bd9429412b5b... record old: [44] 140000200004000000000020f69d272c9aed6935d97b8e0b947573812d8ce651... record new: [44] 140000200003000000000020f69d272c9aed6935d97b8e0b947573812d8ce651... server: Filtered packet: [840] 16fefd00000000000000000062020000560000000000000056fefd65531fe81e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERTIFICATE: SSL received an unexpected Certificate handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/1 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [212] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [329] 160303005a02000056030365cf6526553619a65fac73fc6ee39daceda78e22be... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/0 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [0] record old: [144] 0f00008400030000000000840804008047c4d5c0959ec64f75c2f6ae34caabcc... record new: [144] 0f00008400020000000000840804008047c4d5c0959ec64f75c2f6ae34caabcc... record old: [44] 140000200004000000000020bd0a5a5596bb7caf0168cef61dfa95e5f7145aca... record new: [44] 140000200003000000000020bd0a5a5596bb7caf0168cef61dfa95e5f7145aca... server: Filtered packet: [435] 16fefd00000000000000000062020000560000000000000056fefd42d4bfe499... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/1 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [521] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [638] 160303005a020000560303cb682051702b6da7ff5601767c32733610d9e8c9e5... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/0 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [144] 0f00008400030000000000840804008027c9cfa0ae4ef37e882ff3f0814b11a9... record new: [0] record old: [44] 140000200004000000000020577a92a80dbcb8135cf16bc6c1f57d510dd0ba82... record new: [44] 140000200003000000000020577a92a80dbcb8135cf16bc6c1f57d510dd0ba82... server: Filtered packet: [744] 16fefd00000000000000000062020000560000000000000056fefded453f3d32... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/1 (3 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [172] 0f000084080400807c5b1d9f4f144224ca5aa37a9129e2602f8af50ca3742a3a... client: Filtered packet: [194] 17030300bdcab59a4821c2c48fc91fd1d3b3ed047d322b8033dbea48c849a73b... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/0 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [459] 0b0001bf00010000000001bf000001bb0001b6308201b23082011ba003020102... record new: [0] record old: [144] 0f000084000200000000008408040080a52241dde217b72d6518873d3584971f... record new: [144] 0f000084000100000000008408040080a52241dde217b72d6518873d3584971f... record old: [44] 140000200003000000000020a96cec9407e73e1cc767ee564b0a4fccebdf60f8... record new: [44] 140000200002000000000020a96cec9407e73e1cc767ee564b0a4fccebdf60f8... client: Filtered packet: [254] 2e954800111fe9b6490141154d86d77b498e9843dbc52efc4f00a1ae458f6fe0... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/1 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [487] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... client: Filtered packet: [509] 17030301f87e2fbaec215d848c9c1c2509e7e5dea22714cd381e24447451632a... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/0 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [144] 0f0000840002000000000084080400805c0e06417e3e0a9a24fd88d173e5f745... record new: [0] record old: [44] 14000020000300000000002088aa2d15f629aad0f45e303d0559c350caaba1cb... record new: [44] 14000020000200000000002088aa2d15f629aad0f45e303d0559c350caaba1cb... client: Filtered packet: [569] 2ea7d901dc359065d44b732efb859c3185d8bd7e894b757334ea6ee0c6b9dd34... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/1 (6 ms) [----------] 10 tests from Skip13Variants/Tls13SkipTest (47 ms total) [----------] 14 tests from VersionsStream10Pre13/SSLv2ClientHelloTest [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010301000300000010000033c55af534ebb6ad0b8d1afe06417628b0 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 (8 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectDisabled/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103010003000000100000332a26b4b23b20249f42e01d68b8194671 client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectDisabled/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 Version: TLS 1.0 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff01030100030000001000003367e0e63571832a8e362e3f0e579a3b7300... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030100030000001000c013e3f2ef3a2d0263df042cf74248345a78 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (7 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff010301000300000010000033c3d2f3d2007021485fa1ad5d7b64c08400... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 (8 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff010301000300000010000033d82c995665ef0df67efc98b1a95a502000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002104010301000300000010000033b68dbc93423478eedec875822a4c264a00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002106010301000300000010000033ec02749cdb0d11e676c265df0513e62e00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (3 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030100030000000f000033f4295ce83c42c5e8a6b6ca9c06bcb5 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c0103010003000000200000331d6f490e46c20d879f4e8a4e8ae02ba22805... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 (8 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d0103010003000000210000337a01ca68230dde722d6a4b42009004fed3e1... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010301000300000010000033ac6238f3b3bee2bb7e347fefb4547cfa server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103010006000000100000330000ffc8f1533722db6a1206b4093a6083d7... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (8 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.CheckServerRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030100030000001000003384099b613a4801b517534cafdccbc59b server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.CheckServerRandom/0 (12 ms) [----------] 14 tests from VersionsStream10Pre13/SSLv2ClientHelloTest (68 ms total) [----------] 28 tests from VersionsStreamPre13/SSLv2ClientHelloTest [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103020003000000100000336f83d20279fc66fbbdafdf603d526d07 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103030003000000100000339727d179ba5a537bcb790dbef306d70c server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010302000300000010000033beca9f91033242f5b59411e8e4706732 client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010303000300000010000033f6f8abb898e99db8bdb410b9b238262d client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 Version: TLS 1.1 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff0103020003000000100000334f06f697e7958c57f2f4f7224b17fe1100... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1 Version: TLS 1.2 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff01030300030000001000003318da283394118d6f24d33483b3c6e15000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030200030000001000c013a5c665468d1c58075b73d82dd49651d6 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (6 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030300030000001000c0136fd4f15fb452de246cfb653ddd63abff server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff01030200030000001000003368f005889cadacd5ad3e579343d3d4b700... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff010303000300000010000033a6f7d694a15695bc18a4ec611ae8dc0900... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff01030200030000001000003335f16c79526a23a7be3517d03c364e9c00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff010303000300000010000033df6f4e8e157cedd71afb570ac19c5a2c00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002104010302000300000010000033c55d50d68e43aee321f055b421ad507500... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 00210401030300030000001000003344b03a9859267455b91cfbd3b0a6921900... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002106010302000300000010000033bc24c695fbf82f4154b4c551978d06cf00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 0021060103030003000000100000336a30c823e160ef18960081701aabdf3b00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030200030000000f0000334b7f6eb795192bfee019b4643b74d2 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030300030000000f0000337b5959cbb0ee327a7afbac72599940 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c01030200030000002000003388fc2dcc328abb6c603974e96dfe6617cd11... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c010303000300000020000033144db013327b37a96d324556c5f6c762723a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d0103020003000000210000338ad8983df5b4efeaddfbf59ae522681b65be... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d010303000300000021000033caf91e08b3545cb01ccc735d9e8c394a1b9a... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010302000300000010000033000b65e82901804e1cf6e13f5d9a73f3 server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010303000300000010000033e80ea2f32c1ebfd2c1e3d42d0b4d5fc6 server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103020006000000100000330000ffe07f2389ec25024934819f6f27eb2d... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103030006000000100000330000ffc266e141ee5cd561ac5f3c565d8f3a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010302000300000010000033e3c14c352a5a01935d9f1c7fd02b3740 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/0 (11 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103030003000000100000332c3827831084443392da39748f29481d server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/1 (11 ms) [----------] 28 tests from VersionsStreamPre13/SSLv2ClientHelloTest (134 ms total) [----------] 8 tests from TlsDowngradeSentinelTest/TlsDowngradeTest [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/0 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 Version: TLS 1.3 [ SKIPPED ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 (0 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/2 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/3 (3 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/4 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/5 (3 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/6 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/7 (4 ms) [----------] 8 tests from TlsDowngradeSentinelTest/TlsDowngradeTest (26 ms total) [----------] 4802 tests from TLSVersionRanges/TestPolicyVersionRange [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/0 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/0 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/5 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/5 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/6 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/6 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/7 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/7 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/8 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/8 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/9 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/9 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/10 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/10 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/11 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/11 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/12 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/12 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/13 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/13 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/14 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/14 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/15 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/15 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/16 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/16 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/17 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/17 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/18 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/18 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/19 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/19 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/20 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/20 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/21 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/21 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/22 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/22 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/23 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/23 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/24 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/24 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/25 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/25 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/26 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/26 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/27 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/27 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/28 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/28 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/29 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/29 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/30 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/30 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/31 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/31 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/32 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/32 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/33 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/33 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/34 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/34 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/35 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/35 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/36 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/36 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/37 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/37 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/38 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/38 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/39 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/39 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/40 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/40 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/41 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/41 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/42 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/42 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/43 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/43 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/44 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/44 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/45 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/45 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/46 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/46 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/47 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/47 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/48 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/48 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/49 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/49 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/50 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/50 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/51 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/51 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/52 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/52 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/53 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/53 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/54 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/54 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/55 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/55 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/56 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/56 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/57 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/57 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/58 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/58 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/59 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/59 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/60 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/60 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/61 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/61 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/62 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/62 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/63 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/63 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/64 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/64 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/65 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/65 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/66 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/66 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/67 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/67 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/68 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/68 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/69 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/69 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/70 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/70 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/71 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/71 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/72 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/72 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/73 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/73 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/74 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/74 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/75 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/75 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/76 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/76 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/77 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/77 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/78 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/78 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/79 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/79 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/80 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/80 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/81 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/81 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/82 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/82 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/83 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/83 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/84 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/84 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/85 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/85 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/86 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/86 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/87 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/87 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/88 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/88 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/89 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/89 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/90 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/90 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/91 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/91 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/92 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/92 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/93 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/93 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/94 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/94 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/95 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/95 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/96 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/96 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/97 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/97 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/98 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/98 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/99 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/99 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/100 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/100 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/101 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/101 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/102 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/102 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/103 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/103 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/104 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/104 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/105 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/105 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/106 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/106 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/107 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/107 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/108 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/108 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/109 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/109 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/110 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/110 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/111 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/111 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/112 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/112 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/113 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/113 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/114 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/114 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/115 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/115 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/116 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/116 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/117 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/117 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/118 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/118 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/119 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/119 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/120 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/120 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/121 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/121 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/122 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/122 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/123 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/123 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/124 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/124 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/125 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/125 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/126 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/126 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/127 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/127 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/128 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/128 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/129 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/129 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/130 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/130 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/131 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/131 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/132 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/132 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/133 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/133 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/134 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/134 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/135 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/135 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/136 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/136 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/137 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/137 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/138 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/138 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/139 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/139 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/140 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/140 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/141 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/141 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/142 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/142 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/143 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/143 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/144 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/144 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/145 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/145 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/146 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/146 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/147 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/147 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/148 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/148 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/149 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/149 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/150 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/150 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/151 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/151 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/152 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/152 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/153 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/153 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/154 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/154 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/155 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/155 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/156 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/156 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/157 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/157 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/158 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/158 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/159 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/159 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/160 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/160 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/161 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/161 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/162 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/162 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/163 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/163 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/164 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/164 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/165 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/165 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/166 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/166 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/167 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/167 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/168 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/168 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/169 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/169 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/170 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/170 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/171 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/171 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/172 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/172 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/173 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/173 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/174 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/174 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/175 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/175 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/176 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/176 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/177 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/177 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/178 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/178 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/179 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/179 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/180 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/180 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/181 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/181 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/182 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/182 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/183 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/183 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/184 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/184 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/185 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/185 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/186 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/186 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/187 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/187 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/188 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/188 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/189 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/189 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/190 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/190 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/191 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/191 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/192 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/192 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/193 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/193 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/194 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/194 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/195 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/195 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/196 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/196 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/197 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/197 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/198 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/198 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/199 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/199 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/200 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/200 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/201 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/201 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/202 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/202 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/203 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/203 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/204 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/204 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/205 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/205 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/206 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/206 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/207 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/207 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/208 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/208 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/209 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/209 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/210 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/210 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/211 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/211 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/212 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/212 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/213 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/213 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/214 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/214 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/215 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/215 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/216 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/216 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/217 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/217 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/218 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/218 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/219 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/219 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/220 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/220 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/221 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/221 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/222 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/222 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/223 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/223 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/224 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/224 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/225 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/225 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/226 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/226 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/227 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/227 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/228 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/228 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/229 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/229 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/230 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/230 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/231 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/231 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/232 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/232 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/233 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/233 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/234 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/235 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/235 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/236 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/236 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/237 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/238 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/239 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/240 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/241 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/242 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/242 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/243 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/243 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/244 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/244 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/245 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/246 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/247 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/247 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/248 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/249 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/249 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/250 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/250 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/251 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/251 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/252 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/253 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/253 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/254 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/254 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/255 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/255 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/256 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/256 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/257 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/257 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/258 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/258 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/259 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/259 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/260 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/260 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/261 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/261 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/262 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/262 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/263 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/263 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/264 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/264 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/265 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/266 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/267 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/267 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/268 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/269 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/269 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/270 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/270 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/271 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/271 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/272 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/273 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/274 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/275 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/276 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/276 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/277 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/277 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/278 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/278 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/279 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/280 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/281 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/282 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/283 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/284 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/284 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/285 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/285 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/286 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/287 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/288 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/289 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/290 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/291 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/291 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/292 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/292 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/293 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/293 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/294 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/295 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/296 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/297 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/298 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/298 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/299 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/299 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/300 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/300 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/301 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/302 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/302 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/303 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/303 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/304 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/304 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/305 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/305 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/306 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/306 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/307 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/307 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/308 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/308 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/309 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/309 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/310 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/310 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/311 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/311 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/312 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/312 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/313 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/313 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/314 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/314 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/315 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/315 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/316 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/316 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/317 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/318 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/318 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/319 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/319 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/320 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/320 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/321 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/322 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/323 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/324 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/325 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/325 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/326 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/326 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/327 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/327 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/328 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/329 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/330 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/331 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/332 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/333 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/333 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/334 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/334 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/335 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/335 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/336 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/337 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/338 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/339 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/340 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/340 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/341 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/341 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/342 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/342 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/343 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/344 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/344 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/345 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/345 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/346 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/347 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/347 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/348 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/349 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/349 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/350 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/350 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/351 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/352 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/352 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/353 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/353 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/354 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/354 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/355 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/356 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/356 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/357 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/357 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/358 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/359 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/360 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/360 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/361 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/361 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/362 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/362 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/363 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/363 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/364 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/364 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/365 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/365 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/366 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/366 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/367 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/367 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/368 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/368 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/369 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/369 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/370 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/370 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/371 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/371 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/372 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/373 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/374 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/374 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/375 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/376 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/377 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/378 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/378 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/379 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/380 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/381 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/381 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/382 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/382 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/383 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/384 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/385 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/385 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/386 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/387 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/388 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/388 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/389 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/389 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/390 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/391 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/392 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/393 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/394 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/394 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/395 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/396 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/396 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/397 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/398 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/399 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/400 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/400 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/401 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/401 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/402 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/402 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/403 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/403 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/404 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/405 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/405 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/406 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/406 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/407 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/407 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/408 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/408 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/409 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/410 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/411 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/412 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/413 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/413 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/414 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/414 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/415 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/416 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/417 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/418 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/418 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/419 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/420 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/420 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/421 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/421 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/422 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/423 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/424 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/425 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/425 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/426 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/427 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/428 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/429 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/430 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/430 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/431 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/431 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/432 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/432 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/433 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/433 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/434 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/434 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/435 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/435 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/436 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/436 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/437 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/437 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/438 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/438 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/439 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/439 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/440 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/440 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/441 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/441 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/442 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/442 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/443 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/443 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/444 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/444 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/445 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/445 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/446 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/446 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/447 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/447 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/448 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/448 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/449 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/449 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/450 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/450 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/451 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/451 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/452 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/452 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/453 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/453 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/454 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/454 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/455 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/455 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/456 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/456 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/457 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/457 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/458 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/458 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/459 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/459 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/460 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/460 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/461 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/461 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/462 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/462 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/463 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/463 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/464 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/464 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/465 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/465 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/466 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/466 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/467 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/467 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/468 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/468 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/469 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/469 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/470 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/470 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/471 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/471 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/472 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/472 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/473 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/473 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/474 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/474 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/475 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/475 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/476 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/476 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/477 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/477 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/478 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/478 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/479 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/479 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/480 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/480 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/481 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/481 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/482 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/482 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/483 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/483 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/484 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/484 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/485 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/485 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/486 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/486 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/487 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/487 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/488 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/488 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/489 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/489 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/490 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/490 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/491 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/491 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/492 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/492 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/493 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/493 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/494 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/494 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/495 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/495 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/496 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/496 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/497 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/497 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/498 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/498 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/499 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/499 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/500 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/500 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/501 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/501 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/502 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/502 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/503 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/503 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/504 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/504 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/505 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/505 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/506 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/506 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/507 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/507 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/508 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/508 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/509 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/509 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/510 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/510 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/511 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/511 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/512 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/512 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/513 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/513 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/514 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/514 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/515 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/515 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/516 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/516 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/517 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/517 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/518 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/518 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/519 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/519 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/520 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/520 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/521 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/521 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/522 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/522 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/523 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/523 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/524 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/524 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/525 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/525 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/526 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/526 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/527 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/527 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/528 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/528 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/529 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/529 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/530 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/530 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/531 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/531 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/532 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/532 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/533 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/533 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/534 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/534 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/535 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/535 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/536 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/536 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/537 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/537 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/538 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/538 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/539 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/539 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/540 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/540 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/541 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/541 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/542 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/542 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/543 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/543 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/544 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/544 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/545 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/545 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/546 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/546 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/547 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/547 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/548 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/548 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/549 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/549 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/550 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/550 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/551 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/551 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/552 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/552 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/553 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/553 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/554 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/554 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/555 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/555 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/556 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/556 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/557 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/557 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/558 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/558 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/559 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/559 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/560 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/560 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/561 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/561 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/562 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/562 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/563 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/563 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/564 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/564 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/565 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/565 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/566 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/566 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/567 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/567 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/568 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/569 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/570 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/571 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/571 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/572 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/572 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/573 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/573 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/574 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/574 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/575 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/576 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/576 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/577 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/578 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/579 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/580 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/581 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/582 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/583 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/584 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/585 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/586 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/587 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/588 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/588 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/589 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/590 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/591 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/592 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/593 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/594 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/595 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/596 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/596 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/597 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/597 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/598 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/598 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/599 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/599 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/600 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/601 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/601 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/602 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/603 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/604 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/604 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/605 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/605 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/606 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/606 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/607 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/607 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/608 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/609 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/610 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/611 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/612 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/612 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/613 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/613 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/614 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/614 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/615 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/616 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/617 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/618 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/618 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/619 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/620 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/620 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/621 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/621 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/622 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/623 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/624 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/625 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/626 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/627 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/627 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/628 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/628 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/629 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/629 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/630 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/631 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/632 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/633 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/634 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/635 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/636 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/637 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/638 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/639 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/640 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/640 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/641 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/642 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/643 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/644 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/645 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/645 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/646 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/646 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/647 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/647 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/648 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/648 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/649 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/650 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/650 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/651 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/652 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/653 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/653 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/654 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/654 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/655 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/655 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/656 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/656 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/657 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/658 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/658 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/659 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/660 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/661 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/661 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/662 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/662 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/663 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/663 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/664 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/664 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/665 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/666 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/667 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/668 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/669 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/669 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/670 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/670 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/671 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/671 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/672 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/672 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/673 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/674 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/675 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/676 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/677 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/677 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/678 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/679 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/680 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/681 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/682 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/683 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/684 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/685 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/686 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/686 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/687 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/687 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/688 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/688 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/689 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/689 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/690 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/690 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/691 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/691 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/692 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/692 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/693 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/693 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/694 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/694 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/695 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/695 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/696 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/696 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/697 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/697 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/698 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/698 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/699 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/699 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/700 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/700 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/701 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/701 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/702 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/702 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/703 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/703 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/704 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/704 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/705 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/705 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/706 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/706 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/707 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/707 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/708 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/708 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/709 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/709 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/710 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/710 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/711 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/711 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/712 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/712 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/713 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/713 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/714 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/714 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/715 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/716 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/716 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/717 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/717 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/718 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/719 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/719 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/720 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/721 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/721 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/722 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/723 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/723 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/724 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/724 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/725 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/726 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/726 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/727 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/727 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/728 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/729 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/729 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/730 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/730 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/731 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/732 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/733 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/733 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/734 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/735 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/736 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/736 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/737 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/738 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/739 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/739 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/740 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/740 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/741 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/742 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/743 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/743 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/744 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/745 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/746 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/747 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/747 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/748 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/749 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/750 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/750 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/751 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/752 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/753 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/754 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/754 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/755 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/756 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/757 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/757 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/758 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/759 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/760 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/761 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/762 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/763 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/764 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/764 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/765 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/766 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/767 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/767 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/768 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/769 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/770 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/771 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/772 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/773 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/774 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/774 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/775 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/776 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/777 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/777 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/778 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/779 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/780 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/781 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/781 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/782 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/783 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/784 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/784 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/785 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/785 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/786 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/786 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/787 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/787 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/788 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/788 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/789 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/789 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/790 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/790 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/791 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/791 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/792 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/792 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/793 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/793 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/794 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/794 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/795 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/795 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/796 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/796 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/797 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/797 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/798 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/798 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/799 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/799 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/800 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/800 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/801 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/801 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/802 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/802 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/803 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/803 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/804 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/804 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/805 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/805 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/806 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/806 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/807 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/807 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/808 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/808 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/809 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/809 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/810 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/810 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/811 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/811 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/812 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/812 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/813 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/813 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/814 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/814 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/815 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/815 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/816 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/816 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/817 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/817 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/818 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/818 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/819 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/819 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/820 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/820 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/821 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/821 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/822 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/822 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/823 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/823 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/824 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/824 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/825 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/825 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/826 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/826 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/827 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/827 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/828 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/828 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/829 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/829 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/830 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/830 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/831 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/831 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/832 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/832 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/833 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/833 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/834 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/834 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/835 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/835 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/836 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/836 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/837 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/837 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/838 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/838 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/839 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/839 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/840 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/840 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/841 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/841 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/842 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/842 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/843 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/843 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/844 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/844 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/845 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/845 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/846 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/846 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/847 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/847 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/848 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/848 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/849 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/849 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/850 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/850 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/851 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/851 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/852 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/852 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/853 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/853 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/854 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/854 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/855 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/855 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/856 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/856 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/857 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/857 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/858 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/858 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/859 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/859 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/860 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/860 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/861 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/861 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/862 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/862 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/863 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/863 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/864 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/864 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/865 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/865 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/866 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/866 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/867 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/867 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/868 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/868 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/869 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/869 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/870 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/870 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/871 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/871 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/872 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/872 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/873 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/873 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/874 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/874 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/875 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/875 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/876 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/876 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/877 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/877 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/878 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/878 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/879 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/879 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/880 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/880 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/881 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/881 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/882 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/882 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/883 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/883 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/884 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/884 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/885 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/885 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/886 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/886 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/887 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/887 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/888 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/888 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/889 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/889 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/890 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/890 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/891 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/891 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/892 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/892 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/893 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/893 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/894 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/894 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/895 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/895 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/896 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/896 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/897 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/897 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/898 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/898 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/899 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/899 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/900 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/900 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/901 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/901 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/902 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/902 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/903 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/903 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/904 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/904 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/905 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/905 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/906 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/906 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/907 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/907 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/908 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/908 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/909 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/909 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/910 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/910 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/911 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/911 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/912 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/912 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/913 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/913 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/914 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/914 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/915 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/915 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/916 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/916 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/917 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/917 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/918 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/918 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/919 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/919 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/920 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/920 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/921 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/921 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/922 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/922 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/923 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/923 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/924 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/924 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/925 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/925 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/926 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/926 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/927 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/927 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/928 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/928 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/929 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/929 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/930 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/930 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/931 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/931 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/932 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/932 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/933 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/933 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/934 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/934 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/935 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/935 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/936 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/936 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/937 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/937 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/938 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/938 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/939 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/939 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/940 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/940 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/941 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/941 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/942 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/942 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/943 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/943 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/944 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/944 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/945 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/945 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/946 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/946 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/947 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/947 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/948 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/948 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/949 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/949 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/950 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/950 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/951 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/951 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/952 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/952 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/953 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/953 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/954 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/954 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/955 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/955 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/956 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/956 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/957 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/957 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/958 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/958 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/959 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/959 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/960 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/961 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/962 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/963 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/963 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/964 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/964 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/965 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/965 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/966 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/966 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/967 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/967 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/968 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/969 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/970 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/971 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/971 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/972 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/973 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/974 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/975 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/976 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/976 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/977 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/978 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/979 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/980 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/981 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/982 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/983 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/983 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/984 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/985 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/986 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/987 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/988 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/989 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/989 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/990 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/990 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/991 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/991 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/992 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/993 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/994 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/994 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/995 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/996 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/996 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/997 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/997 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/998 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/998 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/999 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/999 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1000 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1001 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1001 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1002 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1003 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1004 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1004 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1005 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1005 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1006 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1006 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1007 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1008 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1009 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1010 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1011 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1012 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1012 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1013 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1013 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1014 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1015 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1016 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1017 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1018 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1019 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1019 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1020 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1020 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1021 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1022 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1023 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1024 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1025 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1026 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1027 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1027 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1028 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1029 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1029 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1030 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1030 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1031 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1031 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1032 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1032 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1033 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1033 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1034 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1034 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1035 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1035 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1036 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1036 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1037 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1037 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1038 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1038 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1039 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1039 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1040 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1040 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1041 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1041 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1042 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1042 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1043 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1043 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1044 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1044 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1045 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1045 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1046 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1046 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1047 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1047 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1048 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1048 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1049 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1049 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1050 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1050 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1051 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1051 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1052 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1052 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1053 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1053 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1054 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1054 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1055 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1055 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1056 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1056 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1057 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1057 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1058 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1058 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1059 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1059 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1060 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1060 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1061 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1061 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1062 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1062 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1063 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1063 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1064 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1064 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1065 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1065 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1066 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1066 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1067 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1067 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1068 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1068 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1069 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1069 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1070 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1070 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1071 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1071 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1072 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1072 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1073 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1073 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1074 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1074 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1075 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1075 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1076 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1076 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1077 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1077 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1078 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1078 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1079 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1079 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1080 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1080 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1081 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1081 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1082 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1082 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1083 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1083 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1084 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1084 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1085 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1085 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1086 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1086 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1087 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1088 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1088 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1089 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1089 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1090 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1091 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1091 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1092 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1093 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1093 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1094 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1095 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1096 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1096 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1097 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1097 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1098 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1099 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1099 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1100 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1101 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1101 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1102 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1103 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1103 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1104 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1104 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1105 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1106 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1107 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1107 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1108 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1108 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1109 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1110 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1110 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1111 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1112 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1112 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1113 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1114 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1115 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1115 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1116 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1117 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1118 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1119 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1119 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1120 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1121 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1122 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1122 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1123 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1124 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1125 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1126 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1126 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1127 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1128 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1129 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1129 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1130 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1131 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1132 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1133 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1133 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1134 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1135 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1136 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1137 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1137 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1138 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1139 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1140 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1140 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1141 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1142 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1143 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1144 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1144 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1145 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1146 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1147 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1147 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1148 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1149 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1150 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1150 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1151 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1151 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1152 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1153 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1154 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1154 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1155 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1156 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1157 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1157 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1158 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1159 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1160 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1160 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1161 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1162 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1163 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1164 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1165 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1166 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1167 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1167 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1168 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1169 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1170 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1170 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1171 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1172 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1173 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1173 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1174 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1175 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1176 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1176 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1177 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1177 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1178 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1178 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1179 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1179 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1180 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1180 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1181 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1181 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1182 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1182 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1183 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1183 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1184 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1184 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1185 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1185 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1186 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1186 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1187 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1187 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1188 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1188 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1189 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1189 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1190 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1190 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1191 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1191 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1192 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1192 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1193 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1193 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1194 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1194 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1195 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1195 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1196 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1196 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1197 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1197 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1198 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1198 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1199 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1199 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1200 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1200 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1201 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1201 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1202 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1202 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1203 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1203 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1204 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1204 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1205 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1205 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1206 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1206 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1207 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1207 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1208 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1208 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1209 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1209 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1210 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1210 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1211 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1211 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1212 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1212 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1213 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1213 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1214 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1214 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1215 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1215 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1216 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1216 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1217 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1217 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1218 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1218 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1219 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1219 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1220 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1220 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1221 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1221 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1222 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1222 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1223 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1223 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1224 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1224 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1225 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1225 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1226 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1226 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1227 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1227 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1228 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1228 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1229 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1229 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1230 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1230 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1231 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1231 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1232 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1232 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1233 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1233 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1234 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1235 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1235 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1236 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1236 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1237 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1238 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1239 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1240 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1241 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1242 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1242 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1243 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1243 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1244 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1244 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1245 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1246 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1247 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1248 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1249 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1249 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1250 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1250 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1251 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1251 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1252 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1253 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1253 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1254 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1254 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1255 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1255 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1256 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1256 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1257 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1257 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1258 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1258 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1259 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1259 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1260 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1260 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1261 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1261 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1262 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1262 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1263 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1263 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1264 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1264 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1265 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1266 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1267 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1268 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1269 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1269 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1270 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1270 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1271 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1271 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1272 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1273 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1273 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1274 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1275 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1276 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1276 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1277 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1277 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1278 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1278 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1279 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1280 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1281 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1282 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1283 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1284 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1284 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1285 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1285 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1286 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1286 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1287 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1288 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1289 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1290 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1291 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1291 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1292 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1292 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1293 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1293 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1294 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1295 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1296 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1297 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1298 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1298 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1299 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1299 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1300 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1300 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1301 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1302 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1302 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1303 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1303 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1304 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1304 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1305 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1305 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1306 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1306 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1307 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1307 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1308 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1308 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1309 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1309 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1310 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1310 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1311 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1311 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1312 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1312 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1313 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1313 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1314 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1314 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1315 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1315 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1316 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1316 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1317 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1318 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1318 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1319 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1319 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1320 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1320 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1321 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1322 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1323 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1324 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1325 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1325 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1326 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1326 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1327 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1327 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1328 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1329 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1330 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1331 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1332 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1333 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1333 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1334 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1334 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1335 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1335 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1336 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1337 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1338 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1339 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1339 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1340 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1340 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1341 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1341 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1342 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1342 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1343 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1343 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1344 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1344 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1345 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1345 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1346 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1346 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1347 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1347 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1348 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1348 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1349 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1349 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1350 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1350 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1351 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1351 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1352 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1352 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1353 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1353 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1354 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1354 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1355 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1355 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1356 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1356 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1357 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1357 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1358 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1358 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1359 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1359 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1360 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1360 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1361 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1362 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1363 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1363 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1364 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1364 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1365 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1365 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1366 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1367 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1368 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1369 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1369 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1370 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1371 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1372 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1373 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1374 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1374 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1375 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1376 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1377 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1378 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1378 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1379 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1380 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1381 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1381 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1382 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1382 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1383 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1384 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1385 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1385 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1386 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1387 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1388 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1388 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1389 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1389 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1390 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1391 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1392 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1392 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1393 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1393 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1394 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1394 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1395 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1395 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1396 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1396 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1397 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1397 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1398 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1398 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1399 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1399 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1400 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1400 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1401 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1401 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1402 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1402 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1403 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1403 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1404 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1404 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1405 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1405 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1406 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1406 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1407 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1407 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1408 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1408 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1409 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1409 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1410 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1410 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1411 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1411 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1412 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1412 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1413 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1413 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1414 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1414 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1415 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1415 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1416 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1416 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1417 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1417 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1418 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1418 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1419 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1419 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1420 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1420 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1421 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1421 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1422 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1422 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1423 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1423 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1424 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1424 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1425 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1425 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1426 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1426 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1427 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1427 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1428 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1428 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1429 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1429 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1430 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1430 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1431 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1432 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1432 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1433 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1433 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1434 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1434 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1435 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1436 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1436 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1437 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1437 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1438 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1439 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1440 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1440 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1441 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1441 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1442 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1443 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1444 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1444 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1445 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1446 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1447 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1447 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1448 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1448 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1449 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1450 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1451 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1451 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1452 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1452 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1453 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1454 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1455 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1455 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1456 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1456 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1457 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1458 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1459 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1459 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1460 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1461 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1462 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1462 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1463 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1464 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1465 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1466 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1466 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1467 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1468 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1469 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1470 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1470 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1471 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1472 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1473 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1473 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1474 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1475 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1476 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1477 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1477 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1478 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1479 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1480 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1480 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1481 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1482 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1483 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1484 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1484 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1485 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1486 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1487 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1488 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1488 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1489 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1490 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1491 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1491 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1492 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1493 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1494 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1495 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1495 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1496 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1497 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1498 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1498 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1499 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1500 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1501 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1502 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1502 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1503 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1504 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1505 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1506 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1506 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1507 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1508 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1509 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1509 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1510 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1511 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1512 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1513 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1513 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1514 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1515 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1516 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1516 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1517 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1518 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1519 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1520 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1520 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1521 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1522 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1523 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1523 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1524 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1525 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1526 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1527 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1527 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1528 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1529 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1530 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1531 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1531 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1532 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1533 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1534 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1534 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1535 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1536 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1537 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1538 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1538 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1539 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1540 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1541 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1541 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1542 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1543 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1544 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1545 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1545 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1546 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1547 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1548 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1548 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1549 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1549 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1550 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1551 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1552 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1552 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1553 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1554 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1555 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1556 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1556 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1557 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1558 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1559 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1559 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1560 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1561 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1562 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1562 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1563 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1563 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1564 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1565 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1566 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1566 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1567 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1567 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1568 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1569 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1570 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1571 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1571 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1572 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1572 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1573 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1573 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1574 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1574 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1575 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1576 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1577 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1577 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1578 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1579 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1579 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1580 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1581 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1581 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1582 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1583 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1584 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1585 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1586 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1586 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1587 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1587 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1588 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1589 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1590 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1591 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1592 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1593 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1593 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1594 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1594 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1595 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1596 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1597 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1597 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1598 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1599 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1600 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1600 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1601 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1601 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1602 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1603 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1604 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1605 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1606 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1607 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1608 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1609 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1610 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1611 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1611 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1612 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1613 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1614 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1615 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1616 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1617 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1618 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1619 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1620 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1621 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1621 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1622 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1623 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1623 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1624 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1625 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1626 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1627 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1628 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1628 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1629 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1630 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1630 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1631 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1632 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1633 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1634 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1635 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1635 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1636 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1636 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1637 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1638 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1639 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1640 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1640 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1641 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1642 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1642 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1643 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1643 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1644 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1645 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1646 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1647 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1648 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1649 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1649 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1650 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1650 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1651 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1652 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1653 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1654 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1655 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1656 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1657 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1657 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1658 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1659 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1659 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1660 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1661 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1662 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1663 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1664 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1665 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1666 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1667 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1668 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1669 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1670 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1670 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1671 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1671 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1672 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1673 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1674 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1675 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1676 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1677 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1677 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1678 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1678 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1679 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1680 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1681 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1682 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1683 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1684 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1684 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1685 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1685 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1686 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1686 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1687 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1688 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1689 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1690 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1691 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1691 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1692 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1692 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1693 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1694 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1695 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1695 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1696 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1697 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1698 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1698 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1699 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1699 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1700 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1700 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1701 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1701 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1702 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1703 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1703 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1704 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1705 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1706 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1706 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1707 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1707 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1708 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1708 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1709 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1710 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1711 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1712 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1713 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1714 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1715 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1715 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1716 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1716 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1717 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1717 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1718 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1719 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1719 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1720 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1721 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1721 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1722 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1722 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1723 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1724 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1724 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1725 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1726 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1726 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1727 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1727 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1728 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1729 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1729 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1730 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1731 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1732 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1733 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1733 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1734 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1735 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1736 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1736 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1737 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1738 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1739 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1739 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1740 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1740 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1741 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1742 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1743 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1743 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1744 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1744 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1745 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1746 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1747 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1747 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1748 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1749 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1750 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1751 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1751 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1752 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1753 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1754 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1754 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1755 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1756 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1757 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1758 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1758 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1759 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1760 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1761 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1761 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1762 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1763 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1764 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1765 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1765 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1766 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1767 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1768 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1768 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1769 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1770 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1771 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1772 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1772 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1773 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1774 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1775 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1775 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1776 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1777 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1778 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1779 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1779 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1780 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1781 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1782 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1782 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1783 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1784 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1784 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1785 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1786 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1786 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1787 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1788 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1789 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1789 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1790 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1791 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1792 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1793 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1793 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1794 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1795 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1796 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1796 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1797 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1798 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1799 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1800 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1800 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1801 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1802 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1803 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1803 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1804 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1804 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1805 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1805 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1806 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1806 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1807 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1807 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1808 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1809 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1810 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1810 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1811 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1811 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1812 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1813 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1814 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1814 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1815 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1815 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1816 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1817 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1817 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1818 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1818 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1819 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1820 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1821 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1821 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1822 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1822 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1823 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1824 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1825 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1825 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1826 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1827 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1828 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1829 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1829 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1830 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1831 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1832 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1832 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1833 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1834 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1835 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1836 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1836 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1837 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1838 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1839 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1839 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1840 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1840 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1841 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1842 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1843 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1843 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1844 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1845 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1846 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1846 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1847 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1847 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1848 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1849 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1850 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1850 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1851 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1851 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1852 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1853 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1853 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1854 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1855 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1856 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1856 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1857 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1857 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1858 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1859 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1860 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1860 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1861 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1862 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1862 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1863 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1863 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1864 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1864 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1865 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1866 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1866 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1867 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1867 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1868 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1868 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1869 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1870 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1870 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1871 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1871 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1872 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1873 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1873 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1874 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1875 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1875 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1876 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1877 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1877 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1878 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1878 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1879 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1879 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1880 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1881 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1881 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1882 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1882 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1883 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1883 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1884 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1885 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1885 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1886 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1887 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1888 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1889 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1889 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1890 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1890 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1891 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1891 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1892 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1892 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1893 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1893 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1894 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1894 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1895 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1895 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1896 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1896 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1897 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1897 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1898 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1898 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1899 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1899 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1900 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1900 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1901 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1901 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1902 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1902 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1903 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1903 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1904 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1904 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1905 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1905 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1906 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1906 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1907 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1907 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1908 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1908 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1909 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1909 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1910 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1910 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1911 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1911 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1912 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1912 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1913 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1913 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1914 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1914 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1915 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1915 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1916 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1916 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1917 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1917 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1918 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1918 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1919 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1919 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1920 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1920 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1921 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1921 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1922 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1922 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1923 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1923 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1924 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1924 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1925 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1925 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1926 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1926 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1927 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1927 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1928 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1928 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1929 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1929 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1930 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1930 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1931 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1931 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1932 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1932 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1933 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1933 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1934 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1934 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1935 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1935 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1936 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1936 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1937 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1937 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1938 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1938 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1939 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1939 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1940 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1940 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1941 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1941 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1942 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1942 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1943 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1943 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1944 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1944 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1945 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1945 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1946 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1946 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1947 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1947 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1948 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1948 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1949 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1949 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1950 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1950 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1951 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1951 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1952 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1952 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1953 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1953 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1954 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1954 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1955 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1955 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1956 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1956 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1957 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1957 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1958 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1958 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1959 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1959 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1960 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1961 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1962 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1963 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1963 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1964 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1964 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1965 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1965 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1966 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1966 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1967 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1968 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1968 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1969 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1970 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1971 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1972 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1973 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1974 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1975 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1976 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1977 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1978 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1979 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1979 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1980 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1980 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1981 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1982 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1983 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1984 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1985 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1986 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1986 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1987 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1988 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1989 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1990 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1991 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1992 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1993 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1993 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1994 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1995 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1996 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1996 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1997 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1998 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1999 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2000 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2000 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2001 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2001 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2002 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2003 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2004 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2005 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2006 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2007 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2008 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2009 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2010 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2010 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2011 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2012 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2013 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2013 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2014 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2015 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2016 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2017 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2018 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2019 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2020 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2021 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2022 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2022 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2023 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2024 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2025 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2026 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2027 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2028 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2028 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2029 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2029 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2030 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2031 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2032 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2033 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2034 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2035 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2035 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2036 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2037 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2038 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2039 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2039 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2040 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2041 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2042 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2042 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2043 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2043 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2044 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2044 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2045 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2046 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2047 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2048 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2049 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2049 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2050 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2050 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2051 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2051 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2052 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2053 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2054 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2055 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2055 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2056 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2057 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2058 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2058 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2059 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2059 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2060 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2060 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2061 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2061 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2062 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2062 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2063 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2063 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2064 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2064 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2065 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2065 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2066 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2066 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2067 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2067 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2068 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2068 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2069 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2069 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2070 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2070 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2071 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2071 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2072 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2072 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2073 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2073 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2074 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2074 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2075 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2075 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2076 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2076 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2077 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2077 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2078 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2078 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2079 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2079 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2080 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2080 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2081 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2081 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2082 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2082 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2083 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2083 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2084 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2084 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2085 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2085 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2086 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2086 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2087 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2088 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2088 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2089 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2089 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2090 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2091 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2091 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2092 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2093 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2093 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2094 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2095 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2095 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2096 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2096 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2097 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2097 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2098 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2098 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2099 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2099 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2100 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2101 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2101 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2102 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2102 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2103 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2103 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2104 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2104 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2105 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2105 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2106 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2107 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2107 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2108 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2108 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2109 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2110 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2110 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2111 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2112 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2112 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2113 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2114 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2115 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2115 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2116 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2117 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2118 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2119 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2119 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2120 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2121 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2122 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2122 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2123 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2124 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2125 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2126 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2126 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2127 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2128 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2129 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2130 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2130 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2131 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2132 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2133 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2133 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2134 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2135 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2136 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2137 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2137 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2138 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2139 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2140 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2140 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2141 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2142 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2143 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2144 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2144 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2145 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2146 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2147 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2147 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2148 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2149 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2150 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2151 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2151 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2152 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2153 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2154 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2154 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2155 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2156 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2157 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2158 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2158 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2159 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2160 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2161 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2161 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2162 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2163 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2164 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2165 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2165 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2166 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2167 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2168 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2168 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2169 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2170 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2171 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2172 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2172 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2173 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2174 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2175 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2175 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2176 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2177 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2178 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2178 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2179 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2179 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2180 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2181 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2182 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2182 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2183 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2184 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2184 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2185 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2186 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2186 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2187 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2188 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2189 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2189 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2190 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2191 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2192 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2193 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2193 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2194 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2195 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2196 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2196 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2197 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2197 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2198 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2199 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2199 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2200 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2200 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2201 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2201 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2202 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2203 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2203 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2204 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2205 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2205 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2206 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2207 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2207 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2208 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2208 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2209 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2210 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2210 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2211 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2212 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2212 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2213 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2214 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2214 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2215 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2215 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2216 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2216 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2217 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2218 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2218 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2219 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2219 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2220 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2220 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2221 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2221 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2222 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2223 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2223 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2224 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2224 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2225 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2226 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2226 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2227 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2227 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2228 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2228 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2229 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2230 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2230 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2231 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2231 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2232 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2233 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2234 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2234 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2235 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2235 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2236 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2236 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2237 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2237 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2238 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2238 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2239 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2239 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2240 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2240 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2241 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2241 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2242 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2242 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2243 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2243 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2244 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2244 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2245 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2245 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2246 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2246 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2247 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2247 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2248 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2248 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2249 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2249 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2250 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2250 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2251 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2251 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2252 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2252 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2253 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2253 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2254 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2254 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2255 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2255 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2256 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2256 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2257 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2257 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2258 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2258 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2259 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2259 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2260 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2260 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2261 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2261 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2262 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2262 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2263 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2263 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2264 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2264 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2265 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2265 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2266 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2266 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2267 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2267 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2268 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2268 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2269 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2269 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2270 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2270 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2271 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2271 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2272 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2272 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2273 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2273 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2274 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2274 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2275 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2275 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2276 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2276 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2277 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2277 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2278 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2278 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2279 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2279 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2280 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2280 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2281 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2281 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2282 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2282 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2283 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2283 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2284 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2284 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2285 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2285 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2286 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2286 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2287 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2287 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2288 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2288 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2289 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2289 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2290 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2290 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2291 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2291 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2292 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2292 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2293 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2293 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2294 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2294 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2295 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2295 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2296 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2296 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2297 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2297 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2298 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2298 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2299 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2299 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2300 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2300 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2301 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2301 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2302 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2302 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2303 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2303 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2304 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2304 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2305 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2305 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2306 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2306 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2307 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2307 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2308 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2308 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2309 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2309 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2310 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2310 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2311 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2311 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2312 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2312 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2313 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2313 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2314 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2314 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2315 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2315 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2316 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2316 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2317 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2317 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2318 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2318 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2319 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2319 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2320 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2320 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2321 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2321 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2322 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2322 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2323 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2323 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2324 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2324 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2325 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2325 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2326 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2326 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2327 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2327 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2328 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2328 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2329 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2329 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2330 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2330 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2331 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2331 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2332 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2332 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2333 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2333 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2334 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2334 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2335 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2335 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2336 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2336 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2337 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2337 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2338 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2338 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2339 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2339 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2340 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2340 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2341 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2341 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2342 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2342 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2343 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2344 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2344 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2345 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2345 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2346 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2347 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2348 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2348 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2349 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2349 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2350 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2351 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2351 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2352 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2352 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2353 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2353 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2354 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2355 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2355 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2356 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2356 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2357 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2357 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2358 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2358 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2359 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2360 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2360 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2361 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2361 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2362 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2362 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2363 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2363 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2364 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2364 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2365 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2365 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2366 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2366 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2367 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2367 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2368 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2368 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2369 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2369 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2370 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2370 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2371 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2371 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2372 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2372 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2373 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2374 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2374 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2375 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2376 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2376 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2377 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2378 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2378 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2379 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2379 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2380 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2381 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2381 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2382 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2382 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2383 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2383 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2384 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2385 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2385 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2386 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2387 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2387 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2388 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2388 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2389 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2389 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2390 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2390 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2391 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2392 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2392 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2393 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2393 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2394 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2394 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2395 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2395 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2396 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2396 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2397 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2397 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2398 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2398 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2399 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2399 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2400 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2400 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2401 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2401 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2402 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2402 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2403 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2403 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2404 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2404 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2405 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2405 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2406 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2406 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2407 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2407 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2408 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2408 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2409 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2409 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2410 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2410 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2411 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2411 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2412 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2412 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2413 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2413 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2414 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2414 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2415 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2415 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2416 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2416 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2417 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2417 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2418 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2418 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2419 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2419 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2420 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2420 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2421 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2421 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2422 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2422 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2423 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2423 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2424 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2424 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2425 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2425 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2426 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2426 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2427 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2427 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2428 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2428 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2429 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2429 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2430 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2430 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2431 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2432 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2432 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2433 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2433 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2434 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2434 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2435 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2436 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2436 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2437 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2437 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2438 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2439 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2440 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2440 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2441 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2441 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2442 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2443 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2443 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2444 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2444 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2445 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2446 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2447 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2447 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2448 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2448 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2449 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2450 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2450 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2451 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2451 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2452 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2452 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2453 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2454 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2455 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2455 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2456 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2456 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2457 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2457 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2458 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2459 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2460 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2460 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2461 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2462 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2463 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2464 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2464 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2465 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2466 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2467 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2467 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2468 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2469 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2470 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2470 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2471 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2472 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2473 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2474 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2474 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2475 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2476 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2477 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2477 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2478 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2479 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2480 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2481 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2481 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2482 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2483 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2484 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2484 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2485 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2486 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2487 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2487 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2488 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2489 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2490 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2491 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2491 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2492 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2493 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2494 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2494 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2495 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2496 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2497 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2497 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2498 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2499 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2500 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2501 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2501 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2502 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2503 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2504 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2504 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2505 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2506 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2507 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2508 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2509 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2510 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2511 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2511 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2512 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2513 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2514 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2514 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2515 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2516 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2517 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2518 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2518 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2519 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2520 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2521 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2521 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2522 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2523 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2524 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2525 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2526 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2527 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2528 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2528 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2529 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2530 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2531 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2531 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2532 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2533 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2534 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2535 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2535 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2536 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2537 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2538 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2538 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2539 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2540 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2541 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2541 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2542 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2543 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2544 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2545 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2545 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2546 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2547 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2548 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2548 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2549 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2549 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2550 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2550 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2551 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2551 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2552 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2552 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2553 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2553 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2554 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2554 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2555 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2555 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2556 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2556 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2557 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2557 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2558 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2558 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2559 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2559 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2560 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2560 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2561 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2561 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2562 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2562 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2563 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2563 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2564 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2564 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2565 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2565 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2566 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2566 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2567 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2567 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2568 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2569 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2570 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2571 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2571 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2572 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2572 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2573 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2573 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2574 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2574 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2575 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2575 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2576 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2577 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2578 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2579 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2580 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2581 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2582 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2583 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2584 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2585 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2586 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2586 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2587 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2588 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2589 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2590 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2591 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2592 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2593 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2594 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2595 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2596 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2597 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2598 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2598 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2599 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2600 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2601 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2601 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2602 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2603 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2604 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2605 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2606 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2607 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2608 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2609 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2610 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2610 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2611 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2612 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2613 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2614 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2615 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2616 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2617 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2618 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2619 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2620 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2621 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2621 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2622 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2622 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2623 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2623 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2624 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2625 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2626 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2627 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2628 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2628 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2629 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2629 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2630 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2630 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2631 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2631 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2632 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2633 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2634 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2635 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2636 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2637 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2638 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2639 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2640 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2641 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2642 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2642 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2643 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2644 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2645 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2646 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2647 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2648 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2649 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2650 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2650 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2651 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2652 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2653 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2654 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2654 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2655 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2656 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2657 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2658 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2659 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2660 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2661 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2662 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2663 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2664 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2665 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2666 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2666 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2667 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2668 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2669 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2670 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2670 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2671 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2671 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2672 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2672 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2673 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2674 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2675 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2676 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2677 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2677 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2678 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2678 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2679 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2679 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2680 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2681 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2682 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2683 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2684 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2685 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2686 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2686 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2687 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2687 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2688 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2689 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2690 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2691 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2691 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2692 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2692 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2693 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2694 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2695 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2696 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2697 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2698 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2698 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2699 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2699 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2700 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2700 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2701 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2701 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2702 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2703 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2704 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2705 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2706 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2706 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2707 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2707 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2708 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2708 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2709 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2710 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2710 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2711 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2712 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2713 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2714 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2715 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2715 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2716 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2716 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2717 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2717 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2718 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2718 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2719 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2719 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2720 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2720 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2721 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2721 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2722 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2722 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2723 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2723 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2724 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2724 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2725 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2725 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2726 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2726 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2727 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2727 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2728 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2728 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2729 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2729 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2730 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2730 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2731 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2731 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2732 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2732 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2733 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2733 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2734 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2734 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2735 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2735 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2736 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2736 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2737 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2737 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2738 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2738 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2739 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2739 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2740 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2740 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2741 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2741 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2742 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2742 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2743 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2743 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2744 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2745 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2746 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2747 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2747 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2748 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2748 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2749 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2750 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2751 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2751 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2752 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2753 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2754 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2754 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2755 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2755 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2756 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2757 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2758 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2758 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2759 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2760 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2761 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2762 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2762 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2763 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2764 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2765 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2765 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2766 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2767 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2768 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2768 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2769 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2770 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2771 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2771 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2772 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2773 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2774 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2775 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2776 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2777 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2778 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2778 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2779 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2780 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2781 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2781 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2782 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2783 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2784 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2784 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2785 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2786 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2787 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2788 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2788 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2789 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2790 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2791 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2791 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2792 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2793 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2794 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2794 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2795 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2796 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2797 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2798 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2798 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2799 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2800 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2801 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2801 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2802 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2803 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2803 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2804 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2805 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2805 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2806 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2806 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2807 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2807 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2808 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2808 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2809 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2810 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2810 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2811 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2812 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2812 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2813 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2814 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2814 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2815 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2815 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2816 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2817 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2817 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2818 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2818 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2819 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2819 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2820 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2821 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2821 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2822 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2822 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2823 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2824 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2825 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2825 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2826 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2827 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2828 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2829 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2829 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2830 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2831 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2832 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2832 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2833 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2834 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2835 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2836 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2836 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2837 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2838 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2839 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2839 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2840 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2840 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2841 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2842 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2843 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2843 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2844 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2845 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2846 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2846 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2847 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2847 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2848 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2849 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2850 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2850 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2851 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2851 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2852 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2853 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2853 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2854 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2855 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2856 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2856 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2857 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2858 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2859 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2860 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2860 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2861 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2862 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2862 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2863 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2863 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2864 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2864 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2865 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2866 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2866 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2867 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2867 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2868 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2869 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2870 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2870 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2871 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2871 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2872 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2873 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2873 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2874 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2875 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2875 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2876 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2876 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2877 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2877 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2878 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2879 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2879 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2880 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2880 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2881 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2881 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2882 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2883 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2883 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2884 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2885 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2885 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2886 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2887 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2888 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2889 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2890 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2890 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2891 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2891 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2892 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2892 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2893 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2893 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2894 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2894 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2895 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2895 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2896 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2896 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2897 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2897 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2898 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2898 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2899 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2899 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2900 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2900 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2901 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2901 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2902 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2902 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2903 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2903 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2904 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2904 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2905 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2905 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2906 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2906 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2907 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2907 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2908 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2908 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2909 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2909 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2910 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2910 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2911 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2911 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2912 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2912 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2913 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2913 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2914 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2914 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2915 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2915 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2916 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2916 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2917 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2917 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2918 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2918 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2919 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2919 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2920 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2920 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2921 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2921 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2922 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2922 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2923 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2923 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2924 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2924 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2925 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2925 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2926 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2926 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2927 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2927 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2928 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2928 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2929 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2929 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2930 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2930 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2931 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2931 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2932 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2932 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2933 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2933 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2934 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2934 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2935 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2935 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2936 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2936 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2937 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2937 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2938 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2938 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2939 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2939 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2940 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2940 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2941 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2941 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2942 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2942 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2943 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2943 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2944 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2944 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2945 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2945 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2946 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2946 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2947 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2947 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2948 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2948 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2949 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2949 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2950 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2950 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2951 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2951 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2952 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2952 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2953 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2953 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2954 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2954 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2955 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2955 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2956 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2956 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2957 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2957 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2958 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2958 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2959 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2959 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2960 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2961 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2962 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2962 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2963 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2963 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2964 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2964 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2965 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2965 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2966 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2966 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2967 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2968 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2969 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2969 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2970 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2971 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2972 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2972 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2973 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2973 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2974 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2975 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2976 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2977 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2978 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2979 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2980 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2981 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2982 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2983 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2983 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2984 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2985 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2986 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2987 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2988 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2989 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2990 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2991 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2992 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2993 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2994 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2995 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2995 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2996 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2997 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2998 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2999 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3000 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3001 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3001 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3002 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3003 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3004 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3005 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3006 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3007 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3007 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3008 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3009 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3010 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3011 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3012 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3013 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3013 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3014 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3014 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3015 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3015 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3016 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3017 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3018 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3019 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3020 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3021 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3021 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3022 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3022 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3023 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3024 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3025 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3026 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3027 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3028 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3028 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3029 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3029 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3030 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3031 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3032 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3033 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3034 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3035 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3035 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3036 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3037 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3038 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3039 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3040 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3040 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3041 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3042 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3042 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3043 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3043 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3044 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3044 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3045 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3046 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3047 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3048 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3049 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3049 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3050 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3050 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3051 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3051 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3052 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3052 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3053 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3054 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3055 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3056 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3057 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3058 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3058 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3059 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3059 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3060 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3060 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3061 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3061 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3062 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3062 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3063 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3063 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3064 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3064 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3065 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3065 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3066 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3066 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3067 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3067 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3068 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3068 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3069 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3069 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3070 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3070 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3071 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3071 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3072 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3072 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3073 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3073 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3074 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3074 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3075 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3075 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3076 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3076 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3077 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3077 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3078 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3078 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3079 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3079 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3080 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3080 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3081 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3081 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3082 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3082 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3083 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3083 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3084 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3084 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3085 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3085 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3086 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3086 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3087 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3088 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3088 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3089 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3089 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3090 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3091 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3091 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3092 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3093 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3093 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3094 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3095 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3096 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3096 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3097 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3097 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3098 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3099 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3099 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3100 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3101 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3101 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3102 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3103 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3103 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3104 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3104 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3105 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3106 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3106 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3107 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3107 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3108 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3108 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3109 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3110 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3110 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3111 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3112 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3112 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3113 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3113 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3114 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3115 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3115 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3116 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3116 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3117 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3118 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3119 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3120 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3120 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3121 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3122 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3123 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3123 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3124 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3125 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3126 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3126 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3127 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3128 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3129 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3130 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3130 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3131 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3132 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3133 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3133 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3134 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3135 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3136 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3137 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3138 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3139 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3140 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3140 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3141 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3142 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3143 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3143 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3144 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3145 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3146 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3147 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3147 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3148 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3149 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3150 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3150 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3151 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3152 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3153 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3153 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3154 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3155 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3156 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3157 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3157 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3158 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3159 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3160 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3160 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3161 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3162 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3163 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3164 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3164 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3165 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3166 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3167 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3167 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3168 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3169 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3170 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3171 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3172 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3173 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3174 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3174 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3175 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3176 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3177 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3177 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3178 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3178 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3179 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3180 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3181 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3181 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3182 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3182 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3183 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3184 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3184 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3185 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3186 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3187 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3188 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3188 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3189 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3189 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3190 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3191 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3191 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3192 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3193 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3193 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3194 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3195 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3196 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3197 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3197 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3198 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3198 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3199 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3199 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3200 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3201 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3201 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3202 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3203 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3203 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3204 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3205 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3205 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3206 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3207 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3207 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3208 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3208 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3209 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3210 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3211 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3212 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3212 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3213 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3214 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3215 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3215 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3216 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3216 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3217 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3218 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3219 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3219 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3220 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3220 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3221 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3222 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3223 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3223 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3224 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3225 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3226 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3226 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3227 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3227 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3228 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3229 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3230 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3230 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3231 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3231 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3232 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3233 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3233 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3234 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3235 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3235 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3236 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3236 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3237 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3238 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3239 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3240 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3241 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3242 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3242 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3243 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3243 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3244 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3244 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3245 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3245 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3246 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3247 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3248 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3249 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3249 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3250 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3250 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3251 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3251 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3252 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3253 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3253 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3254 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3254 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3255 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3255 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3256 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3256 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3257 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3257 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3258 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3258 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3259 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3259 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3260 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3260 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3261 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3261 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3262 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3262 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3263 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3263 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3264 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3264 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3265 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3266 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3267 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3268 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3269 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3269 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3270 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3270 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3271 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3271 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3272 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3273 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3273 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3274 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3275 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3276 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3276 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3277 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3277 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3278 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3278 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3279 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3280 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3281 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3282 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3283 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3284 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3284 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3285 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3285 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3286 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3287 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3288 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3289 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3290 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3291 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3291 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3292 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3292 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3293 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3293 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3294 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3295 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3296 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3297 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3298 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3298 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3299 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3299 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3300 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3300 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3301 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3302 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3302 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3303 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3303 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3304 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3304 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3305 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3305 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3306 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3306 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3307 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3307 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3308 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3308 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3309 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3309 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3310 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3310 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3311 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3311 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3312 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3312 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3313 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3313 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3314 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3314 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3315 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3315 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3316 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3316 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3317 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3318 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3318 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3319 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3319 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3320 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3320 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3321 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3322 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3323 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3324 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3325 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3325 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3326 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3326 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3327 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3327 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3328 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3329 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3330 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3330 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3331 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3332 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3333 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3333 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3334 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3334 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3335 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3335 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3336 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3337 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3338 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3339 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3340 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3340 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3341 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3341 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3342 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3342 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3343 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3343 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3344 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3344 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3345 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3345 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3346 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3346 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3347 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3347 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3348 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3348 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3349 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3349 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3350 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3350 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3351 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3351 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3352 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3352 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3353 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3353 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3354 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3354 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3355 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3355 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3356 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3356 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3357 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3357 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3358 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3358 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3359 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3359 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3360 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3360 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3361 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3362 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3363 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3363 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3364 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3364 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3365 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3365 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3366 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3367 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3368 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3369 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3369 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3370 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3371 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3372 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3372 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3373 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3373 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3374 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3374 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3375 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3375 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3376 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3376 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3377 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3377 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3378 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3378 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3379 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3379 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3380 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3380 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3381 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3381 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3382 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3382 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3383 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3383 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3384 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3384 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3385 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3385 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3386 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3386 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3387 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3387 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3388 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3388 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3389 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3389 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3390 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3390 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3391 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3391 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3392 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3393 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3394 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3394 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3395 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3396 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3396 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3397 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3398 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3398 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3399 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3400 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3400 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3401 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3401 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3402 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3402 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3403 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3403 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3404 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3405 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3405 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3406 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3406 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3407 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3407 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3408 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3408 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3409 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3410 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3411 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3411 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3412 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3413 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3413 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3414 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3414 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3415 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3416 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3417 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3418 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3418 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3419 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3420 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3420 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3421 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3421 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3422 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3423 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3424 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3425 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3426 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3427 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3428 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3429 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3430 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3430 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3431 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3432 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3432 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3433 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3433 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3434 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3434 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3435 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3436 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3436 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3437 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3437 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3438 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3439 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3440 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3440 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3441 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3441 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3442 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3443 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3444 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3444 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3445 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3446 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3447 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3447 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3448 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3448 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3449 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3450 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3451 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3451 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3452 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3452 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3453 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3454 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3455 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3455 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3456 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3456 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3457 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3458 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3458 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3459 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3460 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3461 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3462 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3462 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3463 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3464 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3465 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3465 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3466 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3467 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3468 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3469 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3469 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3470 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3471 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3472 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3473 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3473 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3474 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3475 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3476 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3476 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3477 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3478 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3479 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3480 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3480 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3481 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3482 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3483 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3484 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3485 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3486 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3487 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3487 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3488 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3489 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3490 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3490 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3491 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3492 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3493 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3494 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3494 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3495 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3496 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3497 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3497 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3498 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3499 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3500 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3501 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3501 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3502 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3503 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3504 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3505 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3506 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3507 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3508 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3508 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3509 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3510 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3511 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3511 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3512 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3513 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3514 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3515 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3515 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3516 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3517 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3518 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3518 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3519 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3520 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3521 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3522 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3523 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3524 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3525 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3525 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3526 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3527 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3528 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3528 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3529 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3530 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3531 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3532 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3532 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3533 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3534 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3535 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3535 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3536 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3537 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3538 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3538 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3539 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3540 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3541 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3542 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3542 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3543 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3544 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3545 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3545 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3546 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3547 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3548 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3548 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3549 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3549 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3550 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3551 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3552 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3552 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3553 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3554 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3555 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3555 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3556 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3556 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3557 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3558 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3559 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3559 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3560 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3561 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3562 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3562 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3563 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3563 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3564 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3565 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3566 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3566 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3567 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3567 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3568 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3568 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3569 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3569 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3570 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3570 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3571 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3571 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3572 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3572 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3573 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3573 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3574 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3574 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3575 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3575 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3576 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3576 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3577 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3578 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3579 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3580 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3581 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3582 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3583 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3584 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3585 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3586 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3586 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3587 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3588 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3589 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3590 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3591 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3592 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3593 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3594 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3595 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3596 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3597 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3598 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3598 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3599 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3600 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3601 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3601 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3602 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3602 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3603 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3603 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3604 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3605 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3606 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3607 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3608 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3609 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3610 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3611 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3612 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3613 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3613 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3614 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3615 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3616 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3617 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3618 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3619 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3620 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3621 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3621 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3622 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3623 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3624 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3625 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3625 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3626 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3627 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3628 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3628 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3629 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3630 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3631 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3632 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3633 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3634 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3635 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3636 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3637 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3637 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3638 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3639 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3640 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3641 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3642 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3643 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3644 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3645 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3646 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3647 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3648 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3649 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3649 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3650 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3650 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3651 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3651 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3652 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3652 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3653 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3654 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3655 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3656 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3656 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3657 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3658 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3658 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3659 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3659 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3660 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3661 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3662 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3663 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3664 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3665 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3666 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3667 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3668 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3669 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3670 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3670 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3671 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3671 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3672 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3673 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3674 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3675 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3676 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3677 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3677 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3678 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3679 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3680 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3681 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3682 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3682 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3683 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3684 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3685 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3686 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3686 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3687 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3688 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3689 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3690 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3691 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3691 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3692 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3692 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3693 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3694 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3694 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3695 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3696 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3697 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3698 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3698 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3699 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3699 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3700 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3700 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3701 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3701 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3702 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3703 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3704 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3705 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3706 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3706 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3707 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3707 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3708 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3708 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3709 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3710 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3711 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3712 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3713 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3714 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3714 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3715 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3715 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3716 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3716 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3717 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3717 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3718 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3718 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3719 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3719 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3720 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3720 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3721 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3721 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3722 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3722 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3723 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3723 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3724 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3724 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3725 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3725 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3726 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3726 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3727 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3727 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3728 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3728 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3729 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3729 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3730 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3730 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3731 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3731 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3732 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3732 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3733 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3733 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3734 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3734 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3735 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3735 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3736 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3736 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3737 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3737 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3738 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3738 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3739 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3739 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3740 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3740 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3741 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3741 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3742 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3742 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3743 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3743 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3744 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3744 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3745 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3745 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3746 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3746 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3747 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3747 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3748 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3748 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3749 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3749 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3750 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3750 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3751 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3751 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3752 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3752 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3753 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3753 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3754 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3754 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3755 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3755 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3756 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3756 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3757 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3757 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3758 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3758 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3759 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3759 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3760 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3760 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3761 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3761 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3762 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3762 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3763 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3763 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3764 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3764 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3765 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3765 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3766 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3766 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3767 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3767 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3768 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3768 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3769 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3769 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3770 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3770 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3771 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3771 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3772 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3772 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3773 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3774 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3775 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3776 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3776 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3777 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3778 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3779 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3779 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3780 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3781 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3782 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3783 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3783 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3784 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3784 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3785 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3786 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3786 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3787 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3788 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3789 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3790 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3790 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3791 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3792 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3793 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3793 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3794 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3795 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3796 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3797 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3797 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3798 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3799 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3800 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3800 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3801 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3802 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3802 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3803 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3803 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3804 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3805 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3805 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3806 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3806 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3807 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3807 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3808 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3809 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3809 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3810 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3810 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3811 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3812 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3812 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3813 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3814 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3814 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3815 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3815 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3816 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3817 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3817 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3818 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3818 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3819 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3819 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3820 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3821 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3821 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3822 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3822 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3823 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3824 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3825 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3825 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3826 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3827 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3828 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3829 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3829 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3830 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3831 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3832 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3832 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3833 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3834 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3835 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3836 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3836 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3837 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3838 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3839 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3839 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3840 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3840 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3841 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3842 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3843 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3843 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3844 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3845 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3846 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3846 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3847 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3847 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3848 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3849 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3850 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3850 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3851 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3851 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3852 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3853 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3853 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3854 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3855 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3856 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3856 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3857 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3858 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3859 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3860 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3860 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3861 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3862 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3862 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3863 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3863 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3864 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3864 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3865 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3866 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3866 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3867 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3867 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3868 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3869 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3870 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3870 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3871 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3871 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3872 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3873 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3873 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3874 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3875 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3875 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3876 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3877 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3877 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3878 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3879 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3879 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3880 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3880 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3881 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3881 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3882 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3883 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3883 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3884 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3885 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3885 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3886 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3887 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3888 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3889 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3890 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3890 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3891 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3891 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3892 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3892 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3893 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3893 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3894 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3894 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3895 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3895 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3896 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3896 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3897 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3897 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3898 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3898 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3899 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3899 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3900 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3900 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3901 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3901 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3902 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3902 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3903 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3903 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3904 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3904 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3905 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3905 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3906 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3906 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3907 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3907 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3908 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3908 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3909 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3909 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3910 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3910 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3911 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3911 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3912 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3912 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3913 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3913 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3914 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3914 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3915 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3915 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3916 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3916 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3917 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3917 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3918 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3918 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3919 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3919 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3920 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3920 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3921 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3921 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3922 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3922 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3923 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3923 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3924 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3924 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3925 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3925 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3926 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3926 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3927 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3927 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3928 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3928 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3929 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3929 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3930 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3930 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3931 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3931 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3932 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3932 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3933 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3933 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3934 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3934 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3935 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3935 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3936 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3936 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3937 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3937 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3938 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3938 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3939 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3939 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3940 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3940 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3941 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3941 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3942 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3942 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3943 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3943 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3944 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3944 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3945 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3945 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3946 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3946 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3947 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3947 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3948 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3948 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3949 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3949 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3950 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3950 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3951 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3951 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3952 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3952 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3953 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3953 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3954 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3954 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3955 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3955 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3956 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3956 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3957 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3957 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3958 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3958 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3959 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3959 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3960 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3960 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3961 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3961 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3962 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3962 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3963 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3963 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3964 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3964 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3965 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3965 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3966 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3966 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3967 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3967 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3968 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3968 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3969 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3970 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3971 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3972 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3973 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3974 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3975 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3976 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3977 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3978 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3979 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3979 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3980 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3981 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3982 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3983 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3984 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3985 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3986 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3987 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3988 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3989 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3990 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3991 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3991 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3992 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3993 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3994 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3994 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3995 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3995 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3996 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3997 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3998 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3999 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4000 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4001 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4001 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4002 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4002 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4003 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4004 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4005 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4006 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4007 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4008 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4009 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4010 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4011 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4012 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4013 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4013 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4014 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4015 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4016 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4017 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4018 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4019 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4020 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4021 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4022 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4023 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4024 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4025 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4025 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4026 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4027 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4028 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4029 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4029 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4030 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4031 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4032 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4033 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4034 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4035 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4035 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4036 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4037 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4037 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4038 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4039 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4040 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4041 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4042 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4042 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4043 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4043 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4044 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4044 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4045 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4046 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4047 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4048 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4049 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4049 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4050 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4050 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4051 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4051 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4052 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4053 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4054 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4055 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4056 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4057 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4058 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4058 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4059 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4059 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4060 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4060 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4061 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4061 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4062 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4062 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4063 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4063 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4064 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4064 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4065 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4065 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4066 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4066 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4067 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4067 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4068 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4068 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4069 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4069 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4070 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4070 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4071 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4071 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4072 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4072 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4073 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4073 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4074 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4074 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4075 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4075 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4076 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4076 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4077 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4077 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4078 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4078 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4079 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4079 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4080 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4080 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4081 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4081 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4082 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4082 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4083 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4083 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4084 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4084 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4085 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4085 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4086 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4086 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4087 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4087 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4088 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4088 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4089 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4089 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4090 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4090 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4091 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4091 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4092 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4092 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4093 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4093 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4094 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4094 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4095 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4095 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4096 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4096 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4097 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4097 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4098 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4098 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4099 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4099 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4100 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4100 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4101 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4101 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4102 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4102 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4103 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4103 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4104 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4104 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4105 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4105 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4106 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4106 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4107 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4107 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4108 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4108 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4109 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4109 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4110 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4110 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4111 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4111 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4112 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4112 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4113 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4113 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4114 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4114 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4115 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4115 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4116 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4117 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4118 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4118 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4119 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4120 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4121 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4121 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4122 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4123 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4124 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4124 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4125 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4126 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4127 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4128 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4128 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4129 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4130 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4131 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4131 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4132 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4133 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4134 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4134 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4135 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4136 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4137 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4138 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4138 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4139 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4140 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4141 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4141 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4142 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4143 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4144 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4144 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4145 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4146 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4147 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4148 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4148 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4149 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4150 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4151 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4151 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4152 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4153 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4154 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4154 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4155 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4156 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4157 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4158 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4158 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4159 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4160 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4161 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4161 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4162 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4163 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4164 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4165 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4165 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4166 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4167 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4168 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4168 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4169 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4170 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4171 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4172 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4172 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4173 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4174 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4175 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4175 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4176 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4177 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4178 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4178 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4179 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4180 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4181 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4182 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4182 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4183 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4184 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4184 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4185 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4185 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4186 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4187 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4188 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4189 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4189 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4190 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4191 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4192 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4192 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4193 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4193 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4194 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4195 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4196 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4196 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4197 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4197 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4198 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4199 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4199 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4200 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4201 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4201 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4202 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4203 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4203 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4204 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4205 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4205 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4206 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4206 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4207 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4207 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4208 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4208 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4209 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4209 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4210 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4211 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4212 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4212 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4213 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4214 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4215 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4215 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4216 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4216 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4217 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4218 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4219 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4219 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4220 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4220 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4221 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4222 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4223 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4223 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4224 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4225 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4226 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4226 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4227 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4227 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4228 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4229 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4229 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4230 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4230 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4231 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4231 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4232 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4233 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4233 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4234 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4234 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4235 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4235 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4236 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4236 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4237 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4237 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4238 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4238 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4239 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4239 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4240 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4240 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4241 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4241 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4242 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4242 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4243 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4243 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4244 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4244 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4245 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4245 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4246 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4246 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4247 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4247 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4248 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4248 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4249 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4249 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4250 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4250 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4251 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4251 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4252 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4252 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4253 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4253 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4254 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4254 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4255 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4255 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4256 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4256 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4257 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4257 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4258 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4258 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4259 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4259 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4260 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4260 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4261 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4261 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4262 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4262 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4263 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4263 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4264 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4264 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4265 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4265 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4266 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4266 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4267 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4267 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4268 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4268 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4269 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4269 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4270 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4270 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4271 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4271 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4272 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4272 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4273 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4273 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4274 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4274 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4275 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4275 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4276 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4276 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4277 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4277 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4278 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4278 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4279 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4279 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4280 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4280 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4281 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4281 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4282 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4282 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4283 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4283 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4284 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4284 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4285 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4285 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4286 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4286 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4287 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4287 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4288 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4288 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4289 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4289 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4290 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4290 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4291 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4291 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4292 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4292 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4293 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4293 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4294 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4294 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4295 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4295 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4296 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4296 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4297 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4297 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4298 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4298 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4299 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4299 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4300 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4300 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4301 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4301 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4302 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4302 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4303 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4303 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4304 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4304 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4305 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4305 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4306 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4306 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4307 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4307 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4308 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4308 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4309 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4309 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4310 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4310 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4311 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4311 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4312 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4312 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4313 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4313 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4314 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4314 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4315 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4315 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4316 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4316 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4317 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4317 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4318 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4318 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4319 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4319 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4320 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4320 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4321 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4321 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4322 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4322 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4323 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4323 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4324 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4324 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4325 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4325 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4326 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4326 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4327 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4327 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4328 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4328 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4329 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4329 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4330 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4330 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4331 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4331 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4332 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4332 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4333 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4333 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4334 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4334 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4335 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4335 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4336 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4336 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4337 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4337 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4338 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4338 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4339 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4339 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4340 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4340 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4341 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4341 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4342 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4342 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4343 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4344 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4344 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4345 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4345 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4346 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4347 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4347 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4348 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4349 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4349 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4350 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4350 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4351 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4352 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4352 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4353 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4353 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4354 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4355 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4356 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4356 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4357 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4357 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4358 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4359 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4360 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4360 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4361 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4362 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4363 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4363 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4364 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4364 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4365 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4365 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4366 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4367 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4368 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4369 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4369 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4370 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4371 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4372 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4372 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4373 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4373 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4374 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4374 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4375 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4375 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4376 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4376 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4377 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4377 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4378 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4378 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4379 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4379 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4380 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4380 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4381 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4381 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4382 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4382 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4383 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4383 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4384 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4384 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4385 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4385 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4386 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4386 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4387 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4387 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4388 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4388 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4389 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4389 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4390 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4390 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4391 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4391 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4392 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4393 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4394 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4394 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4395 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4396 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4396 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4397 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4398 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4399 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4400 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4400 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4401 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4401 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4402 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4402 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4403 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4403 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4404 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4405 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4405 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4406 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4406 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4407 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4407 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4408 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4408 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4409 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4410 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4411 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4412 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4413 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4413 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4414 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4414 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4415 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4416 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4417 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4418 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4418 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4419 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4420 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4420 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4421 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4421 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4422 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4423 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4424 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4425 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4426 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4426 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4427 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4428 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4429 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4430 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4430 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4431 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4431 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4432 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4432 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4433 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4433 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4434 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4434 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4435 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4435 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4436 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4436 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4437 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4437 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4438 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4438 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4439 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4439 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4440 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4440 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4441 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4441 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4442 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4442 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4443 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4443 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4444 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4444 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4445 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4445 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4446 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4446 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4447 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4447 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4448 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4448 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4449 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4449 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4450 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4450 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4451 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4451 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4452 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4452 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4453 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4453 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4454 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4454 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4455 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4455 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4456 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4456 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4457 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4457 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4458 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4458 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4459 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4460 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4460 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4461 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4462 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4463 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4463 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4464 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4465 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4466 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4466 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4467 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4468 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4469 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4470 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4470 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4471 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4472 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4473 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4473 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4474 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4475 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4476 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4476 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4477 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4478 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4479 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4480 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4481 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4482 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4483 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4483 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4484 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4485 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4486 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4486 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4487 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4488 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4489 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4490 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4491 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4492 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4493 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4493 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4494 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4495 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4496 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4496 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4497 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4498 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4499 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4499 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4500 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4501 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4502 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4503 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4503 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4504 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4505 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4506 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4506 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4507 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4508 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4509 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4509 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4510 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4511 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4512 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4513 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4513 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4514 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4515 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4516 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4516 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4517 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4518 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4519 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4519 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4520 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4521 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4522 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4523 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4523 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4524 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4525 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4526 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4526 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4527 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4528 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4529 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4529 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4530 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4531 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4532 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4533 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4533 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4534 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4535 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4536 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4536 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4537 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4538 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4539 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4539 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4540 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4541 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4542 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4542 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4543 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4544 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4545 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4545 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4546 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4546 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4547 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4548 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4548 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4549 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4549 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4550 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4551 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4552 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4552 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4553 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4554 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4555 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4556 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4556 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4557 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4558 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4559 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4559 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4560 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4561 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4562 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4562 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4563 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4563 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4564 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4565 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4565 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4566 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4566 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4567 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4567 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4568 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4568 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4569 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4569 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4570 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4570 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4571 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4571 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4572 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4572 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4573 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4573 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4574 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4574 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4575 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4575 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4576 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4576 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4577 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4577 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4578 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4578 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4579 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4579 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4580 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4580 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4581 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4581 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4582 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4582 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4583 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4583 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4584 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4584 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4585 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4585 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4586 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4586 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4587 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4587 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4588 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4588 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4589 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4589 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4590 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4590 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4591 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4591 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4592 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4592 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4593 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4593 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4594 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4594 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4595 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4595 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4596 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4596 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4597 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4597 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4598 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4598 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4599 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4599 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4600 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4600 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4601 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4601 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4602 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4602 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4603 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4603 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4604 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4604 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4605 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4605 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4606 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4606 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4607 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4607 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4608 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4608 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4609 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4609 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4610 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4610 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4611 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4611 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4612 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4612 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4613 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4613 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4614 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4614 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4615 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4615 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4616 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4616 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4617 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4617 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4618 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4618 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4619 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4619 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4620 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4620 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4621 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4621 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4622 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4622 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4623 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4623 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4624 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4624 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4625 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4625 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4626 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4626 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4627 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4627 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4628 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4628 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4629 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4629 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4630 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4630 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4631 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4631 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4632 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4632 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4633 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4633 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4634 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4634 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4635 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4635 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4636 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4636 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4637 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4637 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4638 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4638 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4639 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4639 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4640 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4640 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4641 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4641 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4642 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4642 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4643 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4643 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4644 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4644 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4645 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4645 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4646 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4646 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4647 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4647 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4648 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4648 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4649 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4649 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4650 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4650 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4651 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4651 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4652 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4652 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4653 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4653 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4654 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4654 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4655 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4655 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4656 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4656 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4657 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4657 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4658 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4658 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4659 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4659 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4660 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4660 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4661 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4661 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4662 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4662 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4663 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4663 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4664 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4664 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4665 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4665 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4666 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4666 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4667 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4667 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4668 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4668 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4669 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4669 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4670 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4670 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4671 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4671 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4672 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4672 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4673 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4673 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4674 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4674 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4675 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4675 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4676 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4676 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4677 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4677 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4678 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4678 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4679 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4679 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4680 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4680 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4681 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4681 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4682 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4682 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4683 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4683 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4684 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4684 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4685 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4685 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4686 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4686 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4687 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4687 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4688 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4688 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4689 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4689 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4690 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4690 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4691 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4691 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4692 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4692 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4693 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4693 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4694 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4694 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4695 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4695 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4696 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4696 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4697 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4697 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4698 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4698 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4699 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4699 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4700 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4700 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4701 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4701 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4702 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4702 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4703 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4703 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4704 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4704 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4705 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4705 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4706 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4706 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4707 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4707 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4708 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4708 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4709 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4709 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4710 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4710 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4711 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4711 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4712 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4712 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4713 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4713 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4714 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4714 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4715 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4716 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4716 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4717 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4717 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4718 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4719 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4719 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4720 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4721 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4721 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4722 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4723 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4724 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4724 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4725 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4726 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4727 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4727 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4728 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4729 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4729 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4730 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4730 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4731 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4732 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4733 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4733 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4734 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4734 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4735 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4736 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4736 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4737 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4737 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4738 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4739 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4739 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4740 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4740 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4741 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4742 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4743 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4743 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4744 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4744 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4745 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4746 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4747 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4747 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4748 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4749 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4750 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4750 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4751 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4752 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4753 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4754 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4754 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4755 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4756 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4757 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4757 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4758 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4759 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4760 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4760 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4761 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4762 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4763 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4764 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4764 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4765 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4766 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4767 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4767 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4768 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4769 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4770 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4770 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4771 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4772 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4773 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4774 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4774 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4775 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4776 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4777 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4777 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4778 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4779 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4780 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4780 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4781 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4782 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4783 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4783 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4784 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4784 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4785 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4786 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4787 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4787 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4788 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4789 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4790 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4790 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4791 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4792 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4793 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4793 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4794 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4795 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4796 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4796 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4797 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4798 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4799 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4800 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4800 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4801 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4801 (2 ms) [----------] 4802 tests from TLSVersionRanges/TestPolicyVersionRange (7294 ms total) [----------] 16 tests from AllHashFuncs/TlsHkdfTest [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 Hash = SHA-256 Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 Hash = SHA-384 Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 Hash = SHA-256 Output: [32] 416c5392b9f36df188e90eb14d17bf0da190bfdb7f1f4956e6e566a569c8b15c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 Hash = SHA-384 Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 Hash = SHA-256 Output: [32] 16af00543a56c826a2a7fcb634668afd36dc8ecec4d26c7adce370363d60fa0b [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 Hash = SHA-384 Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 Hash = SHA-256 Output: [32] a568025a95c97f5538bcf797cc0fd5f6a88d15bc0e8574703ca365bd76cf9fd3 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 Hash = SHA-384 Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 Hash = SHA-256 Output: [32] 3e4e6ed0bcc4f4fff0f569d06c1e0e1032aad7a3eff6a8658ebeeec71f016d3c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 Hash = SHA-384 Output: [48] 41ea77098c900410ecbc37d85b54cd7b08151320ed1e3f5474f78b0638280637... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/0 Hash = SHA-256 Output: [32] b70800e38e486891b10f5e6f22536b846975aaa32ae7deaac3d1b405225c68f5 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/1 Hash = SHA-384 Output: [48] 13d3369f3c78a03240ee16e9111266c751add83ca1a39774d745ffa7889e5217... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/0 [ OK ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/1 [ OK ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/0 [ OK ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/1 [ OK ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/1 (0 ms) [----------] 16 tests from AllHashFuncs/TlsHkdfTest (1 ms total) [----------] 28 tests from EchAgentTest/TlsAgentEchTest [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/1 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.LongEchConfig/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.LongEchConfig/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.LongEchConfig/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.LongEchConfig/1 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/1 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/1 (0 ms) [----------] 28 tests from EchAgentTest/TlsAgentEchTest (10 ms total) [----------] 34 tests from Tls13PskTest/Tls13PskTest [ RUN ] Tls13PskTest/Tls13PskTest.NormalExternal/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.NormalExternal/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.NormalExternal/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.NormalExternal/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.KeyTooLarge/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.KeyTooLarge/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.KeyTooLarge/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.KeyTooLarge/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 0303e08cca03fb819abce5fc7a267fcb2f12a53088ab81b4a7de247f92878091... handshake new: [92] 0303e08cca03fb819abce5fc7a267fcb2f12a53088ab81b4a7de247f92878091... record old: [96] 0200005c0303e08cca03fb819abce5fc7a267fcb2f12a53088ab81b4a7de247f... record new: [96] 0200005c0303e08cca03fb819abce5fc7a267fcb2f12a53088ab81b4a7de247f... server: Filtered packet: [215] 16030300600200005c0303e08cca03fb819abce5fc7a267fcb2f12a53088ab81... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] fefdd8f559f650ba86e8aec643d58dc440d61862bdf6d125731e5952f9a2c2c2... handshake new: [92] fefdd8f559f650ba86e8aec643d58dc440d61862bdf6d125731e5952f9a2c2c2... record old: [104] 0200005c000000000000005cfefdd8f559f650ba86e8aec643d58dc440d61862... record new: [104] 0200005c000000000000005cfefdd8f559f650ba86e8aec643d58dc440d61862... server: Filtered packet: [269] 16fefd000000000000000000680200005c000000000000005cfefdd8f559f650... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.LabelMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.LabelMismatch/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.LabelMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.LabelMismatch/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/0 (9 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/1 (9 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/0 (5 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/1 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ClientOnly/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ClientOnly/1 (5 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropKexModes/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [508] 030354960538acfc29e08811f4f5ea7c131503ab56c6e051a6daf08976d4fa42... handshake new: [502] 030354960538acfc29e08811f4f5ea7c131503ab56c6e051a6daf08976d4fa42... record old: [512] 010001fc030354960538acfc29e08811f4f5ea7c131503ab56c6e051a6daf089... record new: [506] 010001f6030354960538acfc29e08811f4f5ea7c131503ab56c6e051a6daf089... client: Filtered packet: [511] 16030101fa010001f6030354960538acfc29e08811f4f5ea7c131503ab56c6e0... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropKexModes/0 (2 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropKexModes/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [263] fefdd152493c104c3c349bf95963eae7e41198b1649b90a29d2b039295cf3a83... handshake new: [257] fefdd152493c104c3c349bf95963eae7e41198b1649b90a29d2b039295cf3a83... record old: [275] 010001070000000000000107fefdd152493c104c3c349bf95963eae7e41198b1... record new: [269] 010001010000000000000101fefdd152493c104c3c349bf95963eae7e41198b1... client: Filtered packet: [282] 16feff0000000000000000010d010001010000000000000101fefdd152493c10... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropKexModes/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d0020f1bd73c219d5b95f3b8950534074886d91768b186c5a1d1015064eab... handshake old: [92] 030365949ebe09ebb35945e2d281edcf0427e6ba2b36553e73e6bcaf3f8ea417... handshake new: [52] 030365949ebe09ebb35945e2d281edcf0427e6ba2b36553e73e6bcaf3f8ea417... record old: [96] 0200005c030365949ebe09ebb35945e2d281edcf0427e6ba2b36553e73e6bcaf... record new: [56] 02000034030365949ebe09ebb35945e2d281edcf0427e6ba2b36553e73e6bcaf... server: Filtered packet: [175] 160303003802000034030365949ebe09ebb35945e2d281edcf0427e6ba2b3655... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d00202c5282c0f3a26c111f52625c60283365fcfc0e3b75222820ca35c7d0... handshake old: [92] fefdab2525efd1d53fa5fff0da64c70eec987e23552b40002c673bc692862f6f... handshake new: [52] fefdab2525efd1d53fa5fff0da64c70eec987e23552b40002c673bc692862f6f... record old: [104] 0200005c000000000000005cfefdab2525efd1d53fa5fff0da64c70eec987e23... record new: [64] 020000340000000000000034fefdab2525efd1d53fa5fff0da64c70eec987e23... server: Filtered packet: [229] 16fefd00000000000000000040020000340000000000000034fefdab2525efd1... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0000 extension new: [2] 0001 handshake old: [92] 0303bad77548b31a84e66bcc5c55b906736b1de6ca36c75ef89633d4c905bb14... handshake new: [92] 0303bad77548b31a84e66bcc5c55b906736b1de6ca36c75ef89633d4c905bb14... record old: [96] 0200005c0303bad77548b31a84e66bcc5c55b906736b1de6ca36c75ef89633d4... record new: [96] 0200005c0303bad77548b31a84e66bcc5c55b906736b1de6ca36c75ef89633d4... server: Filtered packet: [215] 16030300600200005c0303bad77548b31a84e66bcc5c55b906736b1de6ca36c7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_PRE_SHARED_KEY: SSL received an invalid PreSharedKey extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0000 extension new: [2] 0001 handshake old: [92] fefdb84896c297b94b22f583d0693de8e8ebb8de111c0eec7f588938a2662fbe... handshake new: [92] fefdb84896c297b94b22f583d0693de8e8ebb8de111c0eec7f588938a2662fbe... record old: [104] 0200005c000000000000005cfefdb84896c297b94b22f583d0693de8e8ebb8de... record new: [104] 0200005c000000000000005cfefdb84896c297b94b22f583d0693de8e8ebb8de... server: Filtered packet: [269] 16fefd000000000000000000680200005c000000000000005cfefdb84896c297... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_PRE_SHARED_KEY: SSL received an invalid PreSharedKey extension. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.PreferEpsk/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.PreferEpsk/0 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.PreferEpsk/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.PreferEpsk/1 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/0 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/1 (9 ms) [ RUN ] Tls13PskTest/Tls13PskTest.BadConfigValues/0 Version: TLS 1.3 [ OK ] Tls13PskTest/Tls13PskTest.BadConfigValues/0 (0 ms) [ RUN ] Tls13PskTest/Tls13PskTest.BadConfigValues/1 Version: DTLS 1.3 [ OK ] Tls13PskTest/Tls13PskTest.BadConfigValues/1 (0 ms) [ RUN ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/1 (2 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/1 (2 ms) [----------] 34 tests from Tls13PskTest/Tls13PskTest (144 ms total) [----------] 12 tests from Tls13PskTestWithCiphers/Tls13PskTestWithCiphers [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/0 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/1 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/2 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/3 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/4 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/4 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/5 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/5 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/0 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/1 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/2 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/3 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/4 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/4 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/5 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/5 (4 ms) [----------] 12 tests from Tls13PskTestWithCiphers/Tls13PskTestWithCiphers (44 ms total) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileTest [ RUN ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/0 Version: DTLS 1.0 [ OK ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/0 (81 ms) [ RUN ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/1 Version: DTLS 1.2 [ OK ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/1 (81 ms) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileTest (162 ms total) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileTest [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/0 Version: TLS 1.0 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/0 (82 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/1 Version: TLS 1.1 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/1 (81 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/2 Version: TLS 1.2 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/2 (84 ms) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileTest (247 ms total) [----------] 1 test from KeyLogFileTLS13/KeyLogFileTest [ RUN ] KeyLogFileTLS13/KeyLogFileTest.KeyLogFile/0 Version: TLS 1.3 [ OK ] KeyLogFileTLS13/KeyLogFileTest.KeyLogFile/0 (86 ms) [----------] 1 test from KeyLogFileTLS13/KeyLogFileTest (86 ms total) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileUnsetTest [ RUN ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/0 Version: DTLS 1.0 [ OK ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/0 (80 ms) [ RUN ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/1 Version: DTLS 1.2 [ OK ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/1 (83 ms) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileUnsetTest (163 ms total) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileUnsetTest [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/0 Version: TLS 1.0 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/0 (81 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/1 Version: TLS 1.1 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/1 (81 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/2 Version: TLS 1.2 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/2 (83 ms) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileUnsetTest (245 ms total) [----------] 1 test from KeyLogFileTLS13/KeyLogFileUnsetTest [ RUN ] KeyLogFileTLS13/KeyLogFileUnsetTest.KeyLogFile/0 Version: TLS 1.3 [ OK ] KeyLogFileTLS13/KeyLogFileUnsetTest.KeyLogFile/0 (86 ms) [----------] 1 test from KeyLogFileTLS13/KeyLogFileUnsetTest (86 ms total) [----------] Global test environment tear-down [==========] 12780 tests from 103 test suites ran. (71768 ms total) [ PASSED ] 12278 tests. [ SKIPPED ] 502 tests, listed below: [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 [ SKIPPED ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 [ SKIPPED ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 [ SKIPPED ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 [ SKIPPED ] StreamOnly/TlsConnectStream.ShortRead/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 [ SKIPPED ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/1 YOU HAVE 64 DISABLED TESTS ssl_gtest.sh: #26: ssl_gtests ran successfully - PASSED DEBUG: Falling back to legacy XML report parsing using only sed TIMESTAMP ssl_gtests END: Tue Aug 3 00:33:35 UTC 2021 Running tests for policy TIMESTAMP policy BEGIN: Tue Aug 3 00:33:35 UTC 2021 policy.sh: CRYPTO-POLICY =============================== policy.sh: running "Standard policy" ---------------------------- policy.sh: policy: "disallow=ALL allow=HMAC-SHA256:HMAC-SHA1:HMAC-SHA384:HMAC-SHA512:SECP256R1:SECP384R1:SECP521R1:aes256-gcm:chacha20-poly1305:aes256-cbc:camellia256-cbc:aes128-gcm:aes128-cbc:camellia128-cbc:SHA256:SHA384:SHA512:SHA1:ECDHE-RSA:ECDHE-ECDSA:RSA:DHE-RSA:rsa-pkcs:rsa-pss:ecdsa:tls-version-min=tls1.0:dtls-version-min=dtls1.0:DH-MIN=1023:DSA-MIN=2048:RSA-MIN=2048" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: PRIME256V1 is enabled for KX NSS-POLICY-INFO: PRIME256V1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP256R1 is enabled for KX NSS-POLICY-INFO: SECP256R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA1 is enabled for KX NSS-POLICY-INFO: SHA1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA256 is enabled for KX NSS-POLICY-INFO: SHA256 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA384 is enabled for KX NSS-POLICY-INFO: SHA384 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA512 is enabled for KX NSS-POLICY-INFO: SHA512 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: HMAC-SHA1 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: AES128-CBC is enabled for SSL NSS-POLICY-INFO: AES256-CBC is enabled for SSL NSS-POLICY-INFO: AES128-GCM is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CAMELLIA128-CBC is enabled for SSL NSS-POLICY-INFO: CAMELLIA256-CBC is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: RSA-PSS is enabled for KX NSS-POLICY-INFO: RSA-PSS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: ECDSA is enabled for KX NSS-POLICY-INFO: ECDSA is enabled for CERT-SIGNATURE NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 15 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 11 NSS-POLICY-INFO: NUMBER-OF-CERT-SIG: 11 NSS-POLICY-INFO: NUMBER-OF-ECC: 4 NSS-POLICY-INFO: NUMBER-OF-HASH: 4 NSS-POLICY-INFO: NUMBER-OF-MAC: 4 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 7 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 4 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 3 NSS-POLICY-INFO: ciphersuite TLS_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 28 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 policy.sh: #1: "Standard policy" produced a returncode of 0, expected is 0 - PASSED NSS-POLICY-INFO: LOADED-SUCCESSFULLY policy.sh: #2: "Standard policy" output is expected to match "NSS-POLICY-INFO.*LOADED-SUCCESSFULLY" - PASSED policy.sh: running "Legacy policy" ---------------------------- policy.sh: policy: "disallow=ALL allow=HMAC-SHA1:HMAC-SHA256:HMAC-SHA384:HMAC-SHA512:SECP256R1:SECP384R1:SECP521R1:aes256-gcm:chacha20-poly1305:aes256-cbc:camellia256-cbc:aes128-gcm:aes128-cbc:camellia128-cbc:des-ede3-cbc:rc4:SHA256:SHA384:SHA512:SHA1:ECDHE-RSA:ECDHE-ECDSA:RSA:DHE-RSA:DHE-DSS:rsa-pkcs:rsa-pss:ecdsa:tls-version-min=tls1.0:dtls-version-min=tls1.0:DH-MIN=1023:DSA-MIN=1023:RSA-MIN=1023" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: PRIME256V1 is enabled for KX NSS-POLICY-INFO: PRIME256V1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP256R1 is enabled for KX NSS-POLICY-INFO: SECP256R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA1 is enabled for KX NSS-POLICY-INFO: SHA1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA256 is enabled for KX NSS-POLICY-INFO: SHA256 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA384 is enabled for KX NSS-POLICY-INFO: SHA384 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA512 is enabled for KX NSS-POLICY-INFO: SHA512 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: HMAC-SHA1 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: AES128-CBC is enabled for SSL NSS-POLICY-INFO: AES256-CBC is enabled for SSL NSS-POLICY-INFO: AES128-GCM is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CAMELLIA128-CBC is enabled for SSL NSS-POLICY-INFO: CAMELLIA256-CBC is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: DES-EDE3-CBC is enabled for SSL NSS-POLICY-INFO: RC4 is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: DHE-DSS is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: RSA-PSS is enabled for KX NSS-POLICY-INFO: RSA-PSS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: ECDSA is enabled for KX NSS-POLICY-INFO: ECDSA is enabled for CERT-SIGNATURE NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 16 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 13 NSS-POLICY-INFO: NUMBER-OF-CERT-SIG: 11 NSS-POLICY-INFO: NUMBER-OF-ECC: 4 NSS-POLICY-INFO: NUMBER-OF-HASH: 4 NSS-POLICY-INFO: NUMBER-OF-MAC: 4 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 9 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 5 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 3 NSS-POLICY-INFO: ciphersuite TLS_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_RC4_128_SHA is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 34 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 policy.sh: #3: "Legacy policy" produced a returncode of 0, expected is 0 - PASSED NSS-POLICY-INFO: LOADED-SUCCESSFULLY policy.sh: #4: "Legacy policy" output is expected to match "NSS-POLICY-INFO.*LOADED-SUCCESSFULLY" - PASSED policy.sh: running "Reduced policy" ---------------------------- policy.sh: policy: "disallow=ALL allow=HMAC-SHA256:HMAC-SHA384:HMAC-SHA512:SECP384R1:SECP521R1:aes256-gcm:chacha20-poly1305:SHA384:SHA512:ECDHE-RSA:ECDHE-ECDSA:RSA:DHE-RSA:rsa-pkcs:rsa-pss:ecdsa:tls-version-min=tls1.2:dtls-version-min=dtls1.2:DH-MIN=3072:DSA-MIN=3072:RSA-MIN=3072" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA384 is enabled for KX NSS-POLICY-INFO: SHA384 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA512 is enabled for KX NSS-POLICY-INFO: SHA512 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: RSA-PSS is enabled for KX NSS-POLICY-INFO: RSA-PSS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: ECDSA is enabled for KX NSS-POLICY-INFO: ECDSA is enabled for CERT-SIGNATURE NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 11 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 5 NSS-POLICY-INFO: NUMBER-OF-CERT-SIG: 7 NSS-POLICY-INFO: NUMBER-OF-ECC: 2 NSS-POLICY-INFO: NUMBER-OF-HASH: 2 NSS-POLICY-INFO: NUMBER-OF-MAC: 3 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 2 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 4 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 3 NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 9 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 2 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 1 policy.sh: #5: "Reduced policy" produced a returncode of 0, expected is 0 - PASSED NSS-POLICY-INFO: LOADED-SUCCESSFULLY policy.sh: #6: "Reduced policy" output is expected to match "NSS-POLICY-INFO.*LOADED-SUCCESSFULLY" - PASSED policy.sh: running "Missing value" ---------------------------- policy.sh: policy: "disallow=ALL allow=dtls-version-min=:dtls-version-max=" NSS-POLICY-FAIL dtls-version-min=: unknown value: NSS-POLICY-FAIL: policy config parsing failed, not loading module Policy Error: failed to load policy file NSS-POLICY-FAIL policy.sh: #7: "Missing value" produced a returncode of 2, expected is 2 - PASSED NSS-POLICY-FAIL dtls-version-min=: unknown value: NSS-POLICY-FAIL: policy config parsing failed, not loading module Policy NSS-POLICY-FAIL policy.sh: #8: "Missing value" output is expected to match "NSS-POLICY-FAIL" - PASSED policy.sh: running "Invalid value" ---------------------------- policy.sh: policy: "disallow=ALL allow=RSA-MIN=whatever" NSS-POLICY-FAIL RSA-MIN=whatever: unknown value: whatever NSS-POLICY-FAIL: policy config parsing failed, not loading module Policy Error: failed to load policy file NSS-POLICY-FAIL policy.sh: #9: "Invalid value" produced a returncode of 2, expected is 2 - PASSED NSS-POLICY-FAIL RSA-MIN=whatever: unknown value: whatever NSS-POLICY-FAIL: policy config parsing failed, not loading module Policy NSS-POLICY-FAIL policy.sh: #10: "Invalid value" output is expected to match "NSS-POLICY-FAIL" - PASSED policy.sh: running "Invalid identifier" ---------------------------- policy.sh: policy: "disallow=ALL allow=flower" NSS-POLICY-FAIL allow: unknown identifier: flower NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-FAIL policy.sh: #11: "Invalid identifier" produced a returncode of 2, expected is 2 - PASSED NSS-POLICY-FAIL allow: unknown identifier: flower NSS-POLICY-FAIL policy.sh: #12: "Invalid identifier" output is expected to match "NSS-POLICY-FAIL" - PASSED policy.sh: running "disallow all" ---------------------------- policy.sh: policy: "disallow=all" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #13: "disallow all" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 policy.sh: #14: "disallow all" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-CERT-SIG" - PASSED policy.sh: running "disallow all signatures" ---------------------------- policy.sh: policy: "disallow=all/signature" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: PRIME192V1 is enabled for KX NSS-POLICY-INFO: PRIME192V2 is enabled for KX NSS-POLICY-INFO: PRIME192V3 is enabled for KX NSS-POLICY-INFO: PRIME239V1 is enabled for KX NSS-POLICY-INFO: PRIME239V2 is enabled for KX NSS-POLICY-INFO: PRIME239V3 is enabled for KX NSS-POLICY-INFO: PRIME256V1 is enabled for KX NSS-POLICY-INFO: SECP112R1 is enabled for KX NSS-POLICY-INFO: SECP112R2 is enabled for KX NSS-POLICY-INFO: SECP128R1 is enabled for KX NSS-POLICY-INFO: SECP128R2 is enabled for KX NSS-POLICY-INFO: SECP160K1 is enabled for KX NSS-POLICY-INFO: SECP160R1 is enabled for KX NSS-POLICY-INFO: SECP160R2 is enabled for KX NSS-POLICY-INFO: SECP192K1 is enabled for KX NSS-POLICY-INFO: SECP192R1 is enabled for KX NSS-POLICY-INFO: SECP224K1 is enabled for KX NSS-POLICY-INFO: SECP256K1 is enabled for KX NSS-POLICY-INFO: SECP256R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: CURVE25519 is enabled for KX NSS-POLICY-INFO: C2PNB163V1 is enabled for KX NSS-POLICY-INFO: C2PNB163V2 is enabled for KX NSS-POLICY-INFO: C2PNB163V3 is enabled for KX NSS-POLICY-INFO: C2PNB176V1 is enabled for KX NSS-POLICY-INFO: C2TNB191V1 is enabled for KX NSS-POLICY-INFO: C2TNB191V2 is enabled for KX NSS-POLICY-INFO: C2TNB191V3 is enabled for KX NSS-POLICY-INFO: C2ONB191V4 is enabled for KX NSS-POLICY-INFO: C2ONB191V5 is enabled for KX NSS-POLICY-INFO: C2PNB208W1 is enabled for KX NSS-POLICY-INFO: C2TNB239V1 is enabled for KX NSS-POLICY-INFO: C2TNB239V2 is enabled for KX NSS-POLICY-INFO: C2TNB239V3 is enabled for KX NSS-POLICY-INFO: C2ONB239V4 is enabled for KX NSS-POLICY-INFO: C2ONB239V5 is enabled for KX NSS-POLICY-INFO: C2PNB272W1 is enabled for KX NSS-POLICY-INFO: C2PNB304W1 is enabled for KX NSS-POLICY-INFO: C2TNB359V1 is enabled for KX NSS-POLICY-INFO: C2PNB368W1 is enabled for KX NSS-POLICY-INFO: C2TNB431R1 is enabled for KX NSS-POLICY-INFO: SECT113R1 is enabled for KX NSS-POLICY-INFO: SECT131R1 is enabled for KX NSS-POLICY-INFO: SECT131R1 is enabled for KX NSS-POLICY-INFO: SECT131R2 is enabled for KX NSS-POLICY-INFO: SECT163K1 is enabled for KX NSS-POLICY-INFO: SECT163R1 is enabled for KX NSS-POLICY-INFO: SECT163R2 is enabled for KX NSS-POLICY-INFO: SECT193R1 is enabled for KX NSS-POLICY-INFO: SECT193R2 is enabled for KX NSS-POLICY-INFO: SECT233K1 is enabled for KX NSS-POLICY-INFO: SECT233R1 is enabled for KX NSS-POLICY-INFO: SECT239K1 is enabled for KX NSS-POLICY-INFO: SECT283K1 is enabled for KX NSS-POLICY-INFO: SECT283R1 is enabled for KX NSS-POLICY-INFO: SECT409K1 is enabled for KX NSS-POLICY-INFO: SECT409R1 is enabled for KX NSS-POLICY-INFO: SECT571K1 is enabled for KX NSS-POLICY-INFO: SECT571R1 is enabled for KX NSS-POLICY-INFO: SHA1 is enabled for KX NSS-POLICY-INFO: SHA224 is enabled for KX NSS-POLICY-INFO: SHA256 is enabled for KX NSS-POLICY-INFO: SHA384 is enabled for KX NSS-POLICY-INFO: SHA512 is enabled for KX NSS-POLICY-INFO: HMAC-SHA1 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA224 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: HMAC-MD5 is enabled for SSL NSS-POLICY-INFO: AES128-CBC is enabled for SSL NSS-POLICY-INFO: AES192-CBC is enabled for SSL NSS-POLICY-INFO: AES256-CBC is enabled for SSL NSS-POLICY-INFO: AES128-GCM is enabled for SSL NSS-POLICY-INFO: AES192-GCM is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CAMELLIA128-CBC is enabled for SSL NSS-POLICY-INFO: CAMELLIA192-CBC is enabled for SSL NSS-POLICY-INFO: CAMELLIA256-CBC is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: SEED-CBC is enabled for SSL NSS-POLICY-INFO: DES-EDE3-CBC is enabled for SSL NSS-POLICY-INFO: DES-40-CBC is enabled for SSL NSS-POLICY-INFO: DES-CBC is enabled for SSL NSS-POLICY-INFO: NULL-CIPHER is enabled for SSL NSS-POLICY-INFO: RC2 is enabled for SSL NSS-POLICY-INFO: RC4 is enabled for SSL NSS-POLICY-INFO: IDEA is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: RSA-EXPORT is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: DHE-DSS is enabled for KX NSS-POLICY-INFO: DH-RSA is enabled for KX NSS-POLICY-INFO: DH-DSS is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: ECDH-ECDSA is enabled for KX NSS-POLICY-INFO: ECDH-RSA is enabled for KX NSS-POLICY-INFO: DSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PSS is enabled for KX NSS-POLICY-INFO: ECDSA is enabled for KX NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 79 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 24 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-INFO: NUMBER-OF-ECC: 60 NSS-POLICY-INFO: NUMBER-OF-HASH: 5 NSS-POLICY-INFO: NUMBER-OF-MAC: 6 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 18 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 10 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 4 NSS-POLICY-INFO: ciphersuite TLS_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_RC4_128_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_RC4_128_MD5 is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 35 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #15: "disallow all signatures" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 policy.sh: #16: "disallow all signatures" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-CERT-SIG" - PASSED policy.sh: running "No Hashes" ---------------------------- policy.sh: policy: "disallow=ALL allow=HMAC-SHA256:HMAC-SHA384:HMAC-SHA512:SECP384R1:SECP521R1:aes256-gcm:chacha20-poly1305:ECDHE-RSA:ECDHE-ECDSA:RSA:DHE-RSA:rsa-pkcs:tls-version-min=tls1.2:dtls-version-min=dtls1.2:DH-MIN=3072:DSA-MIN=3072:RSA-MIN=3072" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 7 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 5 NSS-POLICY-INFO: NUMBER-OF-CERT-SIG: 3 NSS-POLICY-INFO: NUMBER-OF-ECC: 2 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-INFO: NUMBER-OF-MAC: 3 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 2 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 4 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 1 NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 9 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 2 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 1 NSS-POLICY-WARN policy.sh: #17: "No Hashes" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-HASH: 0 policy.sh: #18: "No Hashes" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-HASH" - PASSED policy.sh: running "All TLS versions disabled" ---------------------------- policy.sh: policy: "disallow=ALL allow=tls-version-min=0:tls-version-max=0" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-WARN: NUMBER-OF-TLS-VERSIONS: 0 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #19: "All TLS versions disabled" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-TLS-VERSIONS: 0 policy.sh: #20: "All TLS versions disabled" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-TLS-VERSIONS" - PASSED policy.sh: running "All DTLS versions disabled" ---------------------------- policy.sh: policy: "disallow=ALL allow=dtls-version-min=0:dtls-version-max=0" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-WARN: NUMBER-OF-DTLS-VERSIONS: 0 NSS-POLICY-WARN policy.sh: #21: "All DTLS versions disabled" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-DTLS-VERSIONS: 0 policy.sh: #22: "All DTLS versions disabled" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-DTLS-VERSIONS" - PASSED policy.sh: running "Invalid range of TLS versions" ---------------------------- policy.sh: policy: "disallow=ALL allow=tls-version-min=tls1.2:tls-version-max=tls1.1" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-WARN: NUMBER-OF-TLS-VERSIONS: 0 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #23: "Invalid range of TLS versions" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-TLS-VERSIONS: 0 policy.sh: #24: "Invalid range of TLS versions" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-TLS-VERSIONS" - PASSED policy.sh: running "Invalid range of DTLS versions" ---------------------------- policy.sh: policy: "disallow=ALL allow=dtls-version-min=tls1.2:dtls-version-max=tls1.1" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-WARN: NUMBER-OF-DTLS-VERSIONS: 0 NSS-POLICY-WARN policy.sh: #25: "Invalid range of DTLS versions" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-DTLS-VERSIONS: 0 policy.sh: #26: "Invalid range of DTLS versions" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-DTLS-VERSIONS" - PASSED policy.sh: running "Valid range of TLS versions" ---------------------------- policy.sh: policy: "disallow=ALL allow=tls-version-min=tls1.1:tls-version-max=tls1.2" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 2 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #27: "Valid range of TLS versions" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 2 policy.sh: #28: "Valid range of TLS versions" output is expected to match "NSS-POLICY-INFO.*NUMBER-OF-TLS-VERSIONS" - PASSED policy.sh: running "Valid range of DTLS versions" ---------------------------- policy.sh: policy: "disallow=ALL allow=dtls-version-min=tls1.1:dtls-version-max=tls1.2" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #29: "Valid range of DTLS versions" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 policy.sh: #30: "Valid range of DTLS versions" output is expected to match "NSS-POLICY-INFO.*NUMBER-OF-DTLS-VERSIONS" - PASSED TIMESTAMP policy END: Tue Aug 3 00:33:35 UTC 2021 policy.sh: Testing with PKIX =============================== Running test cycle: PKIX ---------------------- List of tests that will be executed: cipher lowhash libpkix cert dbtests tools sdr crmf smime ssl ocsp merge pkits ec gtests ssl_gtests policy Running tests for lowhash TIMESTAMP lowhash BEGIN: Tue Aug 3 00:33:35 UTC 2021 lowhash.sh: Lowhash Tests =============================== lowhashtest with fips mode=0 lowhashtest MD5 lowhash.sh: #1: lowhashtest with fips mode=0 for MD5 - PASSED lowhashtest SHA1 lowhash.sh: #2: lowhashtest with fips mode=0 for SHA1 - PASSED lowhashtest SHA224 lowhash.sh: #3: lowhashtest with fips mode=0 for SHA224 - PASSED lowhashtest SHA256 lowhash.sh: #4: lowhashtest with fips mode=0 for SHA256 - PASSED lowhashtest SHA384 lowhash.sh: #5: lowhashtest with fips mode=0 for SHA384 - PASSED lowhashtest SHA512 lowhash.sh: #6: lowhashtest with fips mode=0 for SHA512 - PASSED lowhashtest with fips mode=1 lowhashtest MD5 lowhash.sh: #7: lowhashtest with fips mode=1 for MD5 - PASSED lowhashtest SHA1 lowhash.sh: #8: lowhashtest with fips mode=1 for SHA1 - PASSED lowhashtest SHA224 lowhash.sh: #9: lowhashtest with fips mode=1 for SHA224 - PASSED lowhashtest SHA256 lowhash.sh: #10: lowhashtest with fips mode=1 for SHA256 - PASSED lowhashtest SHA384 lowhash.sh: #11: lowhashtest with fips mode=1 for SHA384 - PASSED lowhashtest SHA512 lowhash.sh: #12: lowhashtest with fips mode=1 for SHA512 - PASSED lowhash.sh done TIMESTAMP lowhash END: Tue Aug 3 00:33:36 UTC 2021 Running tests for libpkix TIMESTAMP libpkix BEGIN: Tue Aug 3 00:33:36 UTC 2021 TIMESTAMP libpkix END: Tue Aug 3 00:33:36 UTC 2021 Running tests for cert TIMESTAMP cert BEGIN: Tue Aug 3 00:33:36 UTC 2021 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #81: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #87: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #113: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #116: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 119d8726837aaf0f2693ef4ea359d0970254d16e -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 54eefd01a051a8c6bbb8970e110b26065527656d -s CN=orphan -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:8d:17:73:a2:93:7a:34:3c:86:0f:92:f4:d0:0b:01: fe:c4:4d:f0:4f:c8:d9:8c:be:fd:27:db:1a:ce:0d:8b: d4:e7:82:49:32:e5:6a:4c:40:e3:49:d2:77:1e:a9:d1: 2b:1d:23:52:44:28:78:8a:65:f2:31:d8:e3:bb:d4:18: db:df:ec:be:64:68:8e:49:69:61:b4:e8:57:70:7d:05: 01:91:e7:33:32:2a:d7:fe:d8:ea:c7:6f:a5:84:6d:a9: 59:fd:4c:3a:66:a7:69:c7:97:c2:60:d0:c0:73:74:b6: 8b:81:d8:33:4d:d3:c6:19:ab:e3:b6:92:40:a5:4f:23: e9:72:0a:35:ab:4e:e3:c8:ff:bc:ef:87:08:b8:8b:ae: a3:17:02:9e:d2:7e:6d:c5:88:7e:9d:15:e7:b7:65:b6: 18:c5:15:6d:ff:d3:ad:c4:4e:42:c1:03:1f:45:ef:55: bf:39:e3:02:04:0e:24:28:9e:42:57:9e:c1:61:21:1a: 46:e2:c2:15:9c:9d:bd:40:87:32:05:ba:da:54:a0:f6: 8e:3a:87:73:41:b9:5f:02:8d:f4:4f:04:13:88:cd:33: 00:cb:ad:e7:ac:82:7d:80:9d:13:6b:ea:86:6f:43:53: c6:98:aa:65:9f:e4:4b:0b:38:ca:0e:65:98:20:e8:2d Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:93:b5:cc:83:30:c4:f0:6e:57:9f:cd:58:07:eb:2a: 03:05:98:7d:fc:9f:c3:bc:a3:36:0f:80:97:7e:0e:b5: 5a:18:73:b8:b4:15:04:34:28:f2:d3:f2:05:8a:76:cb: 47:0c:c9:bf:7d:e6:de:83:63:77:f7:ad:74:5c:ea:4d: 6e:b7:df:09:8d:44:f0:f3:ef:d5:c6:dc:2b:1c:5e:94: 38:1c:d4:7d:c6:22:4b:6e:0b:2c:22:7e:09:08:13:46: c7:53:86:f4:41:bb:b4:8e:c4:16:bc:77:bf:4a:f3:63: 03:2b:3c:8e:4b:47:c1:1d:11:2f:e0:c4:09:da:47:c3: 94:78:eb:e0:e5:7d:c1:35:10:9d:e5:65:12:cc:31:ef: 8c:29:d4:f1:b9:f9:ae:a7:63:60:32:26:43:f4:65:48: 24:be:2e:3f:4e:4f:dd:74:3c:e8:95:80:4c:7a:b9:5c: e5:3c:f5:f7:c3:a4:bd:4e:81:bb:d8:13:0a:29:ad:21: 3a:33:4c:58:90:88:5f:5b:3d:81:90:d5:fa:5e:a2:8a: 1b:7a:0c:4d:95:9e:87:a7:62:36:c3:35:36:a8:95:e9: f1:aa:bd:0d:8d:f9:f9:56:0a:28:07:a8:d2:9c:be:7c: e2:f3:76:16:93:8f:52:7f:34:3f:a1:3e:b9:f0:59:5c Fingerprint (SHA-256): FC:2E:88:5B:42:7E:3E:C7:2D:E3:D5:E6:49:E9:DD:6F:F7:8D:68:68:C2:49:9A:40:3A:1D:F0:CC:FC:DA:E5:7C Fingerprint (SHA1): 1D:63:FF:25:57:B5:A4:5F:BA:97:A5:B9:48:77:15:91:78:9A:C0:7A cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Verify that small RSA exponents still work ============== cert.sh: Attempt to generate a key with exponent of 3 -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -z ../tests_noise -f ../tests.pw Generating key. This may take a few moments... cert.sh: #289: Attempt to generate a key with exponent of 3 - PASSED cert.sh: Attempt to generate a key with exponent of 17 -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -z ../tests_noise -f ../tests.pw Generating key. This may take a few moments... cert.sh: #290: Attempt to generate a key with exponent of 17 - PASSED cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #291: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #292: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #293: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #294: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #295: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #296: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #297: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #298: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #299: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #300: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #301: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #302: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #303: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #304: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #305: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #306: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #307: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #308: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #309: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #310: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #311: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #312: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #313: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #314: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #315: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #316: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #317: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #318: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #319: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #320: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #321: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #322: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #323: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #324: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #325: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:1c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:23 2021 Not After : Wed Nov 03 00:34:23 2021 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:e8:e3:df:ce:b3:c9:c8:16:d1:f7:b5:12:93:ce:fd: cd:31:48:bb:5d:ea:f8:63:ac:27:66:6e:49:d9:45:e7: ef:2d:e1:4b:fa:98:24:7c:de:6e:6f:fa:3f:e7:23:ac: 4a:14:4e:93:e4:b2:39:01:37:f6:c8:90:ef:cd:5e:72: ca:6c:0d:18:44:a0:23:ce:7a:17:ec:32:9c:9a:32:c0: 0a:99:63:0a:af:5c:a4:63:9e:b9:1f:c3:07:fa:e4:65: 67:c6:ef:da:fd:a5:57:64:a6:4a:c8:fc:0c:9a:d5:7e: fc:f7:38:b2:75:74:64:a9:10:85:31:84:95:3e:70:20: 95:ec:5c:5e:e1:a7:9e:fd:16:e4:44:d7:22:9f:f8:c9: 10:e6:e4:fc:28:50:6c:5f:aa:da:a4:5c:76:01:e1:62: 08:2a:f5:3e:be:c6:da:21:44:65:a7:47:fa:25:8c:26: bc:f5:4c:67:e2:5c:c0:82:d9:2f:1a:d5:1a:8c:16:2f: 4a:22:1b:a7:33:50:15:35:e7:cb:a9:db:cc:5e:6e:86: 21:85:f7:27:a0:fa:db:f2:82:eb:71:a2:58:50:80:c2: eb:fb:b8:e2:a5:5d:7e:6a:25:29:2f:9a:55:d1:0d:c5: 7a:c5:6b:b5:54:7d:32:97:57:f9:f4:ab:38:ae:ae:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:cc:93:cb:fd:cf:5e:ff:ab:72:e9:15:d4:40:27:be: 66:6c:6e:19:cf:31:88:07:d2:fb:20:7f:d3:04:83:ce: 40:f8:01:1f:66:ac:89:03:49:52:c9:c2:a2:71:be:2c: 06:af:1d:30:56:d5:c3:f0:13:45:79:2d:66:ff:6a:40: 4e:6b:f5:a5:ff:38:6e:e2:6e:36:99:3d:c5:b8:d3:0b: f4:56:16:04:56:d7:7a:3e:5d:04:1d:03:60:39:2c:26: e7:f6:3c:0e:55:5b:5d:f3:c0:67:86:dd:bf:1b:f7:e8: 5c:39:44:95:03:75:54:f3:27:26:5f:68:99:e5:b4:8a: 49:ae:95:bb:34:43:96:f9:f1:ab:11:cf:a5:2c:94:71: 4d:9d:08:4b:8d:0a:09:70:ac:0b:2e:dc:d7:d2:c4:88: 9a:6d:79:66:4e:09:60:5c:88:84:51:ad:94:f3:29:a3: 7f:1a:28:b7:23:41:7c:34:60:ae:ff:75:b8:c4:c4:8e: 07:1c:01:31:cf:89:91:14:e9:07:2a:d3:b3:d6:b9:58: ad:54:2f:48:9e:da:70:f6:41:b6:57:5d:20:23:cc:ba: a4:26:bd:e8:7a:c9:a3:d1:74:9a:8c:2d:4a:44:e4:eb: 0b:32:10:e1:f2:1c:d2:11:96:18:ba:04:56:ec:9e:ae Fingerprint (SHA-256): DC:33:FF:55:74:BE:C6:9A:5A:4F:F8:31:4C:7F:39:71:C9:42:A4:A8:DC:0F:EE:23:37:4D:B3:19:B0:D6:98:AA Fingerprint (SHA1): 96:D0:EB:E1:F6:AD:A8:56:91:67:2F:E6:6F:6A:DE:04:94:E1:BE:21 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #326: Certificate Key Usage Extension (1) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:1e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:24 2021 Not After : Wed Nov 03 00:34:24 2021 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:99:d2:04:4f:27:b3:67:ad:dc:98:44:f6:37:06:c5: fc:fe:30:bb:e5:3d:16:1b:60:0e:b4:e4:49:48:94:10: 08:1b:b7:88:2d:00:94:6e:97:56:45:0d:e5:1a:61:91: fb:e1:87:ce:d0:ad:33:59:f9:3c:33:62:67:d5:68:2c: 99:16:81:d5:37:fb:4c:54:9a:eb:cd:f8:9b:ab:4e:6b: b0:cc:32:70:e1:f2:90:49:d6:8e:c0:89:35:20:7b:dd: 52:5c:63:22:e6:b1:db:e0:73:d3:e5:34:0a:c3:ed:aa: 6c:36:0b:00:fd:10:0d:14:2f:11:c5:6f:c6:2c:8b:1e: 7c:e5:f3:86:81:e0:96:81:de:7b:36:28:b1:9c:20:10: a5:18:b6:d5:75:b2:bc:53:54:f2:25:f0:5c:96:34:54: 01:b9:40:6d:39:69:cc:06:f4:b6:13:f3:43:4a:86:b4: 11:79:54:57:93:68:56:41:eb:16:04:4e:fd:77:63:cc: 43:31:8e:09:c2:09:0e:74:cb:63:20:94:4f:43:be:8e: 20:13:82:09:c3:a9:ea:24:b7:f9:31:dd:bf:5c:11:11: 65:0e:2f:9d:e9:b4:8e:6e:8d:48:21:93:1a:34:bb:e2: 20:d7:dd:5b:ec:c9:a2:a6:8a:a6:3e:a9:c7:a1:2b:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:95:d8:9b:b1:03:f8:de:da:4b:13:8d:6a:bb:f7:90: fb:57:b7:14:56:d9:52:d0:40:03:ad:c5:c2:ba:8d:6a: 22:d1:23:15:81:f8:56:b3:76:e8:62:fe:53:cf:46:45: 64:f8:37:f0:31:e1:94:1a:3b:d4:82:f2:fc:30:00:e7: c0:11:4c:ad:b5:59:10:b2:78:b0:2b:3c:ae:c1:d2:a3: 36:e2:46:ba:b5:2c:3b:e1:50:02:b6:04:de:29:32:dc: 05:63:e3:02:06:d7:c3:d2:7d:27:9d:fb:c2:40:11:a7: 81:28:24:ca:52:80:1a:d8:fe:6f:4d:2e:f7:73:e8:e2: 98:42:c5:b4:43:d9:e3:de:e7:ee:2a:f3:f5:a5:a5:0e: 20:83:38:91:7d:7c:6f:de:78:4c:37:8d:5b:a9:b9:c2: a2:5c:c6:91:98:e0:7c:5b:22:dd:30:33:1f:b4:38:34: 69:2c:28:2b:56:45:15:69:8a:3b:64:d5:c1:4d:0f:ba: 65:d8:c7:21:a0:34:e1:14:3f:4d:47:e7:58:9e:42:aa: 0d:50:f7:0c:f3:ea:4d:8a:b6:0d:9a:9b:69:4d:04:55: 3b:0e:5e:81:3d:29:41:db:a2:bf:82:b6:df:e0:2b:ed: d0:71:76:08:cb:08:bd:89:b2:b7:34:f6:18:03:66:d4 Fingerprint (SHA-256): A6:2B:E2:31:77:52:3C:BD:A4:28:C2:82:08:01:33:07:CD:81:5E:A3:01:28:55:A1:B4:CF:97:BD:76:21:32:96 Fingerprint (SHA1): AA:02:38:E1:2B:C4:76:A9:7F:3A:38:56:D1:0F:BE:A2:41:39:85:46 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #327: Certificate Key Usage Extension (2) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:20 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:25 2021 Not After : Wed Nov 03 00:34:25 2021 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:cc:14:4c:1b:fc:72:b9:f8:69:29:50:2d:6f:a9:68: 43:fe:1d:56:ba:95:41:26:8a:ad:5b:fc:1c:b4:74:88: 9e:aa:24:55:65:1a:d0:fe:f4:a6:0a:60:e5:9f:f0:2c: 12:a7:ac:81:55:05:f3:f9:36:70:8d:3e:e8:00:96:22: 59:2c:59:d7:53:43:50:34:63:2a:5a:dc:ef:70:17:41: e5:8c:82:93:76:50:c4:72:c7:c3:43:67:32:44:92:00: 2e:59:b0:e3:7b:a9:95:f3:59:ae:ec:e7:fd:ec:63:3b: ce:3c:e4:a1:34:be:93:d0:d9:01:6b:69:06:00:72:e2: 57:bc:d6:fb:e5:7e:9d:5c:d4:2a:c0:ec:f8:02:c2:38: dc:0e:c5:ab:4b:f7:d5:d1:3d:09:07:69:e1:fd:60:30: b4:8b:79:ed:d9:b9:0f:4f:54:a4:8a:da:40:2e:86:af: 48:d3:d6:26:3a:70:8f:ad:fa:4c:4f:f8:92:6f:57:6d: 6d:a1:9a:9f:45:5c:1b:ca:1e:aa:d9:46:63:b3:03:ed: f9:4e:fb:52:20:01:2d:0a:a7:3a:09:9d:f1:43:fb:58: 8c:3e:88:de:f3:b9:b8:40:c0:a9:65:0f:eb:50:49:a6: 73:29:c0:98:5f:84:26:4c:4b:79:64:ba:41:e3:d3:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:60:f9:d0:9a:64:07:ef:ad:ad:f3:59:bd:85:5b:46: 12:61:53:5b:30:f3:6a:ee:b1:14:69:c3:b2:1f:e9:9e: 5e:6e:ff:55:5b:36:cf:2c:8c:2a:f0:78:ed:c8:1f:61: fa:fe:e1:28:42:58:1f:08:86:9d:6a:ea:72:a9:38:f9: 40:bf:82:93:1a:31:d8:18:57:3a:0a:3c:59:27:fb:a6: fc:cd:42:76:28:48:8d:5a:29:f3:ce:0c:07:1e:53:50: f7:71:e0:75:7e:c6:e0:8d:d6:a4:96:5c:84:68:60:6d: 47:a0:ae:2c:75:c4:f4:b0:7c:98:d1:8b:03:6b:88:4d: 3a:2b:37:ae:d8:c3:3d:77:ef:c3:eb:b4:8e:2f:26:b4: 37:53:b5:b8:c2:4f:19:ae:32:de:a1:f9:8c:9e:e1:0f: bb:29:1a:bd:43:d2:72:1f:a6:9a:78:46:fd:97:a8:bc: be:8f:b9:bb:a2:3e:79:19:e8:ab:9f:ff:9d:cc:69:dd: 4d:43:8c:3c:eb:42:1f:f1:bd:03:89:93:b7:d9:73:8d: b3:c3:10:68:0e:ac:69:3b:49:9c:46:cc:19:30:4e:31: 54:4a:9f:1c:a8:82:e0:b1:c1:35:88:a5:81:ba:90:52: 62:26:ee:35:25:b8:df:b2:1c:a6:2f:19:f0:cf:5a:4c Fingerprint (SHA-256): 99:C9:76:B2:95:9F:A6:F1:3D:CC:81:42:86:A5:C8:E1:4B:37:0D:EF:84:6E:11:6A:CF:23:2F:26:36:EE:44:8C Fingerprint (SHA1): C4:ED:96:BE:3E:6C:D4:0D:9F:1B:EF:AC:80:B6:A3:BC:96:22:03:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #328: Certificate Basic Constraints Extension (3) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:22 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:26 2021 Not After : Wed Nov 03 00:34:26 2021 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:c9:41:78:8a:10:29:a5:7d:30:3c:b3:c5:a6:e7:9c: 2d:68:8c:69:6a:40:94:bb:9a:4b:c0:6d:7b:77:02:b9: a4:35:ec:5c:d7:c9:ed:2f:ec:95:85:b2:df:da:84:b1: 1f:91:7f:2f:f5:df:6d:3e:ca:7c:33:b3:27:79:f5:42: 3c:b5:f5:4c:81:22:99:ea:df:8f:41:05:85:41:a2:c3: 65:5f:7b:14:93:e7:80:d3:f2:79:e7:5c:cc:19:aa:71: d2:8c:98:24:53:bf:bc:2b:d1:20:67:35:fa:37:20:cf: 18:a8:61:0b:97:13:df:5c:2a:a3:93:3d:e3:14:91:d3: 39:24:3a:09:0e:14:be:96:ac:79:3d:8c:a3:16:d5:14: ed:b9:6f:fb:53:78:df:0b:d5:ec:75:ae:61:8f:00:78: df:04:c4:94:fa:d8:d7:73:3c:28:8c:03:53:7a:18:9e: 9f:69:10:12:0b:72:98:23:2c:94:23:a5:54:9d:e4:9c: e6:d2:85:81:46:50:e6:d7:6e:42:36:86:e0:bc:50:0b: 66:20:3a:40:6b:2c:7c:75:22:d5:ec:e0:84:28:da:5d: f9:6e:f4:70:ac:6c:15:7a:68:3e:9d:5f:b7:ba:84:9e: 11:a6:b8:f2:10:ee:51:ac:cb:60:bc:a0:19:13:b6:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:7b:8c:8c:f3:ab:e6:2b:ca:b7:34:f1:c5:16:62:b7: 61:31:0f:5e:8c:55:4c:f8:08:6d:20:04:a4:01:cd:09: 5f:96:f9:da:b6:71:38:19:14:05:79:71:56:d7:b6:bb: ea:c1:b6:22:de:74:a0:69:94:ab:8d:05:3c:1b:bf:20: 04:75:d8:2c:af:0e:52:11:34:a0:16:9d:4a:99:3c:9f: 57:86:03:ac:35:e4:ca:2d:f1:78:1e:e7:cb:ab:91:e6: de:e8:ff:29:35:5b:80:9c:87:3c:6b:71:85:f4:23:45: d1:e8:2a:b7:f2:d2:af:8d:34:59:ec:91:db:83:83:47: 98:b4:fe:4b:cd:9f:26:09:bd:86:7d:98:03:b8:01:7c: 13:f1:ac:f2:78:c6:90:1f:3f:94:4f:67:10:84:34:12: 54:8e:62:30:8b:4f:93:0e:5c:6d:1a:0d:20:d6:36:cd: f9:a6:b5:d1:33:4b:fc:18:79:48:86:5b:0c:34:9e:cb: 3f:8d:ea:57:0a:b3:75:4e:c3:e3:fe:0b:e4:eb:70:47: 62:3c:ec:48:3c:eb:f2:e8:0c:18:88:6f:f2:7b:7e:c0: d1:f1:02:4d:37:c0:48:83:ce:a3:16:76:68:df:d4:86: 2b:8d:01:88:8e:b3:2b:93:1a:db:80:ec:a8:23:ae:4a Fingerprint (SHA-256): 0C:60:96:91:F7:F5:F1:6B:0E:A6:22:7F:9E:B6:04:93:08:50:B3:53:48:2E:FB:38:4D:3F:C6:33:12:67:89:36 Fingerprint (SHA1): 84:77:1A:0D:AE:79:DB:50:ED:0F:70:FF:E8:F0:FB:5A:C3:82:4A:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #329: Certificate Basic Constraints Extension (4) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:24 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:27 2021 Not After : Wed Nov 03 00:34:27 2021 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:6b:9a:36:90:6e:70:12:24:58:08:d1:36:fc:b9:55: 27:0c:88:99:91:47:7c:55:c1:4e:11:09:c5:54:ee:e0: 4a:1d:b8:db:d4:4c:40:81:2c:5e:e0:05:c6:5b:62:65: 8b:c9:15:20:a2:8c:f1:d0:b0:d0:78:b0:b6:d2:b5:81: 41:09:64:07:4e:dc:67:25:44:04:2e:27:9a:8a:bb:1b: 86:d7:9f:85:bf:f0:bd:89:79:91:a3:bf:5f:cb:9f:c8: 41:a2:72:fe:62:08:14:a3:ad:86:83:18:59:9d:5d:6a: 85:6d:76:e1:56:54:ca:23:37:c2:98:ac:f6:2e:c8:8c: 5e:40:23:cd:4a:ad:d9:4d:b4:74:fd:9f:7a:70:fa:a5: 86:d9:3f:91:2d:18:77:2a:24:d0:c1:ef:0d:62:5f:b4: c1:35:3e:8c:75:41:6d:22:c2:a6:ca:b3:b2:c2:81:94: 8e:e5:c9:72:db:c9:33:ca:09:0e:e0:a9:98:4d:a4:d2: cc:58:35:01:75:77:64:79:71:ad:ca:de:5b:bb:a9:11: b6:e0:3f:bf:90:c0:72:f6:c8:68:b1:af:b2:5b:7f:aa: 0f:58:ea:48:62:a2:c5:cb:a7:37:2e:28:fc:71:2f:7e: b0:d8:95:2d:58:56:90:43:84:9d:39:c6:e5:ec:41:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:ac:a3:58:ea:80:85:8b:d3:6d:13:31:90:be:ce:b1: ed:13:8a:94:cf:3d:81:f4:d0:de:cd:dc:15:96:54:8b: 52:9e:59:21:35:10:84:cd:66:77:ad:31:90:94:ca:63: 60:71:6d:9f:7b:39:7f:72:b0:6c:8c:20:9f:28:7c:2a: d1:f3:b1:8a:70:dc:f3:e6:bb:e4:f4:38:89:0a:1c:64: 15:68:b2:96:7c:cd:af:51:87:22:51:ed:a0:bd:a8:e5: c3:de:32:ae:41:e0:6c:10:be:95:c3:0e:ce:ef:fd:a0: ba:2d:fc:b7:88:14:8f:f6:3a:6a:f0:c3:c1:af:6a:92: 5b:02:63:c3:4b:1d:2a:df:da:79:2e:03:4c:56:24:fe: 4d:d1:9f:f2:dc:80:68:18:49:99:01:6f:1b:1b:f3:c0: 85:f3:58:b9:b3:f0:19:8c:32:ba:e0:b8:bb:e9:93:cd: 80:14:30:79:44:08:23:da:e7:7d:d1:c1:e6:f5:9f:4e: 02:d6:76:16:f9:45:62:7c:4e:64:45:5c:0d:0a:11:3f: 58:5a:24:1c:79:48:00:16:18:cc:53:f8:79:71:32:14: 80:24:23:4a:58:1b:c8:40:29:ad:15:5c:33:e1:9b:9c: 79:1d:1a:75:dc:a3:e4:a5:17:ff:31:d1:33:5b:88:40 Fingerprint (SHA-256): 21:CD:6D:A9:34:00:93:D3:E5:07:2A:4C:E6:35:C2:11:C3:64:08:B2:05:AA:C8:02:DA:9B:76:70:22:83:93:77 Fingerprint (SHA1): 7A:B4:CD:C1:A7:F0:50:0C:CB:3F:3C:D9:69:28:BE:B6:74:B4:03:90 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #330: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:25 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:28 2021 Not After : Wed Nov 03 00:34:28 2021 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:b7:51:17:4f:f1:08:68:b7:85:f3:a2:67:c1:e1:8a: 89:74:f7:16:f5:b2:d0:eb:18:5b:08:8b:7e:23:bb:47: 53:95:15:05:18:22:32:8f:48:01:0d:db:3e:09:a3:56: 5c:c8:ec:1e:9c:95:1b:ee:ef:2c:2c:0a:bb:8c:e5:9e: 19:de:cf:fb:4a:f6:5b:39:7c:c8:d9:29:70:33:9f:73: 3e:6f:88:55:c8:95:93:3c:9c:24:11:6f:50:97:0d:93: d4:99:3b:fe:f5:93:a4:3c:84:69:e0:55:b4:7e:a9:e6: 62:a0:e3:b6:e6:51:05:df:49:ae:34:ea:96:68:56:a3: 4a:42:14:0f:61:0e:f4:cb:b3:e6:be:45:3c:04:84:46: 5e:64:e3:e0:2f:74:f3:5f:e3:c5:7c:b8:2a:3a:80:b8: 22:0c:5c:09:76:98:81:63:ef:64:77:2a:72:30:83:5d: 08:65:c0:f6:63:83:77:b2:55:de:4f:4c:87:b3:c4:d3: 88:36:69:e8:12:3d:e8:b0:81:be:1c:32:da:75:c3:c5: 24:ef:67:e7:01:fb:e2:9a:0e:0b:18:98:97:53:1b:95: 12:bd:97:21:54:b2:86:5d:87:f1:52:8b:be:da:51:4b: 0b:3f:1f:f0:62:1c:a0:f3:d0:40:1d:c7:bc:82:27:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:ad:3d:97:5f:19:e5:2a:21:82:45:f3:1c:25:c6:20: d0:8d:40:bf:27:a5:31:0c:3d:d4:19:06:42:ae:9e:b8: 27:d0:ed:ec:5d:49:13:86:8b:d9:95:d6:04:ff:10:ac: 1c:22:38:42:4c:59:01:3d:66:ea:f4:7a:2b:ea:61:b1: 8a:a5:a4:b1:75:ed:6a:a6:e8:c6:b8:63:74:99:b7:b3: f3:21:d6:9e:d6:5b:22:2a:ac:6e:fc:b7:ba:9d:e0:08: e4:4d:6d:d4:3b:f1:7a:7e:db:6c:b4:9b:b1:2e:96:20: fe:d2:d5:85:7c:55:30:51:36:58:8d:c5:e4:38:6e:9e: 4d:09:da:b0:39:b0:b1:7e:f6:8b:cd:08:9f:23:4e:31: ad:96:36:bc:9f:74:12:58:7f:26:5f:b1:53:6b:2c:14: db:44:d2:1e:0c:e3:f5:94:9f:99:5a:49:79:3a:74:3d: f4:90:b7:c5:63:e9:ed:3f:e5:67:5c:d2:0c:88:91:68: d2:d3:15:10:a3:f7:ea:a1:15:b8:5a:ff:b3:0e:26:ec: 0a:c9:6e:5d:71:ea:b4:82:23:93:04:83:fe:a5:d0:c9: d7:07:29:47:2e:00:85:22:30:7a:80:be:3a:04:4e:47: 0d:e8:4b:6d:01:23:4f:f0:c9:37:b6:6d:b8:b6:29:e9 Fingerprint (SHA-256): 4C:5F:89:6B:6D:F4:20:71:83:1D:30:F5:0D:59:62:5A:86:2A:00:26:EE:A9:4D:1E:A9:AF:F8:41:31:CA:D2:F5 Fingerprint (SHA1): 04:6E:B3:9C:CE:24:9C:5B:99:CF:17:70:2D:4A:D7:FF:AF:86:5E:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:27 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:29 2021 Not After : Wed Nov 03 00:34:29 2021 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:3a:47:7f:83:5e:f7:22:43:79:be:bb:64:46:a7:ca: 30:68:1c:30:6c:0a:11:dc:69:c2:b7:d3:d7:fb:30:c4: dd:71:3f:dd:01:9a:80:8d:bb:54:b0:18:09:f5:67:19: 35:fc:a1:0e:99:c2:7b:69:80:0d:ce:8e:12:8e:a8:4c: 39:ce:42:45:c2:81:f8:fa:6c:6d:79:2d:a9:b4:d1:80: 91:05:11:65:7e:bc:e1:ab:72:90:ac:2d:f7:77:6d:55: ce:dc:2f:61:b3:b0:9e:0d:18:39:8b:6f:d7:6f:84:ff: a0:a1:e6:e2:8a:3c:2f:02:71:bc:b3:83:92:6b:bf:a1: f8:e6:a7:ee:e4:7b:c5:3c:cd:21:b9:c0:b3:b4:08:d0: 35:a7:40:d6:c9:ba:b8:7e:7a:fa:e7:a6:3f:ac:0b:e8: 6a:2f:d0:75:b8:af:57:8a:a5:03:93:81:90:a7:b5:13: a2:dd:a4:a2:75:59:34:f4:c5:88:e8:18:bd:1d:94:56: 98:2b:d6:ff:4e:6b:86:80:d7:27:46:7c:0b:18:eb:aa: fc:34:67:d3:d1:65:04:33:e2:ef:09:f9:7f:4b:96:7d: e1:85:47:f5:7e:01:aa:f1:df:a0:a7:75:ad:3d:fd:35: 42:99:a0:87:01:ca:88:38:f8:d8:93:88:6c:99:14:2d Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:de:66:6f:e1:6a:51:42:d1:3f:7f:4b:8c:33:29:90: e8:ad:9d:fe:83:40:ff:b6:ca:3f:d6:be:31:10:4e:1d: 7c:66:38:be:a1:a7:cf:47:61:d0:05:d0:09:88:63:cf: ea:9b:f2:75:5d:0c:37:71:51:00:82:99:39:20:18:bc: c4:3e:0b:80:00:96:a2:75:cb:5e:56:fc:04:29:aa:f4: f8:f5:6f:f5:62:69:01:2b:e1:13:ae:6a:83:5b:51:79: 70:c3:7b:8e:f2:0a:04:ec:0b:3f:11:2a:42:ed:35:4f: 04:bb:77:4a:da:5b:a8:8b:78:3e:9f:32:0c:b0:0a:46: 74:0e:74:19:33:fe:47:14:13:4f:32:5c:17:a4:10:ab: 2b:59:32:91:99:f7:9e:7a:f3:63:61:eb:d9:bc:5c:a6: d7:44:7f:b0:9c:38:53:4b:20:cd:e8:59:4b:86:48:06: 97:d3:f3:13:3b:63:a0:62:4b:e4:bc:38:9d:ae:16:33: 75:a0:1b:46:a1:97:6b:32:bf:f9:40:2d:7d:71:59:fe: ec:77:0b:b9:98:dd:ca:2e:97:af:26:99:b6:ff:6e:c2: 31:3c:96:93:ec:ae:f2:b2:5f:41:d0:24:82:5e:6c:49: 7b:77:02:ce:ee:58:49:d9:3d:58:fd:56:e1:0c:47:78 Fingerprint (SHA-256): 53:6C:AB:BD:FA:36:96:5D:C2:AF:95:3E:9A:0D:05:6D:1D:E5:68:FD:DE:33:98:44:F9:4A:9F:86:49:5F:02:39 Fingerprint (SHA1): 84:7A:DE:0C:EB:08:61:03:43:1B:13:79:CD:79:D2:CF:8E:08:1F:6E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: CRL Distribution Points Extension (7) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:29 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:30 2021 Not After : Wed Nov 03 00:34:30 2021 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:8f:1a:ee:e4:71:0f:1f:50:9f:e8:8a:45:1b:4a:f3: 2b:cd:10:c1:9b:ad:f5:77:1e:48:21:2d:b3:2a:f9:9a: ad:09:25:c6:9a:8b:6c:15:6d:e6:ac:c8:e3:06:48:5f: 2e:b0:4e:cb:94:77:6a:b6:63:af:c5:b5:73:23:df:81: 1e:ce:1e:0a:20:93:22:3f:71:8d:88:0e:d3:1b:31:2e: d1:f3:43:97:a3:f7:6e:d6:9a:f7:a5:80:a9:a9:21:13: f1:e3:6f:05:c3:a4:0f:75:2d:d4:e0:a8:76:6c:f2:28: cc:37:3f:3e:e0:2f:d1:9b:d1:33:6a:6d:1c:c4:ab:8a: 23:5f:dd:d7:0e:18:aa:ac:5a:6c:75:db:dc:5e:c4:5d: 4b:89:94:31:88:0c:b2:0d:da:9e:ca:3d:03:cd:1a:63: 34:34:59:d7:6b:a5:b7:cd:2d:cf:40:6a:96:d4:1c:6a: 6f:b0:de:b6:8a:87:e7:ec:7b:91:38:78:92:72:b9:0a: a1:96:5a:25:b3:50:7c:f0:b3:39:3b:b8:37:2e:fe:47: 7a:96:65:bf:30:96:5c:fa:29:fe:95:d5:2f:a1:a9:21: 87:44:61:9a:75:13:76:df:c5:e6:fb:cb:d3:e4:cf:d3: b7:80:80:6a:85:15:05:e8:c6:f1:d2:04:65:f6:ff:ef Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:8f:f9:88:71:a3:40:aa:92:89:01:c9:7a:45:09:a0: b4:ca:09:fc:c0:9a:21:fd:80:42:0a:2d:60:c1:17:5c: 94:21:cf:a7:9c:9c:e6:f0:8c:17:74:37:f5:1c:6e:a2: 7b:23:fb:36:08:b8:6b:1b:ea:37:7a:08:ed:c7:ef:c0: 71:f2:d9:8d:ed:b4:e4:4b:a2:f5:f5:fe:99:fe:c5:b8: d2:d5:7b:36:ad:ba:c5:4a:c1:59:ab:b2:18:f1:2d:a2: 66:07:a8:29:e5:5d:9e:1a:dc:53:0b:03:eb:51:e4:92: 0c:aa:30:c1:bb:b1:79:d3:87:64:04:16:e1:cd:91:1f: d2:f3:4e:03:ee:99:09:46:9a:4a:6f:0b:cf:44:77:71: 22:5a:75:3c:84:fa:9d:fa:7a:67:be:ed:74:10:4d:f3: aa:57:f2:bb:92:14:a4:d7:6f:1e:91:8a:fa:86:07:cd: 5a:af:46:c2:16:f3:bf:37:02:af:c6:f1:0a:2e:a6:bb: 51:b9:56:49:c9:54:1b:79:85:75:da:f5:2d:ee:65:db: ac:1e:77:9f:8d:7f:f9:c5:33:ba:6b:f6:4c:cf:fe:1e: 44:05:81:09:5b:15:86:61:08:56:9d:a5:1d:ef:b3:3c: 8c:bd:91:1d:8b:5d:f9:c7:d6:7c:db:21:23:b4:2e:56 Fingerprint (SHA-256): A1:B8:2C:ED:A1:8D:D9:4E:EF:F7:CA:9B:A6:F0:7E:EA:C5:69:92:2D:0B:39:FC:0A:47:A8:DA:8C:A1:E3:1C:6B Fingerprint (SHA1): 33:4D:2F:F4:06:95:18:D0:1B:F1:AA:92:31:B4:0A:BF:B1:CE:69:C3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: CRL Distribution Points Extension (8) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:2b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:31 2021 Not After : Wed Nov 03 00:34:31 2021 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:f2:bd:79:c3:5b:ab:e3:28:a1:15:72:bb:1e:d4:c5: 41:eb:36:f0:5a:6a:bf:4c:d8:2f:88:fa:b1:4b:8a:36: 8a:25:38:98:d0:55:32:ac:45:a4:59:b0:a6:a5:20:a6: cb:f8:1b:83:76:69:52:0e:71:45:8b:54:be:9c:ef:f1: f6:c1:e2:63:4a:96:97:6d:b7:d4:ab:e5:1a:f5:73:80: 02:9e:27:ed:f8:29:23:1d:84:59:41:6e:e4:d3:52:c5: 41:1a:fe:8a:78:29:2e:10:0a:be:3f:91:55:22:1c:ff: f9:36:29:33:2f:d9:ea:f4:70:91:04:ec:d2:73:b1:03: 6a:98:66:cd:fb:c5:d4:33:65:04:ed:0e:de:33:bd:90: 3d:d8:61:2b:2f:23:70:18:4a:78:ae:b5:c4:8a:dd:15: cf:d7:0e:29:91:e8:a9:14:03:cf:23:2d:be:1c:e6:e7: 52:ef:b1:5e:79:22:2b:e1:1f:07:66:83:15:75:95:4d: 3c:9d:29:86:c5:40:52:8d:66:c8:0c:a2:de:51:85:21: 18:ae:56:b4:8d:35:89:1c:c7:0f:00:3f:1c:1b:e7:60: ae:43:77:46:88:ab:c4:94:60:3f:ed:1c:6b:74:1c:ac: 04:e4:2d:14:94:f4:54:03:a0:61:1e:f6:de:08:8d:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:3b:7a:20:35:cd:e7:a4:9a:ee:76:91:7b:a7:c7:38: 2f:6a:8f:ba:cd:af:60:5c:0c:c6:19:9c:4d:25:6d:cc: f9:e8:f4:95:b9:32:b1:66:9c:b8:43:3e:a5:c5:49:08: 4c:13:f2:e6:35:e0:54:7b:e2:62:a2:19:ad:0b:0f:e9: c2:9a:1a:c1:5d:d1:81:ab:2d:16:d4:df:ff:b2:91:c2: 5d:af:2e:1c:b8:f0:27:9f:e5:7a:b0:21:e4:3d:ce:05: 59:52:33:07:14:9e:d5:63:68:cd:24:f7:63:37:ff:db: 87:dc:68:35:e6:d1:fe:0a:be:60:55:4b:31:63:b9:6c: d9:a6:fc:b4:cc:b5:6d:a3:f0:a4:51:db:1b:cd:5b:92: 2b:21:9f:15:ac:6b:0c:46:ce:cf:b9:59:43:79:76:19: 81:27:a2:c8:62:62:4e:bf:2f:f1:47:99:b0:0a:71:65: 64:16:ae:2b:3c:f8:d2:dc:11:26:d6:ba:65:65:96:3a: cd:9c:8b:9e:99:11:91:8a:3b:00:4b:9b:35:9c:4d:75: 27:a7:7d:29:0c:7d:c1:18:78:02:2f:46:6b:b5:3e:f5: 34:c0:c3:e3:2c:74:f3:b9:7c:3a:78:b8:aa:d4:c4:cd: 54:f2:b9:38:52:b1:cc:f9:d0:f8:0d:5d:f7:30:cf:62 Fingerprint (SHA-256): 8B:5B:8C:24:5E:FE:D8:AF:85:F0:9E:82:77:84:0F:92:D6:09:74:A5:F0:AE:B4:8C:26:94:CF:63:F9:8B:CF:37 Fingerprint (SHA1): 51:5C:1F:EF:41:2C:E1:F3:D6:E9:7B:9D:10:8B:D5:64:CA:DD:01:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Type Extension (9) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:2d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:32 2021 Not After : Wed Nov 03 00:34:32 2021 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:e2:4c:f6:b5:25:b6:48:78:a2:0f:56:83:a0:13:c1: a7:b6:ec:6f:c9:d9:65:33:a0:b2:bb:75:fa:a3:d0:2d: ff:0c:d5:eb:3d:d5:82:dc:0c:80:f4:e5:1a:e5:7f:cf: 6c:b4:68:f2:9d:9f:73:a8:d4:44:dc:25:fb:d7:ae:06: 84:57:bc:d4:f3:a1:6d:c7:76:9f:3a:92:64:d0:e6:05: af:bd:0f:96:fc:63:ca:01:92:a7:24:83:39:fc:be:a7: 88:2d:75:12:57:18:39:4e:c2:37:a7:bd:2f:e5:e0:3a: 83:24:53:6c:00:be:28:7c:fd:59:d0:1f:6a:14:c6:3d: 78:53:52:97:a6:69:9c:91:c5:4e:fd:0d:2c:59:51:88: e5:e8:0c:b9:ec:18:92:5a:1f:b7:b2:f2:25:ed:ed:ba: 49:5c:f0:00:25:31:d6:28:ff:21:a9:d5:0e:e1:1c:05: 73:b7:50:f6:48:b8:0a:9b:05:75:9a:94:f0:34:44:5b: 9b:dd:1c:71:dd:3a:66:17:30:a6:2d:10:a3:4a:e0:10: ac:70:f1:ca:9d:6f:3e:fb:db:72:04:80:de:10:3a:e9: a7:75:54:45:bf:55:3e:70:89:c8:fd:76:26:02:b4:48: 56:d6:66:93:00:cb:17:d7:c8:ba:60:32:ac:86:c5:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:52:80:02:b5:96:23:5f:30:ff:78:b5:54:c5:99:5d: 13:07:4c:c1:60:8c:5d:b2:47:f0:6d:06:3d:41:6e:f7: 19:60:cf:b4:b6:97:92:49:53:5c:cb:2e:e5:a0:54:fd: 2e:a2:c0:0d:51:24:0f:94:4d:77:0d:a1:2b:17:34:d6: f1:69:a8:cd:d6:56:cc:06:b6:c6:7e:fb:47:2d:d9:c9: e1:45:8b:3b:79:53:f4:5a:aa:3e:e8:34:be:f8:e4:48: eb:9a:67:bb:bb:9d:83:a8:38:76:04:0a:b8:1d:8e:20: 29:49:2b:26:40:d5:5c:17:09:16:6d:54:0c:aa:65:45: 92:40:53:81:ab:e3:60:04:37:c9:80:58:72:54:19:3f: d4:81:49:ff:4d:d4:d7:b7:d8:2c:16:57:8d:a6:a3:28: bd:72:e9:e7:3b:29:b7:87:84:d9:07:31:00:19:0b:53: c0:77:5f:3d:f0:9a:2f:f8:8a:36:a0:e0:07:a1:40:1b: 3c:0d:50:f8:de:f8:13:2e:3c:40:22:76:dd:d5:e5:07: 51:51:4b:d6:c9:c3:eb:08:85:a7:06:b6:6a:49:2e:3e: eb:9e:8e:a1:de:6b:f8:b6:42:eb:a0:41:02:ac:57:08: 2a:6e:61:36:d0:9a:0c:47:3d:21:f5:c9:85:b9:9b:06 Fingerprint (SHA-256): E9:9A:93:57:9A:31:04:C2:E7:7C:AE:3F:2C:4A:8C:58:5C:2A:E6:EC:26:4E:C6:E7:49:29:D0:79:C0:89:3F:E5 Fingerprint (SHA1): 39:B9:1D:9B:76:12:8F:5A:1C:EF:9A:A6:97:97:2C:ED:D6:84:70:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Extended Key Usage Extension (10) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:2f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:34:33 2021 Not After : Wed Nov 03 00:34:33 2021 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:b4:96:9d:74:0a:e6:32:c1:b3:3c:51:0d:08:a8:75: 77:13:b0:e5:6f:c5:01:79:8f:a6:26:15:62:c6:63:5d: e9:ae:43:be:28:b6:62:ef:4c:ce:51:64:3f:80:5f:2e: ca:38:e0:8c:5d:5d:cb:dc:fd:12:d2:68:e0:12:90:d6: e6:b3:1b:f0:84:e8:14:7d:88:00:2f:02:1e:b7:6e:32: 59:86:10:ac:5a:95:d8:7e:96:d7:e1:a3:e6:68:2a:48: 89:42:d7:46:6a:58:f9:bd:a7:7d:30:24:9e:17:4b:65: 92:23:ba:17:7d:8c:87:b0:6e:36:e1:50:79:89:6a:31: 17:35:30:a2:26:74:34:a8:4e:79:86:a8:82:48:e3:ac: 59:5b:9e:c4:e3:68:67:f0:ea:29:72:bf:90:19:1f:45: 4e:37:20:70:ce:da:99:f6:53:0c:d6:57:a3:0a:2c:ea: bd:07:79:c9:0a:02:d6:23:dd:cb:d2:76:f6:56:27:70: 9e:d5:a4:61:b1:7b:a5:41:66:cb:4a:01:e3:0f:bf:5b: fd:ea:f1:90:24:d1:b0:89:1d:4b:6d:d6:59:6e:42:68: 63:3e:7c:9a:29:f8:4c:08:34:42:16:93:c6:e8:bf:d6: 0e:d9:81:34:e8:a5:3f:62:f4:68:af:2b:7c:3d:db:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:cf:5b:a4:e6:ec:83:32:f5:8f:26:f9:5d:42:f4:dc: da:32:a5:08:32:0a:39:d4:16:79:37:09:3b:8b:78:37: 76:c8:3b:36:64:80:bc:24:a2:11:61:29:f2:65:1b:4d: 33:9a:1d:7d:bf:f8:83:5f:bd:70:b9:53:16:70:b4:e8: 97:3a:3b:12:19:9a:69:6c:62:2a:8e:74:30:c8:7f:03: ac:3c:10:f6:bc:d0:31:93:bd:15:52:42:c2:20:06:57: fe:92:86:a0:6b:ce:e9:1d:b3:12:2c:12:1a:83:2d:b2: b7:3b:f5:3d:7a:05:82:f3:d2:c7:fd:d0:7c:87:1d:5f: 8f:e4:e5:cb:b4:68:88:a7:95:6e:64:6b:82:0f:fa:50: ad:70:5c:b8:5e:69:cb:0e:9b:8e:31:7f:0b:03:30:89: 2e:44:da:68:3e:c5:a8:fc:d2:60:06:da:da:21:7a:bb: 5a:75:ba:a5:bc:c1:3f:3e:81:a7:09:c2:96:f7:1b:18: 7c:46:69:00:28:a3:ff:16:56:b4:f1:0a:b4:3f:e0:35: e8:d0:6a:ab:81:12:80:e5:fc:61:ee:31:6d:9a:63:56: 32:7d:6d:c3:e0:48:a1:32:8c:e3:25:1a:c5:e5:f3:32: 24:aa:4c:be:be:b1:e7:1e:69:af:cf:46:11:a1:c3:a3 Fingerprint (SHA-256): 92:A0:7E:32:B9:18:0C:A4:B3:3D:4C:73:E2:2A:92:D7:D0:91:A8:3D:A7:CF:35:B3:49:1C:5A:1F:09:EF:BD:D1 Fingerprint (SHA1): DE:D1:C2:2E:30:69:FE:0C:1F:93:93:C3:9A:67:17:3A:0A:8E:0B:89 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Key Usage Extension (11) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #337: create cert with invalid SAN parameter (12) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #338: create cert with invalid SAN parameter (13) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #339: create cert with valid SAN parameter (14) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:34 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Aug 03 00:34:36 2021 Not After : Wed Nov 03 00:34:36 2021 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:06:28:87:ab:1d:9c:ad:c3:e5:b3:f3:a9:61:bd:0e: c7:8d:fb:a5:22:ae:db:44:8f:2f:41:42:a6:1a:a3:96: 24:8f:89:0e:99:d1:8b:25:77:d5:9f:f6:57:47:f4:7c: 8a:c7:32:d1:16:82:2d:58:b3:83:07:0b:63:13:65:9c: 4d:c1:57:63:6a:81:15:69:53:f0:d7:f3:79:b7:db:d7: 4e:0c:39:79:72:07:9f:fa:98:1d:56:f2:1a:3d:9e:1f: 05:d0:fc:a3:42:e3:1c:45:2d:ed:19:a4:92:b5:0a:b7: db:1d:b7:db:bb:ef:22:77:a1:29:ed:b3:c0:9b:93:89: 47:72:fe:57:a5:15:b4:54:48:df:6c:f9:ea:40:98:f9: e0:c9:15:a2:c6:4a:ba:43:b9:82:bf:f8:53:03:d0:fb: f7:a5:39:ff:8d:71:33:fb:68:e8:36:ec:a8:29:3d:11: eb:b5:77:5f:35:4d:39:eb:fa:25:c7:d0:3f:92:0f:dc: fe:22:32:e6:2b:3a:f2:70:73:fa:47:23:59:af:cc:0f: 04:33:df:17:3d:11:6d:66:20:9d:e9:57:e1:8e:5d:62: cc:fd:ba:02:39:d6:e3:ef:18:01:71:8f:fa:23:55:19: 18:5f:7c:4b:36:3a:ba:b8:0e:f2:4a:df:4a:cb:1a:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:33:32:e0:77:3d:79:ba:f9:67:b7:04:da:02:fe:7f: ee:27:ac:83:58:27:94:1d:37:e2:2c:7e:31:49:35:37: ea:69:86:42:90:32:96:67:e8:25:75:c7:06:b7:ed:3c: 0f:f3:6b:78:23:6e:41:7b:7a:ce:74:8e:57:2a:f0:83: 2f:77:c2:d6:7b:61:63:68:70:ca:56:4e:a4:4f:e2:b8: 54:8c:d0:29:0c:c6:9a:d3:55:87:71:c9:ad:95:6e:33: 17:68:bb:5c:53:d7:a5:14:f8:1f:20:89:0e:1e:7e:92: 23:5e:e6:8b:d1:ad:59:71:16:e3:83:68:0e:b5:2b:b3: 20:8f:60:eb:c8:0a:e0:db:5a:43:58:9c:6c:1b:c0:4d: a1:35:e5:6b:cc:54:cf:f3:82:ea:db:2e:c4:e2:84:68: 13:44:fe:eb:39:be:99:ef:26:51:3c:37:cf:6c:f0:b4: ba:21:00:e4:0f:06:05:23:8c:45:7b:5f:76:a8:e0:9d: ac:15:f6:c1:c9:66:b7:c1:b6:7e:67:d3:bf:75:3f:bc: 4a:fa:1c:54:e6:6f:69:ac:ff:b0:c1:4a:62:9a:76:4a: db:c2:a5:86:39:50:49:6d:5f:4b:da:29:ed:f4:48:61: 3b:e9:d0:58:f7:52:ba:01:ce:54:96:6c:c6:65:05:6a Fingerprint (SHA-256): 68:00:65:5B:F8:A2:03:6B:B0:A4:6B:B4:C0:A1:3B:E1:D5:D8:B4:1E:19:BB:7D:2C:3F:2A:A0:84:63:DF:98:F7 Fingerprint (SHA1): 46:AE:0E:54:03:08:5E:64:66:C9:45:9B:6F:55:10:22:D2:B8:58:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: create cert with valid SAN parameter (15) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #341: dump extension 2.5.29.17 to file /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #342: create cert with valid SAN parameter (17) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #343: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #344: create cert with invalid generic ext parameter (19) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #345: create cert with invalid generic ext parameter (20) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #346: create cert with invalid generic ext parameter (21) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #347: create cert with valid generic ext parameter (22) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:9b:3a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Aug 03 00:34:39 2021 Not After : Wed Nov 03 00:34:39 2021 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:af:94:bb:46:e2:94:f6:30:ea:e1:27:34:2a:a2:3e: 13:ad:5e:48:d6:65:b6:b2:94:02:54:7f:66:2c:7a:0a: f3:43:49:e0:1f:c8:5d:64:f1:7f:ff:23:a5:c7:83:bb: a8:2b:4c:3f:66:66:94:56:d8:8d:00:87:f2:38:ea:4c: ec:a6:cb:ad:ae:a1:ab:26:e6:da:4d:04:fe:d5:9d:2c: 26:13:2f:6e:12:79:5a:20:0f:e2:20:b8:5d:b2:1f:ff: 24:ea:41:1f:38:f1:e3:eb:4e:75:12:d3:a8:0d:4d:09: 59:79:14:e1:4e:aa:df:4a:07:3a:6b:a4:fa:42:49:a3: 8d:79:c1:f0:ce:ce:e3:65:87:41:bc:12:e5:9e:b7:ce: ab:63:d0:29:4b:4c:01:0d:39:e4:9b:be:cb:32:2b:9d: 2a:5e:87:f7:83:f6:46:9e:ac:3c:49:72:46:83:46:d2: 21:37:9d:12:7a:59:f1:12:6e:29:fc:29:4e:35:fd:62: f3:3c:9f:9f:4f:d1:07:2b:c8:95:ff:cf:74:58:28:77: 34:1c:8e:16:43:e8:fa:2d:cd:e1:da:22:d1:43:af:33: 8d:97:72:b4:37:df:cb:45:b3:36:d0:05:10:7a:a6:28: 2b:dd:71:ce:b8:a4:64:dc:8a:75:2c:0c:5d:6b:f7:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:a7:12:50:e3:71:f3:57:d9:5c:f5:1c:2f:df:c4:e5: 00:b9:a6:a4:9a:49:b8:cb:ea:6e:95:6f:df:4d:6c:c0: 19:24:fd:8f:6d:d7:a1:10:a8:a4:11:6b:0c:20:5a:b0: 69:36:a7:2d:7f:26:de:25:1d:b6:13:b7:ef:c5:1b:cc: 27:45:cf:11:95:81:35:4f:c0:6f:48:07:1e:b8:98:ab: af:96:24:2f:21:57:e6:93:a7:38:9a:f0:dc:f0:fa:ea: 9a:b3:5d:91:b5:e7:13:25:9c:36:10:06:ed:e5:31:07: 61:d0:ff:b8:02:96:e3:32:4b:cf:fd:d9:68:ee:15:9b: f2:3b:83:fe:2f:87:bd:2b:39:d9:20:ca:8c:e2:7c:9e: 5b:07:db:9c:79:a1:41:20:66:d1:d6:f2:ef:fc:bd:0c: ca:b0:28:65:6f:76:47:e9:5a:bd:47:fb:eb:84:e6:86: 08:95:e6:02:74:eb:7d:f3:d2:e5:2b:97:4f:65:21:90: 99:ac:47:99:34:08:88:b9:58:5d:45:5f:82:3d:11:0f: bd:87:17:7a:3e:6c:9b:2e:2e:c8:76:35:7b:ae:92:42: e4:c9:11:a9:9b:2e:46:f7:1e:df:c6:e7:3e:a3:55:48: 13:73:65:f3:d4:ab:20:07:33:89:f9:44:86:4a:37:83 Fingerprint (SHA-256): 4B:18:C3:87:DB:B4:46:35:8B:D9:85:01:F1:EA:89:E8:67:F3:60:D5:B5:78:E8:42:AB:88:1A:4F:6D:EB:83:77 Fingerprint (SHA1): 45:EC:54:78:83:34:35:24:36:01:5F:98:87:A1:07:D7:3C:8F:39:6D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #348: create cert with valid generic ext parameter (23) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #349: create cert with valid generic ext parameter (24) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #350: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #351: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #352: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #353: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #354: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #355: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #356: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #357: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #358: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #359: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #360: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #361: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #362: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #363: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #364: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #365: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #366: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #367: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #368: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #369: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #370: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #371: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #372: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #373: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #374: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #375: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #376: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #377: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #378: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #379: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #380: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #381: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #382: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #383: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #384: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #385: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #386: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #387: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #388: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #389: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #390: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #391: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #392: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #397: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #400: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw cert.sh: #401: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #402: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #403: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #404: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #405: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #406: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #407: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #408: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #409: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #410: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #411: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #412: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #413: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #414: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #417: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #422: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #427: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #432: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #437: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #441: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #442: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #443: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #444: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #445: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #446: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #449: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #454: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #458: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa ae10d19454397aab5a9ee96434d292f9b068707c NSS Certificate DB:localhost.localdomain < 1> dsa 5004aa4e8f64aabd3f2942ba4ec0172c487d0777 NSS Certificate DB:localhost.localdomain-dsa < 2> dsa 27974bd12dddec1f0fd4813b7257b9d78065548e NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec 4dda708fea95e223f727d26b0e54f51514c5b97c NSS Certificate DB:localhost.localdomain-ec < 4> ec 5474d9ae74fb3049f1ed6f72e9e461f2aecfb80f NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa d9a58ed4a5c5aafc84185164781bc9d24a564c45 NSS Certificate DB:localhost-sni.localdomain < 7> dsa 1fe66264c0721551b68bb141056aa9b476475c5a NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa 1ea21570172165369ad16c15a018591e793c2871 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec 1614069d6a6f2fd8171fca603c5bef209f901a3b NSS Certificate DB:localhost-sni.localdomain-ec <10> ec b0997f5861451406cb5c8ec5899b17a6f2a9f9d4 NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa 54eefd01a051a8c6bbb8970e110b26065527656d (orphan) cert.sh: #459: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #460: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #461: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #462: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #463: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #464: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #465: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #466: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #467: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #468: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #469: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #470: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #471: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #472: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #473: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #474: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #475: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #476: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #477: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #478: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #479: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #480: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #481: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #482: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #483: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #484: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #485: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #486: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #487: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #488: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #489: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #490: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #491: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #492: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #493: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #494: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #495: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #496: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #497: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #498: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #499: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #500: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #501: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #502: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #503: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #504: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #505: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #506: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #507: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #508: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #509: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #510: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #511: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #512: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #513: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #514: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #515: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #516: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #517: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #518: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #519: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #520: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #521: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #522: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #523: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #524: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #525: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #526: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #527: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #528: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #529: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #530: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #531: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #532: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #533: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #534: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #535: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #536: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #537: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #538: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #539: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #540: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #541: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #542: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #543: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #544: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #545: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #546: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #547: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #548: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #549: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #550: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #551: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #552: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #553: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #554: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #555: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #556: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #557: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #558: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #559: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #560: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #561: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #562: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #563: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #564: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #565: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #566: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #567: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #568: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #569: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #570: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #571: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #572: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #573: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #574: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #575: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #576: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #577: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #578: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #579: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #580: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #581: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #582: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #583: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #584: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #585: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #586: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #587: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #588: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #589: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #590: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #591: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #592: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #593: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #594: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #595: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #596: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #597: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #598: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #599: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #600: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #601: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #602: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #603: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #604: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #605: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #606: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #607: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #608: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #609: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #610: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #611: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #612: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #613: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #614: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #615: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #616: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #617: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #618: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #619: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #620: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #621: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #622: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #623: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #624: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #625: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #626: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #627: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #628: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #629: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #630: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #631: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #632: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #633: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #634: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #635: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #636: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #637: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #638: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #639: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #640: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #641: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #642: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #643: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #644: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #645: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #646: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #647: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #648: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #649: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #650: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #651: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #652: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #653: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #654: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #655: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #656: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #657: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #658: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #659: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #660: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #661: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #662: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #663: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #664: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #665: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #666: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #667: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #668: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #669: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #670: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #671: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #672: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #673: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #674: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #675: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #676: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #677: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #678: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #679: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #680: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #681: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #682: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #683: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #684: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #685: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #686: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #687: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #688: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #689: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #690: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #691: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #692: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #693: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #694: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #695: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #696: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #697: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #698: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #699: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #700: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #701: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #702: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #703: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #704: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #705: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #706: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #707: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #708: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #709: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #710: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #711: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Tue Aug 3 00:35:38 UTC 2021 Running tests for tools TIMESTAMP tools BEGIN: Tue Aug 3 00:35:38 UTC 2021 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 94:29:d8:4f:4e:fd:fb:e6:eb:0f:38:07:ea:7d:61:f3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:0b:08:c4:84:9d:e9:90:7a:c6:49:aa:9c:1e:d0: 54:f0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:12:64:5d:9c:75:f7:8c:8d:de:f6:94:49:91:b1:cf Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:49:53:0a:ad:93:0f:d1:24:dd:10:f9:9d:80:c1: 15:a1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Aug 03 00:33:46 2021 Not After : Mon Aug 03 00:33:46 2071 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:07:ea:1b:f6:54:92:10:a5:b7:b2:5e:7d:05:d7: f5:93:47:0a:a5:35:a3:23:ff:56:13:93:f8:1e:32:29: eb:87:3e:29:55:f9:e1:85:dc:fe:3a:81:05:44:24:c8: a5:c1:b7:73:08:90:2c:11:6a:da:0d:a8:f6:ee:ea:36: a6:02:3f:01:b2:c5:60:e3:be:d0:14:70:74:7e:d8:5f: ab:24:2a:c3:b3:2a:ca:c4:c0:63:ca:f3:b7:00:e4:c9: ae:82:45:08:00:e9:44:d5:8f:e1:8a:9f:25:03:3f:50: 87:d9:8e:41:86:c7:a9:64:d3:e4:ed:0e:21:6a:f2:b6: 68:45:e3:1c:40 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:01:14:f5:80:5b:00:28:5e:85:d9:47: d2:c6:5a:03:7c:f1:48:ad:e8:e5:02:0a:37:77:22:88: 8d:47:88:e4:c4:12:a7:c6:f3:e6:84:c5:77:b2:9e:88: ae:09:67:f8:7f:dd:7f:09:e9:4e:99:72:0c:35:02:4d: e4:e2:e8:2d:69:d2:a6:02:41:44:23:71:fb:81:a8:2f: 7e:5a:e3:bd:41:da:61:f3:f2:b0:28:31:e3:45:bc:9d: 87:66:cf:17:b5:8c:4f:c9:2f:13:5e:92:0d:8b:e1:3e: 13:ea:51:24:d2:89:bc:12:d9:f1:31:6f:ed:fd:7c:61: 0d:06:ac:2f:94:57:6b:42:e5:6a Fingerprint (SHA-256): CC:B2:1A:7A:2B:CC:75:AA:95:56:4F:15:C0:78:0A:13:12:4A:4E:55:13:A4:E4:C4:88:AB:EC:97:6E:87:DA:F6 Fingerprint (SHA1): 3F:7E:E9:23:CC:47:DD:AB:AE:F9:62:67:C8:B4:A7:13:90:6C:83:1D Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:06:b3:67:09:2b:ab:b3:b3:4a:50:ce:0c:e2:f8:6f: a9:ce:2f:be:fd:40:61:0a:27:f4:79:ce:f0:fb:82:44: 78:c8:0f:16:3b:60:a0:96:cb:c9:e3:20:5e:6d:d8:bc: 79:fc:70:2a:a3:fa:18:85:73:d7:80:f5:95:59:39:5b: 49:46:70:5d:33:81:23:80:87:7b:fb:d6:43:33:06:b5: c5:39:5d:0d:81:69:2d:a7:7b:67:e1:2d:fd:49:94:05: 90 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:1f:8d:8e:91:cd:cd:2e:87:1e:ca:0b: fa:88:1b:36:8d:76:d8:d5:2c:c5:09:96:a9:e9:e8:0d: 90:f5:35:29:39:99:a0:a4:1e:18:d1:5b:de:23:95:2e: b4:89:71:c4:29:2c:ad:d9:53:3c:bf:a0:19:fa:a9:20: e6:c7:ac:46:1c:a2:02:42:01:b5:f6:93:47:f3:9e:bd: 71:e9:e1:fc:d1:e6:7e:97:35:fe:7c:3d:16:1c:71:3c: 52:5e:60:c3:8a:f4:1d:21:32:04:33:bd:1c:dc:19:89: 91:49:29:89:73:a6:53:66:44:fc:2a:b2:00:ca:ee:6a: 7b:51:2e:06:ee:a1:cd:72:dc:46 Fingerprint (SHA-256): 6B:1D:A1:67:A1:7C:29:81:76:E1:2C:1B:74:BE:B0:D0:48:CB:2E:E0:B5:37:18:F2:27:7D:E2:33:3A:6A:22:71 Fingerprint (SHA1): 36:D9:16:85:29:78:DD:FA:42:E9:11:41:74:47:7A:88:51:26:60:01 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #10: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 40:c4:11:21:46:05:3a:79:15:86:80:aa:cd:f0:02:a1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #11: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 21:b5:b3:81:be:1c:40:be:60:af:99:3d:53:a3:48:4d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6c:11:1e:40:fa:5e:97:40:0d:50:38:40:73:31:22:33 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a5:5a:b5:17:1a:2a:90:d6:fa:bd:38:aa:1a:7d:06:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #26: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8b:e4:82:5c:b7:3b:1a:27:54:48:6c:46:cf:09:12:d7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:6e:14:97:70:86:b7:c4:79:ec:cc:98:78:98:da: d5:fb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #30: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d3:20:bb:85:b2:53:d2:0b:6e:8b:17:9d:85:18:6d:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #34: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fb:06:0c:82:0f:eb:38:7e:a4:37:6d:0b:98:cb:85:d1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8f:93:64:d5:ac:1c:b3:be:b3:88:92:82:fd:e4: f2:f7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #38: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 89:93:5c:89:2a:a3:e1:0e:5e:6a:51:16:a8:8c:e8:bb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 3b:c7:c8:1d:9e:3b:06:50:e4:c2:b4:5b:15:75:aa:ac Iteration Count: 600000 (0x927c0) tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: c0:14:e7:2b:75:bf:23:4c:ba:d8:5c:c6:0b:b0:12:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ea:79:63:aa:83:cb:31:f5:cf:16:b7:7e:5b:88:b8:c8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 1d:7a:40:ef:1c:73:83:7a:ee:1a:73:1d:79:b0:10:ee Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ee:93:e2:51:ef:67:99:df:1b:97:f6:22:6d:be:b8:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ba:d6:a9:8d:44:60:f5:e6:4d:a7:64:19:15:c7:e2:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #66: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 43:ce:25:98:f0:62:af:33:40:28:2d:3e:67:f5:88:04 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:30:c8:0b:36:46:bc:be:f3:a4:cc:88:b8:b1:70: b2:c3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #70: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 36:b2:21:20:2d:02:a2:b4:99:af:0d:c9:eb:5f:f5:23 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #74: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:ad:07:b7:0b:ce:a6:d2:48:b2:41:d1:31:cc:0d:4e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8d:c7:78:04:f2:98:23:a2:cd:22:53:9a:48:7d: ee:1d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #78: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 22:e4:37:10:42:3e:1f:0a:93:56:06:d9:83:38:36:ba Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 96:52:d8:54:3e:db:22:13:5b:ac:d7:a4:ff:8b:c7:ec Iteration Count: 600000 (0x927c0) tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 85:b4:4a:30:2e:2b:df:f3:cb:48:35:ec:b0:d2:02:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1f:77:da:f6:7e:4b:82:a1:c2:e4:9f:39:08:99:09:ea Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f0:5f:a0:bd:d3:f9:bc:a4:32:8d:67:8c:8f:22:7a:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #98: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d3:64:b9:c4:4a:3f:eb:6f:14:97:61:9f:4b:84:9e:60 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:60:f1:3e:62:45:22:54:dd:3e:ba:b7:b1:f7:b0: 01:8d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #102: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 67:33:85:f6:3b:60:50:a2:ae:9d:74:d8:ae:3b:00:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #106: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 28:f8:e5:34:69:b0:09:3a:e1:df:56:3a:90:53:25:36 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:60:00:44:ab:84:21:89:c8:b0:13:31:98:8e:f7: 2d:39 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #110: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a7:35:d8:0d:61:a8:27:f6:e8:8c:85:56:dd:9b:b8:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 62:66:26:2f:22:31:4b:05:87:81:06:41:d7:41:d7:49 Iteration Count: 600000 (0x927c0) tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 28:b5:2e:5a:fa:9b:43:43:ce:64:0c:a0:46:79:3e:c7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 60:96:06:be:fd:42:d6:8f:9d:dc:cc:37:80:25:b7:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 49:59:06:61:54:45:63:24:93:e2:4b:d9:15:43:71:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 14:a2:70:88:91:b5:62:2f:a2:63:be:99:4f:cd:6a:bc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: ba:6d:f5:ba:95:98:4b:64:cd:ee:11:b0:4f:40:f1:24 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #138: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1a:e6:22:39:e2:89:12:b8:a8:57:50:60:25:10:90:87 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:57:26:8f:08:f5:e3:f5:f4:06:71:d0:d0:c3:b9: 02:f8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #142: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: e3:d0:0b:28:73:cc:16:81:74:13:63:06:cb:e6:13:84 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #146: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1c:f8:94:ca:47:92:33:16:f5:5f:c3:b3:74:6f:d3:63 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a8:93:78:83:14:15:03:e1:5d:3b:99:65:90:9d: 11:46 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #150: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 37:a7:5e:04:1f:70:2b:47:e5:00:92:93:43:0e:73:ad Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: c3:d4:2f:98:a7:d5:e7:90:e8:6c:74:69:16:ad:a4:4f Iteration Count: 600000 (0x927c0) tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 35:25:2f:1e:29:2e:65:37:4c:a6:a4:e3:77:89:96:35 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 11:60:51:09:d1:b3:ac:06:bd:f3:ef:ed:bf:05:76:f6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 4f:27:84:59:f5:1d:96:a1:98:cb:96:40:e8:56:41:07 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7f:20:4b:a4:89:44:ff:e5:2f:2a:ca:d3:c6:eb:de:59 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: f6:94:67:3a:6c:d9:12:c7:76:b9:7a:f6:9a:85:27:b8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #178: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:11:b6:3a:3b:5f:55:96:f5:31:20:31:33:a1:03:7e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b3:08:2c:18:ee:28:b9:87:ed:83:99:c6:83:f3: 37:4b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #182: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: aa:63:ff:8c:34:4b:c7:e4:3b:fe:ea:7f:d7:1c:07:c2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #186: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ea:78:fb:8d:fc:07:3b:bc:5e:d7:1d:90:fc:87:9a:a7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d6:d2:f8:a8:3c:17:79:00:81:ca:af:9e:08:af: 48:96 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #190: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 9f:5b:6b:b9:f1:db:e6:b2:c8:26:9f:58:96:92:af:92 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 85:41:8b:c5:1d:83:71:c0:be:55:0a:39:61:82:a6:2f Iteration Count: 600000 (0x927c0) tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: b3:1a:7e:98:1f:50:5a:27:57:ac:a2:98:c8:45:73:e6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 02:3b:26:1b:f9:13:dd:ad:a9:27:af:c0:83:ec:de:0d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b0:73:10:5c:c9:c3:33:54:15:27:5d:db:52:54:d9:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #210: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c1:9a:ec:90:20:4b:10:e6:3c:db:b8:91:42:a7:49:5e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b8:fc:ff:fc:5c:9a:62:0c:60:1f:26:27:8b:e8: 0b:3f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #214: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:5a:49:05:0c:7f:eb:c9:09:b6:2b:32:93:64:bd:6c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #218: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4d:86:09:40:0e:0e:34:ee:c4:a8:8c:ee:93:2d:40:d4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4f:11:22:38:68:e0:b3:6a:41:9e:24:5d:40:61: a4:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #222: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:d3:10:49:a0:e0:43:11:d6:73:ab:20:24:3d:13:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cb:cf:98:5a:01:92:59:46:97:b2:48:aa:2a:64:bc:e9 Iteration Count: 600000 (0x927c0) tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0b:a2:fd:99:0e:d9:98:3b:59:73:bb:90:71:93:98:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 72:d3:6b:c6:df:0c:59:22:32:d8:fd:18:f5:26:e8:d2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 38:d0:28:df:12:63:98:9b:d6:39:2d:ca:dd:42:f0:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a0:af:4c:7a:9b:fd:b3:31:ec:65:56:66:34:f3:46:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 46:6e:93:da:6e:15:ef:2c:43:b1:b3:87:fc:38:00:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #250: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 40:7e:f7:fe:30:c4:67:59:a0:a1:ca:5f:21:5c:e9:80 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:71:3d:92:e4:71:5e:c5:a5:60:d0:fd:d6:7c:f7: 85:c8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #254: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c8:6f:09:51:3b:0b:1e:41:e9:d4:ed:3e:f9:f7:28:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #258: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8f:ce:bd:ee:2b:85:a3:cb:cd:33:6b:eb:24:6c:7e:1c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:fa:d5:6c:1b:da:7c:d9:8a:eb:a3:19:2c:27:a0: a4:0f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #262: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 18:6c:07:e6:85:c8:36:e0:1a:78:e1:54:3c:c8:49:d6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c2:17:bc:09:a8:63:bd:2d:b2:88:9d:c2:23:43:43:52 Iteration Count: 600000 (0x927c0) tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 0b:2e:4b:4f:2e:80:a6:2e:26:54:1d:ce:f3:59:b2:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ca:93:db:07:c3:70:5b:46:a4:26:11:dd:a7:79:2a:cc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 10:48:29:6a:70:d5:46:a7:ac:c7:57:34:ce:0e:ae:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 33:dd:1e:18:b0:45:34:f6:af:2e:53:f6:2b:10:ce:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 10:55:0b:6b:c2:15:d1:9a:e4:fe:d2:00:c7:53:ff:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #290: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6d:11:09:78:a5:07:f4:d7:9a:67:f2:a4:fc:70:55:29 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:6f:22:74:19:70:99:bf:13:a6:bf:64:c2:7d:7a: dc:7a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #294: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 46:98:f7:e3:a7:d2:ae:21:33:b4:67:ae:54:53:0c:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #298: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fb:28:d2:28:04:72:63:11:ed:2b:6f:d7:f6:92:26:44 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c7:7d:64:01:20:43:42:67:c4:99:2f:e6:80:ef: 41:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #302: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 50:bb:64:d0:aa:50:73:62:8d:dc:ad:ab:74:45:f4:de Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: c1:cf:e1:d4:35:29:2f:01:e8:fb:41:8a:4c:34:53:eb Iteration Count: 600000 (0x927c0) tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 1d:c4:07:b1:ea:cd:4b:f3:a3:d3:0c:f3:d6:81:0b:63 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 96:ed:ec:c6:65:ec:4e:a1:a9:f1:d6:6c:bd:0d:01:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #318: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f8:9a:a7:75:de:be:5d:87:18:45:24:51:83:44:b8:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #322: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e7:55:26:d2:e6:72:f6:fd:bf:95:3a:8f:d5:5a:59:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #326: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8a:ff:3c:6c:d4:54:dc:c1:5a:be:0b:74:65:7a:42:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #330: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 25:c5:8d:d7:aa:a7:f6:db:b5:96:b4:e6:0f:30:c8:e9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cd:68:a3:3c:04:60:71:67:69:22:fc:94:91:72: 11:e7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #334: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9a:92:89:7d:69:a9:4e:9e:55:a6:a6:90:ac:47:3b:de Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #338: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 80:74:e3:34:08:f2:2e:45:a4:3c:21:86:b7:43:41:f4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:10:a1:82:33:34:43:5b:6f:2b:80:3b:82:6c:f7: 13:d0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #342: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a5:8d:c1:f9:0c:af:c3:67:20:6a:92:be:11:f4:07:4a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: fb:d0:59:cd:0f:2d:a0:06:15:cd:19:8f:10:3b:32:23 Iteration Count: 600000 (0x927c0) tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 89:ba:62:82:66:94:4f:89:6c:bf:43:97:5e:5a:96:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #354: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f5:96:4e:7d:98:9f:be:19:71:7e:b3:4f:b5:9f:3c:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #358: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b9:79:29:69:92:f5:f8:6d:38:1e:0d:0f:37:ae:e7:8e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #362: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e3:11:f8:98:fe:10:60:b1:72:1a:a7:bc:91:bf:11:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #366: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0a:99:f9:36:3e:13:87:7e:f0:66:2b:a0:cf:44:76:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #370: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:f9:f8:d4:4d:6b:2d:b5:ab:d3:5e:66:53:dd:a4:b0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:eb:84:22:a3:3e:db:f3:3a:8c:24:66:60:21:b2: 0d:71 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #374: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9e:31:ec:bf:3b:1d:a2:f2:25:fc:b5:96:9d:c2:f9:22 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #378: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 31:c7:bc:db:36:c5:1f:0a:f9:58:5c:01:c2:a1:36:49 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ed:36:6f:a1:cf:8c:76:a6:88:dd:50:af:10:49: d8:45 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #382: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:63:4a:7e:e3:9c:54:a5:00:3c:3f:28:fc:3b:46:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:c1:ed:85:ba:c9:d0:5e:39:5a:f3:66:e9:c4:54:d0 Iteration Count: 600000 (0x927c0) tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f9:17:03:9f:e5:00:77:9d:61:41:0b:ec:6f:7d:92:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #394: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 25:2d:7b:f0:2f:0b:b2:30:74:41:61:07:e2:70:3f:7f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #398: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:42:79:76:fa:84:a6:ad:1a:f5:0c:52:5b:fd:4e:af Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:4f:2a:b4:75:9f:ae:66:f3:6d:40:74:f3:7f:91: 97:2a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #402: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a5:9b:26:50:fc:b7:78:76:e7:aa:55:92:4d:e0:c0:b4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #406: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 99:ca:d4:fb:8f:0e:5d:da:05:41:b4:c4:be:1e:f0:9d Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:a2:97:6d:97:8b:d0:44:7b:06:c0:6f:10:ff:72: 0d:ed Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7e:c3:0b:8b:df:ca:78:65:56:01:9f:31:65:49:1c:bb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:04:19:1c:d4:c2:96:44:fe:06:50:68:f7:1b:8a: 09:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:67:5b:1a:e4:4c:43:cb:57:d7:b9:b2:b4:2a:bb:09 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:01:7f:57:90:d1:a9:65:5c:74:04:42:2e:b2:a2: a5:b2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #418: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 35:99:19:ce:98:ca:46:49:8d:ab:6b:14:ad:ff:34:a7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:57:af:d1:d7:29:c6:89:73:9d:50:0f:c4:00:d9: fc:f0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #422: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e1:79:02:66:08:5d:5d:04:6d:12:46:5a:ba:47:43:5b Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:63:9a:25:d1:70:f9:38:61:f7:2a:64:9c:4d:2b: dd:44 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a2:4b:f2:b1:cd:e5:e4:77:da:91:1f:66:48:f4:cb:67 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:72:09:13:ef:bf:bd:04:1f:11:c9:c5:e4:e7:f1: 71:d4 tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 00:f7:81:a7:2d:eb:04:04:94:c0:83:d1:94:aa:87:1f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:a7:b2:cd:7e:ac:bb:0a:ea:0f:1a:49:36:25:14: 25:f1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #434: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 54:e3:f4:0e:f0:25:b8:43:07:ba:a7:f9:e9:b4:be:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #438: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:07:ec:cb:80:fe:8b:6d:5d:31:9c:d7:01:57:f8:c0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:27:01:4d:ee:53:79:eb:99:ff:e8:6b:94:8b:2e: 34:85 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #442: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4a:6f:7e:d8:13:dd:be:ad:d3:f0:0d:3e:17:24:42:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #446: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: be:fc:b7:93:49:aa:86:ce:3e:2c:c4:2c:44:b4:d0:4f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:29:b4:c7:53:66:a8:39:84:b1:f5:3a:22:9b:d7: d7:3e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:61:61:74:35:7a:9a:b6:c2:c5:17:b0:56:e2:fd:26 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ee:14:0b:05:5c:12:4f:c3:6f:28:5c:1c:92:56: 84:e2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d3:e4:31:5b:0b:aa:cd:02:48:cd:92:6a:79:1a:2f:ce Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:96:6e:d1:ee:cf:7f:20:3b:b8:47:5f:38:98:70: 9b:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #458: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a1:c5:12:12:a2:54:ef:7b:2a:e1:8d:66:45:72:15:63 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:60:9f:62:7b:40:ad:78:b1:62:15:21:5c:58:45: 5e:9f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #462: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ca:8d:3d:3e:71:53:f4:9e:0b:4a:2d:ac:f7:82:0c:1d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:84:fc:22:43:9c:e7:5c:0c:63:75:68:25:c3:8a: f0:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:f4:7d:05:74:ec:90:7c:54:f2:30:a6:85:4f:6b:97 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:9f:5f:06:f3:21:96:3f:64:9d:09:ae:0e:c7:81: ec:81 tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:ea:a5:62:b3:de:9a:2a:68:5d:8d:5c:cd:4d:ce:b8 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:8d:5d:34:32:b8:b6:aa:55:ad:a7:39:66:28:fc: 97:e3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #474: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ae:66:9d:3b:31:a6:f3:08:ea:bb:0f:31:91:64:3f:ea Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #478: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:3b:1d:54:f1:7a:79:3d:7d:0f:ba:0f:af:51:41:b1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:3f:e8:5e:62:61:14:07:5a:88:b4:41:1f:fb:47: 77:e4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #482: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d2:5e:97:a9:29:d0:4e:fc:f5:22:a3:61:40:0c:a7:72 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #486: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 24:64:0f:4e:d2:79:ac:2f:70:0d:51:db:ec:a0:62:1d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:9a:df:a2:db:d6:f1:08:4d:c2:92:c7:4e:5c:34: 2b:53 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #490: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:18:df:23:de:ee:f7:00:b8:dd:8c:f9:d4:44:7e:93 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ba:c2:60:9f:88:cc:fb:a7:0a:42:50:c0:c2:03: 63:6d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #494: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 93:11:b9:a4:bd:83:d4:7f:3d:f8:89:a6:31:c2:e6:5f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:43:52:51:37:e8:15:40:bc:59:ff:c7:a2:14:d1: 4a:fb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 20:ce:35:a2:ee:a1:cf:a6:ae:1a:ce:46:52:0a:a8:0a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:d0:7e:40:10:0f:c5:23:11:59:be:0e:a7:56:33: 41:36 tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:e9:28:3a:a2:31:68:2f:3e:ba:a1:a7:62:bd:ac:50 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:3b:73:9a:0a:df:cb:07:02:1f:8f:f2:01:b9:09: 6c:94 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #506: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 64:0a:91:7c:93:c3:4c:c1:37:11:51:08:ca:06:e1:23 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #510: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c9:b0:a2:34:a4:b9:c9:f3:0e:a8:23:d4:06:b9:d8:1a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:f2:77:b8:1f:3b:80:43:9f:27:73:0c:42:f4:3c: 58:61 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #514: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d8:83:a4:40:52:1f:66:e7:0a:c3:a7:2f:b3:14:a5:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #518: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ca:2f:e7:cd:1d:fe:e4:1d:94:90:ad:d6:3a:2d:a7:0d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:7e:53:17:5e:eb:de:18:c1:2a:88:4b:0d:98:94: ff:39 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #522: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1f:4e:46:de:fa:dc:5e:86:d7:68:0b:71:34:e9:68:db Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:45:cb:a0:54:49:85:6c:83:82:3d:90:a2:20:b3: 23:0f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #526: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3c:91:ce:81:a2:c9:1a:69:7a:85:0d:40:e8:a9:62:b1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:35:2c:74:93:a5:e7:e0:9b:83:bd:53:53:d8:78: 01:33 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #530: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: be:df:a4:c0:99:3c:8d:12:ba:82:98:e4:86:44:f4:fb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1a:f8:ff:2c:fe:4f:88:e0:65:54:e0:7c:67:a2: 1e:04 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #534: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:88:99:81:8f:10:e3:b6:01:eb:88:c2:70:10:ae:5c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:3e:89:b6:f2:85:ff:90:8d:49:b4:f3:55:04:9a: f4:6c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8b:76:d3:6a:57:70:44:99:22:ae:e9:80:d2:e2:80:96 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:da:c8:39:11:6a:99:c5:e8:27:c4:c0:80:58:76: 23:ed tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 34:8a:c2:7f:7d:58:3e:4c:22:de:49:9a:5a:39:40:36 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:ce:01:be:a1:4f:46:4d:49:9b:26:8a:26:53:5e: e9:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #546: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5a:ed:73:8a:c0:e2:0b:67:71:17:fe:51:58:52:b9:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #550: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a6:a7:c0:f7:ec:cd:5c:07:a9:1f:7e:70:ec:1d:e3:41 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:f6:dd:70:39:a7:44:13:0f:5f:31:db:11:9a:16: 11:fd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #554: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:39:e1:85:a5:9e:a8:27:71:00:1d:a6:96:66:fb:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #558: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:65:67:10:c5:dd:94:3c:09:52:6b:39:20:cc:a4:75 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:7e:47:e2:6c:25:50:b4:6a:6c:0c:26:cf:ce:da: 63:a5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #562: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7b:cf:58:49:e5:a1:bc:2a:f1:da:39:56:9f:00:f1:54 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:de:fa:5c:3a:84:06:5e:6e:0b:e0:56:8a:3c:14: 6a:28 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #566: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:a0:16:2d:c2:e8:9c:aa:cc:3e:ab:f5:bf:16:d8:98 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:bd:e2:0b:42:da:9d:34:93:95:76:8d:11:54:01: 41:db Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #570: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ae:e8:ec:a5:be:13:44:01:25:20:77:79:83:da:5e:e3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:69:66:72:6a:a5:5e:fb:08:5f:4b:f4:67:0c:6f: c4:f8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #574: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ad:60:7f:56:e6:fb:c2:43:3d:c7:1f:95:64:ec:be:2d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:ab:b9:93:c4:df:cc:9b:53:9b:62:d3:97:f0:d9: 82:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 54:53:5f:27:ca:4c:ea:24:1f:dd:52:b3:5d:83:b0:0f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:9d:0d:31:58:97:98:2e:9b:ec:de:f1:a0:de:2f: ca:97 tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 94:5c:5c:20:ee:4e:fd:0b:ab:28:1f:73:75:6b:c8:40 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:e2:67:01:05:a2:44:5d:73:e8:4a:cc:d6:c4:2f: 7b:33 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #586: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 17:7a:5f:26:00:3c:86:d8:cb:2e:f7:da:af:85:88:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #590: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:e3:42:dd:ba:3b:14:f5:81:ac:47:d2:4b:c9:3a:17 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:6b:5b:7c:9a:5c:70:b0:c2:cb:ef:f0:21:48:97: 9e:34 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #594: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 42:00:ff:56:1f:da:98:a7:f4:7e:ab:fe:00:10:e5:c7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #598: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ec:66:f3:5d:9b:ea:32:16:a5:7b:08:3c:12:81:32:ac Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:44:30:ef:3e:64:b3:16:2a:e6:d1:0d:31:e3:6e: c0:2a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #602: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5a:7f:78:a9:5c:dd:1f:d6:c5:6a:a4:77:ef:c4:e1:03 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ea:38:fd:a2:02:3c:5f:cc:f6:aa:e1:48:f8:0c: 4d:30 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #606: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 68:45:05:9d:89:28:fc:ca:c2:f3:89:3d:7e:15:f8:b5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:1b:d1:14:e6:3d:31:20:41:6b:3c:02:90:6f:8c: bf:5a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #610: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b8:01:8c:c4:79:5a:ec:14:a4:1d:33:6a:71:91:3b:2e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:11:6b:3d:39:75:a9:ba:47:56:f5:52:69:4b:bc: 6b:54 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #614: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: be:9b:90:5f:68:46:87:90:1f:b1:73:7f:25:06:55:03 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:09:0e:76:f5:9e:b2:64:25:7d:33:86:25:de:79: 34:c9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ee:39:19:04:5f:b7:7c:a6:f5:ff:c2:6f:97:03:be:32 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:41:74:25:4c:99:58:26:ea:92:25:a6:cb:00:a5: af:22 tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b0:95:a0:b1:27:8f:09:d6:a3:3a:1f:20:28:88:0e:e9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:7f:eb:12:a4:1f:3a:bd:84:17:b2:8e:29:90:b5: cb:d3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #626: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e3:fc:c3:62:85:16:53:fa:92:fc:b3:58:fe:61:30:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1a:87:63:27:e3:35:73:cd:fa:cf:39:65:47:6d:5c:34 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 19:bd:be:06:ae:ca:7f:9c:7e:aa:27:b8:f7:b9:86:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f8:7c:2a:de:06:c1:d7:51:c6:23:2e:05:87:7b:3e:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ab:77:d4:9d:8f:1d:cc:4f:d5:06:d8:c2:21:7d:da:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fa:41:22:d6:e9:92:bf:0b:8b:e4:b3:bd:7c:08:a5:ad Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fa:3f:ac:5a:79:a9:dc:ed:d4:f1:25:55:d4:84:90:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 58:76:ea:88:04:27:e4:75:d5:ca:b6:61:d1:20:53:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 29:75:ab:b6:3a:30:07:57:84:96:ac:2a:48:36:08:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e3:1e:17:b2:f3:c8:0b:b1:ee:6f:8f:06:eb:f9:cb:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 14:f4:10:f3:ec:42:c5:4a:f4:73:89:7a:4b:d1:2a:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 41:df:98:52:40:75:ec:c0:15:cd:7f:22:67:e8:12:96 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #674: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 90:28:b1:3f:00:5c:c7:38:37:78:91:7e:3b:4b:fc:a1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:fe:0c:a7:94:4c:19:e1:f3:48:8f:f6:dc:e5:39: 5a:20 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 41:ea:c9:c0:00:5f:26:fc:6f:98:a7:fc:36:67:dc:b2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:c7:7e:a6:1a:30:63:21:c1:93:32:ac:d0:d3:42: ba:a6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a6:e6:b9:63:97:60:87:29:00:80:ce:43:cf:32:c0:1b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:5e:2f:f7:03:7a:1e:ef:df:4b:11:b9:85:c8:51: 9b:20 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 19:0f:05:71:ea:ae:58:58:e4:3e:f5:59:d4:0a:27:ff Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:50:23:1c:6a:ef:dd:4b:18:7a:6e:0b:11:09:60: d0:49 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0e:3b:f3:3a:9a:0a:89:6f:9a:46:40:ed:f3:46:27:0f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:b6:b7:0f:ec:4d:17:af:57:8c:6a:49:6e:0b:53: 8d:99 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d4:68:86:78:af:9a:13:24:2d:2c:4a:53:c9:e0:e5:8d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:e1:31:08:f4:bd:4a:7b:55:34:ee:eb:d0:ec:de: ac:5e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #698: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e9:00:ac:86:03:9d:37:30:c7:33:3c:e4:9d:c9:3a:03 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:70:ea:2e:5d:cd:ac:f6:d4:00:a0:2f:12:29:61: c6:8b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:a3:4a:6f:d1:5d:f9:46:41:19:74:be:17:62:fd:0b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:c0:d9:10:54:68:01:3e:f0:ce:ae:4c:ba:49:0f: 7b:5b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:8c:4c:57:37:59:7b:2b:58:e8:31:a8:04:85:df:fe Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:69:0d:f9:65:fc:3f:89:6a:50:70:06:6c:e5:3e: 9b:b0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:e9:ce:c7:ab:4f:a9:e3:c9:fd:b8:b6:cf:12:1d:8d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:4b:08:74:26:d5:53:d5:f4:6c:49:fb:27:87:9c: e4:2b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7b:91:36:44:71:03:b5:f9:cd:b9:3e:71:b1:e8:18:ec Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:53:ae:a4:28:9a:c5:e5:34:c3:24:58:00:90:5b: e8:d8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:default] (pk12util -o), - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f3:a8:1d:36:d2:68:3a:6f:dc:b9:e7:93:c7:6d:d3:04 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:6f:c2:3e:c5:d8:31:1f:66:d6:dc:ac:9e:df:d3: 54:21 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:33:36 2021 Not After : Mon Aug 03 00:33:36 2071 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:59:b7:7a:24:db:4b:cb:57:33:be:ba:f7:b0:db:99: d5:02:e4:8c:11:ee:da:21:ea:1e:b3:4f:9e:7d:3f:7a: f4:36:0d:8b:75:c2:53:16:e5:9c:c0:9e:c2:2a:1a:64: 06:93:1d:de:17:52:21:77:a7:34:f1:30:13:1a:e2:12: e5:48:15:d8:2e:79:33:5d:e9:61:2c:a2:c2:f5:94:1a: 27:2b:e6:85:d8:e7:c2:14:e8:41:f9:f7:7e:50:e5:4a: 87:4b:88:39:39:97:6c:47:65:25:5d:37:57:be:0b:81: d0:b4:77:45:2a:3f:0e:8e:dd:1d:ab:4c:dc:7c:d1:4e: 0e:76:64:c5:33:9f:7e:18:b1:1b:ec:d5:27:f4:68:c9: 67:ee:77:5b:d2:c8:d6:aa:09:df:3c:6c:a3:9c:c6:03: de:52:7a:a8:31:e3:e0:d4:37:25:36:cd:ba:4e:fd:bc: 62:1c:59:40:9d:b5:20:5b:83:e5:79:10:de:ff:23:d0: 35:e5:c0:9e:28:b8:3e:13:85:0b:51:a1:b7:c3:7b:98: 97:04:b1:b9:78:7b:03:ba:a5:6f:55:3d:74:6b:c6:00: f2:a9:af:be:fb:78:a4:2e:96:a7:64:c0:ce:02:c9:14: a7:92:dc:7d:a5:66:e0:52:59:2d:15:a6:ff:3b:c5:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:e7:cd:4a:6b:af:85:33:1a:55:de:b9:76:19:a1:f4: f7:62:07:2f:02:39:3c:21:46:94:f7:cd:f6:14:ba:cb: b9:b5:94:da:ad:b1:93:d9:ac:48:7f:2c:c3:ca:67:2a: 63:a7:02:8d:86:0a:09:80:00:26:1d:83:ed:ab:31:3b: c8:22:58:a0:9c:70:bd:58:5f:65:30:15:f6:b3:40:ac: f9:ea:ea:77:68:d6:bb:4f:a6:bd:08:55:52:87:7c:41: 89:b0:2a:fa:55:e8:02:09:18:33:aa:55:c6:54:26:b6: 82:52:23:51:e3:7a:ed:0d:26:0b:53:43:eb:3d:34:4f: b2:10:f8:4e:e6:f4:f3:e0:a9:e9:9b:30:4f:94:25:68: 5e:c6:e4:cf:0d:6c:98:94:2b:ee:b2:a6:ee:7b:12:3d: ac:b5:28:7f:ec:ae:7e:12:a6:db:f3:55:e0:31:5a:0f: e3:58:00:23:fc:6b:fe:c0:14:49:1d:10:50:54:2e:62: 79:37:59:e4:98:e3:4c:fa:e4:87:c7:47:23:40:d0:af: 64:de:89:91:db:3a:eb:2d:22:4a:43:11:c8:db:bf:48: 08:34:10:44:3b:d8:20:22:e0:6c:c1:63:c2:f1:a5:b8: d6:5c:45:36:bd:8f:5b:87:95:db:a4:78:61:03:78:0a Fingerprint (SHA-256): 47:63:92:A5:5B:27:62:99:F3:46:D2:71:82:FF:62:98:1C:4F:7C:7B:30:84:6C:CC:F8:9B:77:A5:0E:75:15:7D Fingerprint (SHA1): F3:F5:78:FE:BF:93:6E:C2:30:F1:35:8C:AB:5F:EC:56:4C:4C:5A:9C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Aug 03 00:34:09 2021 Not After : Mon Aug 03 00:34:09 2026 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:a3:8d:6a:84:15:8b:91:a4:e6:84:f1:29:08:41:da: 2e:dd:82:37:95:ac:9f:89:d0:06:22:6d:1b:83:59:43: ca:8c:15:ff:9a:41:f8:a5:fd:c3:9d:b3:5a:1f:79:39: 3d:9e:33:16:33:1b:f9:7a:ee:93:45:df:8a:a7:ce:a2: e3:27:1d:2a:55:66:85:63:87:0e:3e:8d:18:6a:88:5c: af:a6:f9:7e:a2:e2:af:35:8a:7e:d1:80:17:17:40:65: 33:6d:28:db:10:0e:45:36:39:bb:98:41:27:65:72:da: 0e:7f:b1:24:84:5b:22:ce:2b:9b:8d:e0:50:28:91:40: 3c:96:8e:66:19:92:70:cd:5a:0b:cb:5f:7f:ba:7b:e1: ef:0b:7b:6c:ae:93:d7:6e:20:f8:32:9c:39:72:34:b6: e6:c3:2e:2c:35:3f:cc:66:4b:13:ff:40:ec:3c:53:8e: 79:f3:96:2d:9e:6e:7b:08:d9:47:5c:2e:62:ee:f6:aa: 5e:7c:9e:8e:f7:ce:61:42:d7:75:e5:99:0a:a9:0c:ef: 92:fe:98:75:6b:14:a9:08:c4:20:0c:f1:e0:fa:e7:0d: 59:5a:a0:86:93:d6:3d:1f:76:f2:87:eb:f1:f3:fa:d3: 00:fc:c9:1f:2b:56:3c:28:32:21:67:c5:b9:38:b9:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:27:8a:30:f0:84:4d:97:30:c5:74:7f:d7:71:85:54: af:fd:80:5b:c8:5d:b0:ba:23:41:f0:7b:f1:e1:f7:b2: 49:45:47:b8:97:fd:f5:04:a7:61:c3:37:0d:f8:6a:98: a5:e8:91:40:33:84:1a:b3:d3:33:68:a5:d0:76:f4:5a: 1c:59:46:5f:e4:e5:8a:8a:96:4c:11:45:b1:6a:14:61: 4e:2a:68:71:f1:20:43:25:24:a0:d1:40:a1:f6:11:89: cc:8d:f0:d3:ac:49:16:f7:26:6f:fb:8e:51:73:af:4e: ce:82:60:fd:47:4f:52:0a:74:58:42:72:ed:d5:f4:82: 37:48:02:f6:1a:94:79:17:52:47:fb:75:a6:ff:a3:aa: 51:39:5e:a7:79:3e:dd:dd:74:49:be:4e:90:de:a6:fe: 50:8b:07:34:6b:c3:8f:63:58:0b:16:e5:f8:ce:b8:ff: 54:b3:18:cb:6d:9e:08:20:2a:39:af:94:2e:f5:b1:82: aa:a9:29:ef:d8:85:9c:ca:9f:06:69:36:28:21:1c:a7: 36:b4:8d:e0:26:39:3b:a3:9b:4e:2d:5e:f4:f2:9e:20: ce:1a:86:35:0f:37:c4:4d:be:4a:d5:cc:16:25:19:c2: ac:6c:b6:54:67:4c:72:51:64:e7:81:00:71:cd:1b:80 Fingerprint (SHA-256): 61:A4:17:05:7A:BE:57:8D:5E:1D:CB:F7:77:8C:2A:02:64:98:09:EF:B2:34:2F:E5:CA:4A:EA:E8:F3:AE:C4:FF Fingerprint (SHA1): 21:2B:78:1A:92:C0:99:2A:2A:33:8B:0A:23:63:BB:4C:B4:8D:CA:0D Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #721: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #722: Exporting with [default:none:default] (pk12util -o) - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/pk12util tools.sh: #723: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #724: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #726: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #727: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #728: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #729: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #730: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #731: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #732: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #733: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #734: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #735: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Tue Aug 3 00:47:59 UTC 2021 Running tests for ssl TIMESTAMP ssl BEGIN: Tue Aug 3 00:47:59 UTC 2021 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3279581 >/dev/null 2>/dev/null selfserv with PID 3279581 found at Tue Aug 3 00:48:00 UTC 2021 selfserv with PID 3279581 started at Tue Aug 3 00:48:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3279581 at Tue Aug 3 00:48:00 UTC 2021 kill -USR1 3279581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3279581 killed at Tue Aug 3 00:48:00 UTC 2021 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3279635 >/dev/null 2>/dev/null selfserv with PID 3279635 found at Tue Aug 3 00:48:00 UTC 2021 selfserv with PID 3279635 started at Tue Aug 3 00:48:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3279635 at Tue Aug 3 00:48:01 UTC 2021 kill -USR1 3279635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3279635 killed at Tue Aug 3 00:48:01 UTC 2021 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3279692 >/dev/null 2>/dev/null selfserv with PID 3279692 found at Tue Aug 3 00:48:01 UTC 2021 selfserv with PID 3279692 started at Tue Aug 3 00:48:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3279692 at Tue Aug 3 00:48:02 UTC 2021 kill -USR1 3279692 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3279692 killed at Tue Aug 3 00:48:02 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3279757 >/dev/null 2>/dev/null selfserv with PID 3279757 found at Tue Aug 3 00:48:02 UTC 2021 selfserv with PID 3279757 started at Tue Aug 3 00:48:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3279757 at Tue Aug 3 00:48:03 UTC 2021 kill -USR1 3279757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3279757 killed at Tue Aug 3 00:48:03 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3279817 >/dev/null 2>/dev/null selfserv with PID 3279817 found at Tue Aug 3 00:48:03 UTC 2021 selfserv with PID 3279817 started at Tue Aug 3 00:48:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3279817 at Tue Aug 3 00:48:04 UTC 2021 kill -USR1 3279817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3279817 killed at Tue Aug 3 00:48:04 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3279883 >/dev/null 2>/dev/null selfserv with PID 3279883 found at Tue Aug 3 00:48:04 UTC 2021 selfserv with PID 3279883 started at Tue Aug 3 00:48:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3279883 at Tue Aug 3 00:48:04 UTC 2021 kill -USR1 3279883 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3279883 killed at Tue Aug 3 00:48:04 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3279954 >/dev/null 2>/dev/null selfserv with PID 3279954 found at Tue Aug 3 00:48:05 UTC 2021 selfserv with PID 3279954 started at Tue Aug 3 00:48:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3279954 at Tue Aug 3 00:48:06 UTC 2021 kill -USR1 3279954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3279954 killed at Tue Aug 3 00:48:06 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280078 >/dev/null 2>/dev/null selfserv with PID 3280078 found at Tue Aug 3 00:48:06 UTC 2021 selfserv with PID 3280078 started at Tue Aug 3 00:48:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3280078 at Tue Aug 3 00:48:07 UTC 2021 kill -USR1 3280078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280078 killed at Tue Aug 3 00:48:07 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280234 >/dev/null 2>/dev/null selfserv with PID 3280234 found at Tue Aug 3 00:48:07 UTC 2021 selfserv with PID 3280234 started at Tue Aug 3 00:48:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3280234 at Tue Aug 3 00:48:08 UTC 2021 kill -USR1 3280234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280234 killed at Tue Aug 3 00:48:08 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280306 >/dev/null 2>/dev/null selfserv with PID 3280306 found at Tue Aug 3 00:48:08 UTC 2021 selfserv with PID 3280306 started at Tue Aug 3 00:48:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3280306 at Tue Aug 3 00:48:09 UTC 2021 kill -USR1 3280306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280306 killed at Tue Aug 3 00:48:09 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280360 >/dev/null 2>/dev/null selfserv with PID 3280360 found at Tue Aug 3 00:48:09 UTC 2021 selfserv with PID 3280360 started at Tue Aug 3 00:48:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3280360 at Tue Aug 3 00:48:09 UTC 2021 kill -USR1 3280360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280360 killed at Tue Aug 3 00:48:09 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280417 >/dev/null 2>/dev/null selfserv with PID 3280417 found at Tue Aug 3 00:48:10 UTC 2021 selfserv with PID 3280417 started at Tue Aug 3 00:48:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3280417 at Tue Aug 3 00:48:10 UTC 2021 kill -USR1 3280417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280417 killed at Tue Aug 3 00:48:10 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280496 >/dev/null 2>/dev/null selfserv with PID 3280496 found at Tue Aug 3 00:48:10 UTC 2021 selfserv with PID 3280496 started at Tue Aug 3 00:48:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3280496 at Tue Aug 3 00:48:11 UTC 2021 kill -USR1 3280496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280496 killed at Tue Aug 3 00:48:11 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280551 >/dev/null 2>/dev/null selfserv with PID 3280551 found at Tue Aug 3 00:48:11 UTC 2021 selfserv with PID 3280551 started at Tue Aug 3 00:48:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3280551 at Tue Aug 3 00:48:12 UTC 2021 kill -USR1 3280551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280551 killed at Tue Aug 3 00:48:12 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280609 >/dev/null 2>/dev/null selfserv with PID 3280609 found at Tue Aug 3 00:48:12 UTC 2021 selfserv with PID 3280609 started at Tue Aug 3 00:48:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3280609 at Tue Aug 3 00:48:13 UTC 2021 kill -USR1 3280609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280609 killed at Tue Aug 3 00:48:13 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280678 >/dev/null 2>/dev/null selfserv with PID 3280678 found at Tue Aug 3 00:48:13 UTC 2021 selfserv with PID 3280678 started at Tue Aug 3 00:48:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3280678 at Tue Aug 3 00:48:14 UTC 2021 kill -USR1 3280678 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280678 killed at Tue Aug 3 00:48:14 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280758 >/dev/null 2>/dev/null selfserv with PID 3280758 found at Tue Aug 3 00:48:14 UTC 2021 selfserv with PID 3280758 started at Tue Aug 3 00:48:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3280758 at Tue Aug 3 00:48:15 UTC 2021 kill -USR1 3280758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280758 killed at Tue Aug 3 00:48:15 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280812 >/dev/null 2>/dev/null selfserv with PID 3280812 found at Tue Aug 3 00:48:15 UTC 2021 selfserv with PID 3280812 started at Tue Aug 3 00:48:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3280812 at Tue Aug 3 00:48:16 UTC 2021 kill -USR1 3280812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280812 killed at Tue Aug 3 00:48:16 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280888 >/dev/null 2>/dev/null selfserv with PID 3280888 found at Tue Aug 3 00:48:16 UTC 2021 selfserv with PID 3280888 started at Tue Aug 3 00:48:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3280888 at Tue Aug 3 00:48:17 UTC 2021 kill -USR1 3280888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280888 killed at Tue Aug 3 00:48:17 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3280943 >/dev/null 2>/dev/null selfserv with PID 3280943 found at Tue Aug 3 00:48:17 UTC 2021 selfserv with PID 3280943 started at Tue Aug 3 00:48:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3280943 at Tue Aug 3 00:48:18 UTC 2021 kill -USR1 3280943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3280943 killed at Tue Aug 3 00:48:18 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281015 >/dev/null 2>/dev/null selfserv with PID 3281015 found at Tue Aug 3 00:48:18 UTC 2021 selfserv with PID 3281015 started at Tue Aug 3 00:48:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3281015 at Tue Aug 3 00:48:18 UTC 2021 kill -USR1 3281015 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281015 killed at Tue Aug 3 00:48:18 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281085 >/dev/null 2>/dev/null selfserv with PID 3281085 found at Tue Aug 3 00:48:19 UTC 2021 selfserv with PID 3281085 started at Tue Aug 3 00:48:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3281085 at Tue Aug 3 00:48:19 UTC 2021 kill -USR1 3281085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281085 killed at Tue Aug 3 00:48:19 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281158 >/dev/null 2>/dev/null selfserv with PID 3281158 found at Tue Aug 3 00:48:19 UTC 2021 selfserv with PID 3281158 started at Tue Aug 3 00:48:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3281158 at Tue Aug 3 00:48:20 UTC 2021 kill -USR1 3281158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281158 killed at Tue Aug 3 00:48:20 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281234 >/dev/null 2>/dev/null selfserv with PID 3281234 found at Tue Aug 3 00:48:20 UTC 2021 selfserv with PID 3281234 started at Tue Aug 3 00:48:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3281234 at Tue Aug 3 00:48:21 UTC 2021 kill -USR1 3281234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281234 killed at Tue Aug 3 00:48:21 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281413 >/dev/null 2>/dev/null selfserv with PID 3281413 found at Tue Aug 3 00:48:21 UTC 2021 selfserv with PID 3281413 started at Tue Aug 3 00:48:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3281413 at Tue Aug 3 00:48:22 UTC 2021 kill -USR1 3281413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281413 killed at Tue Aug 3 00:48:22 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281472 >/dev/null 2>/dev/null selfserv with PID 3281472 found at Tue Aug 3 00:48:22 UTC 2021 selfserv with PID 3281472 started at Tue Aug 3 00:48:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3281472 at Tue Aug 3 00:48:23 UTC 2021 kill -USR1 3281472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281472 killed at Tue Aug 3 00:48:23 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281533 >/dev/null 2>/dev/null selfserv with PID 3281533 found at Tue Aug 3 00:48:23 UTC 2021 selfserv with PID 3281533 started at Tue Aug 3 00:48:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3281533 at Tue Aug 3 00:48:24 UTC 2021 kill -USR1 3281533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281533 killed at Tue Aug 3 00:48:24 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281611 >/dev/null 2>/dev/null selfserv with PID 3281611 found at Tue Aug 3 00:48:24 UTC 2021 selfserv with PID 3281611 started at Tue Aug 3 00:48:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3281611 at Tue Aug 3 00:48:25 UTC 2021 kill -USR1 3281611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281611 killed at Tue Aug 3 00:48:25 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281666 >/dev/null 2>/dev/null selfserv with PID 3281666 found at Tue Aug 3 00:48:25 UTC 2021 selfserv with PID 3281666 started at Tue Aug 3 00:48:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3281666 at Tue Aug 3 00:48:26 UTC 2021 kill -USR1 3281666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281666 killed at Tue Aug 3 00:48:26 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281721 >/dev/null 2>/dev/null selfserv with PID 3281721 found at Tue Aug 3 00:48:26 UTC 2021 selfserv with PID 3281721 started at Tue Aug 3 00:48:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3281721 at Tue Aug 3 00:48:26 UTC 2021 kill -USR1 3281721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281721 killed at Tue Aug 3 00:48:26 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281787 >/dev/null 2>/dev/null selfserv with PID 3281787 found at Tue Aug 3 00:48:27 UTC 2021 selfserv with PID 3281787 started at Tue Aug 3 00:48:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3281787 at Tue Aug 3 00:48:27 UTC 2021 kill -USR1 3281787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281787 killed at Tue Aug 3 00:48:27 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281853 >/dev/null 2>/dev/null selfserv with PID 3281853 found at Tue Aug 3 00:48:27 UTC 2021 selfserv with PID 3281853 started at Tue Aug 3 00:48:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3281853 at Tue Aug 3 00:48:28 UTC 2021 kill -USR1 3281853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281853 killed at Tue Aug 3 00:48:28 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:48:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281915 >/dev/null 2>/dev/null selfserv with PID 3281915 found at Tue Aug 3 00:48:28 UTC 2021 selfserv with PID 3281915 started at Tue Aug 3 00:48:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3281915 at Tue Aug 3 00:48:29 UTC 2021 kill -USR1 3281915 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281915 killed at Tue Aug 3 00:48:29 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3281984 >/dev/null 2>/dev/null selfserv with PID 3281984 found at Tue Aug 3 00:48:29 UTC 2021 selfserv with PID 3281984 started at Tue Aug 3 00:48:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3281984 at Tue Aug 3 00:48:30 UTC 2021 kill -USR1 3281984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3281984 killed at Tue Aug 3 00:48:30 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282040 >/dev/null 2>/dev/null selfserv with PID 3282040 found at Tue Aug 3 00:48:30 UTC 2021 selfserv with PID 3282040 started at Tue Aug 3 00:48:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3282040 at Tue Aug 3 00:48:31 UTC 2021 kill -USR1 3282040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282040 killed at Tue Aug 3 00:48:31 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:48:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282103 >/dev/null 2>/dev/null selfserv with PID 3282103 found at Tue Aug 3 00:48:31 UTC 2021 selfserv with PID 3282103 started at Tue Aug 3 00:48:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3282103 at Tue Aug 3 00:48:32 UTC 2021 kill -USR1 3282103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282103 killed at Tue Aug 3 00:48:32 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282180 >/dev/null 2>/dev/null selfserv with PID 3282180 found at Tue Aug 3 00:48:32 UTC 2021 selfserv with PID 3282180 started at Tue Aug 3 00:48:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3282180 at Tue Aug 3 00:48:33 UTC 2021 kill -USR1 3282180 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282180 killed at Tue Aug 3 00:48:33 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:33 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282235 >/dev/null 2>/dev/null selfserv with PID 3282235 found at Tue Aug 3 00:48:33 UTC 2021 selfserv with PID 3282235 started at Tue Aug 3 00:48:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3282235 at Tue Aug 3 00:48:34 UTC 2021 kill -USR1 3282235 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282235 killed at Tue Aug 3 00:48:34 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282297 >/dev/null 2>/dev/null selfserv with PID 3282297 found at Tue Aug 3 00:48:34 UTC 2021 selfserv with PID 3282297 started at Tue Aug 3 00:48:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3282297 at Tue Aug 3 00:48:35 UTC 2021 kill -USR1 3282297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282297 killed at Tue Aug 3 00:48:35 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:48:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282375 >/dev/null 2>/dev/null selfserv with PID 3282375 found at Tue Aug 3 00:48:35 UTC 2021 selfserv with PID 3282375 started at Tue Aug 3 00:48:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3282375 at Tue Aug 3 00:48:35 UTC 2021 kill -USR1 3282375 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282375 killed at Tue Aug 3 00:48:35 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:48:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282459 >/dev/null 2>/dev/null selfserv with PID 3282459 found at Tue Aug 3 00:48:35 UTC 2021 selfserv with PID 3282459 started at Tue Aug 3 00:48:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3282459 at Tue Aug 3 00:48:36 UTC 2021 kill -USR1 3282459 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282459 killed at Tue Aug 3 00:48:36 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:48:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282577 >/dev/null 2>/dev/null selfserv with PID 3282577 found at Tue Aug 3 00:48:36 UTC 2021 selfserv with PID 3282577 started at Tue Aug 3 00:48:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3282577 at Tue Aug 3 00:48:37 UTC 2021 kill -USR1 3282577 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282577 killed at Tue Aug 3 00:48:37 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:48:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282684 >/dev/null 2>/dev/null selfserv with PID 3282684 found at Tue Aug 3 00:48:37 UTC 2021 selfserv with PID 3282684 started at Tue Aug 3 00:48:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3282684 at Tue Aug 3 00:48:38 UTC 2021 kill -USR1 3282684 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282684 killed at Tue Aug 3 00:48:38 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:48:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282749 >/dev/null 2>/dev/null selfserv with PID 3282749 found at Tue Aug 3 00:48:38 UTC 2021 selfserv with PID 3282749 started at Tue Aug 3 00:48:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3282749 at Tue Aug 3 00:48:39 UTC 2021 kill -USR1 3282749 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282749 killed at Tue Aug 3 00:48:39 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:48:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282811 >/dev/null 2>/dev/null selfserv with PID 3282811 found at Tue Aug 3 00:48:39 UTC 2021 selfserv with PID 3282811 started at Tue Aug 3 00:48:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3282811 at Tue Aug 3 00:48:40 UTC 2021 kill -USR1 3282811 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282811 killed at Tue Aug 3 00:48:40 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282883 >/dev/null 2>/dev/null selfserv with PID 3282883 found at Tue Aug 3 00:48:41 UTC 2021 selfserv with PID 3282883 started at Tue Aug 3 00:48:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3282883 at Tue Aug 3 00:48:41 UTC 2021 kill -USR1 3282883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282883 killed at Tue Aug 3 00:48:41 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3282947 >/dev/null 2>/dev/null selfserv with PID 3282947 found at Tue Aug 3 00:48:41 UTC 2021 selfserv with PID 3282947 started at Tue Aug 3 00:48:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3282947 at Tue Aug 3 00:48:42 UTC 2021 kill -USR1 3282947 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3282947 killed at Tue Aug 3 00:48:42 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3283039 >/dev/null 2>/dev/null selfserv with PID 3283039 found at Tue Aug 3 00:48:42 UTC 2021 selfserv with PID 3283039 started at Tue Aug 3 00:48:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3283039 at Tue Aug 3 00:48:43 UTC 2021 kill -USR1 3283039 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3283039 killed at Tue Aug 3 00:48:43 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:48:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3283112 >/dev/null 2>/dev/null selfserv with PID 3283112 found at Tue Aug 3 00:48:43 UTC 2021 selfserv with PID 3283112 started at Tue Aug 3 00:48:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3283112 at Tue Aug 3 00:48:44 UTC 2021 kill -USR1 3283112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3283112 killed at Tue Aug 3 00:48:44 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:48:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3283188 >/dev/null 2>/dev/null selfserv with PID 3283188 found at Tue Aug 3 00:48:44 UTC 2021 selfserv with PID 3283188 started at Tue Aug 3 00:48:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3283188 at Tue Aug 3 00:48:45 UTC 2021 kill -USR1 3283188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3283188 killed at Tue Aug 3 00:48:45 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:48:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3283280 >/dev/null 2>/dev/null selfserv with PID 3283280 found at Tue Aug 3 00:48:45 UTC 2021 selfserv with PID 3283280 started at Tue Aug 3 00:48:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3283280 at Tue Aug 3 00:48:45 UTC 2021 kill -USR1 3283280 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3283280 killed at Tue Aug 3 00:48:45 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:48:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3283377 >/dev/null 2>/dev/null selfserv with PID 3283377 found at Tue Aug 3 00:48:46 UTC 2021 selfserv with PID 3283377 started at Tue Aug 3 00:48:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3283377 at Tue Aug 3 00:48:46 UTC 2021 kill -USR1 3283377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3283377 killed at Tue Aug 3 00:48:47 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:48:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3283493 >/dev/null 2>/dev/null selfserv with PID 3283493 found at Tue Aug 3 00:48:47 UTC 2021 selfserv with PID 3283493 started at Tue Aug 3 00:48:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3283493 at Tue Aug 3 00:48:48 UTC 2021 kill -USR1 3283493 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3283493 killed at Tue Aug 3 00:48:48 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:48:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3283714 >/dev/null 2>/dev/null selfserv with PID 3283714 found at Tue Aug 3 00:48:48 UTC 2021 selfserv with PID 3283714 started at Tue Aug 3 00:48:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3283714 at Tue Aug 3 00:48:49 UTC 2021 kill -USR1 3283714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3283714 killed at Tue Aug 3 00:48:49 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3283945 >/dev/null 2>/dev/null selfserv with PID 3283945 found at Tue Aug 3 00:48:49 UTC 2021 selfserv with PID 3283945 started at Tue Aug 3 00:48:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3283945 at Tue Aug 3 00:48:50 UTC 2021 kill -USR1 3283945 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3283945 killed at Tue Aug 3 00:48:50 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3284035 >/dev/null 2>/dev/null selfserv with PID 3284035 found at Tue Aug 3 00:48:50 UTC 2021 selfserv with PID 3284035 started at Tue Aug 3 00:48:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3284035 at Tue Aug 3 00:48:50 UTC 2021 kill -USR1 3284035 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3284035 killed at Tue Aug 3 00:48:50 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3284220 >/dev/null 2>/dev/null selfserv with PID 3284220 found at Tue Aug 3 00:48:51 UTC 2021 selfserv with PID 3284220 started at Tue Aug 3 00:48:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3284220 at Tue Aug 3 00:48:51 UTC 2021 kill -USR1 3284220 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3284220 killed at Tue Aug 3 00:48:51 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:48:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3284463 >/dev/null 2>/dev/null selfserv with PID 3284463 found at Tue Aug 3 00:48:51 UTC 2021 selfserv with PID 3284463 started at Tue Aug 3 00:48:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3284463 at Tue Aug 3 00:48:52 UTC 2021 kill -USR1 3284463 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3284463 killed at Tue Aug 3 00:48:52 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:48:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3284750 >/dev/null 2>/dev/null selfserv with PID 3284750 found at Tue Aug 3 00:48:52 UTC 2021 selfserv with PID 3284750 started at Tue Aug 3 00:48:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3284750 at Tue Aug 3 00:48:53 UTC 2021 kill -USR1 3284750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3284750 killed at Tue Aug 3 00:48:53 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:48:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3284843 >/dev/null 2>/dev/null selfserv with PID 3284843 found at Tue Aug 3 00:48:53 UTC 2021 selfserv with PID 3284843 started at Tue Aug 3 00:48:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3284843 at Tue Aug 3 00:48:54 UTC 2021 kill -USR1 3284843 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3284843 killed at Tue Aug 3 00:48:54 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:48:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3284951 >/dev/null 2>/dev/null selfserv with PID 3284951 found at Tue Aug 3 00:48:54 UTC 2021 selfserv with PID 3284951 started at Tue Aug 3 00:48:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3284951 at Tue Aug 3 00:48:55 UTC 2021 kill -USR1 3284951 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3284951 killed at Tue Aug 3 00:48:55 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:48:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3285065 >/dev/null 2>/dev/null selfserv with PID 3285065 found at Tue Aug 3 00:48:55 UTC 2021 selfserv with PID 3285065 started at Tue Aug 3 00:48:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3285065 at Tue Aug 3 00:48:56 UTC 2021 kill -USR1 3285065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3285065 killed at Tue Aug 3 00:48:56 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:48:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3285223 >/dev/null 2>/dev/null selfserv with PID 3285223 found at Tue Aug 3 00:48:56 UTC 2021 selfserv with PID 3285223 started at Tue Aug 3 00:48:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3285223 at Tue Aug 3 00:48:57 UTC 2021 kill -USR1 3285223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3285223 killed at Tue Aug 3 00:48:57 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3285456 >/dev/null 2>/dev/null selfserv with PID 3285456 found at Tue Aug 3 00:48:57 UTC 2021 selfserv with PID 3285456 started at Tue Aug 3 00:48:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3285456 at Tue Aug 3 00:48:58 UTC 2021 kill -USR1 3285456 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3285456 killed at Tue Aug 3 00:48:58 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3285575 >/dev/null 2>/dev/null selfserv with PID 3285575 found at Tue Aug 3 00:48:58 UTC 2021 selfserv with PID 3285575 started at Tue Aug 3 00:48:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3285575 at Tue Aug 3 00:48:59 UTC 2021 kill -USR1 3285575 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3285575 killed at Tue Aug 3 00:48:59 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:48:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:48:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3285668 >/dev/null 2>/dev/null selfserv with PID 3285668 found at Tue Aug 3 00:48:59 UTC 2021 selfserv with PID 3285668 started at Tue Aug 3 00:48:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3285668 at Tue Aug 3 00:49:00 UTC 2021 kill -USR1 3285668 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3285668 killed at Tue Aug 3 00:49:00 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:49:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3285886 >/dev/null 2>/dev/null selfserv with PID 3285886 found at Tue Aug 3 00:49:00 UTC 2021 selfserv with PID 3285886 started at Tue Aug 3 00:49:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3285886 at Tue Aug 3 00:49:01 UTC 2021 kill -USR1 3285886 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3285886 killed at Tue Aug 3 00:49:01 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:49:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3286031 >/dev/null 2>/dev/null selfserv with PID 3286031 found at Tue Aug 3 00:49:01 UTC 2021 selfserv with PID 3286031 started at Tue Aug 3 00:49:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3286031 at Tue Aug 3 00:49:01 UTC 2021 kill -USR1 3286031 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3286031 killed at Tue Aug 3 00:49:01 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:49:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3286217 >/dev/null 2>/dev/null selfserv with PID 3286217 found at Tue Aug 3 00:49:02 UTC 2021 selfserv with PID 3286217 started at Tue Aug 3 00:49:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3286217 at Tue Aug 3 00:49:02 UTC 2021 kill -USR1 3286217 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3286217 killed at Tue Aug 3 00:49:02 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3286395 >/dev/null 2>/dev/null selfserv with PID 3286395 found at Tue Aug 3 00:49:02 UTC 2021 selfserv with PID 3286395 started at Tue Aug 3 00:49:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3286395 at Tue Aug 3 00:49:03 UTC 2021 kill -USR1 3286395 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3286395 killed at Tue Aug 3 00:49:03 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3286507 >/dev/null 2>/dev/null selfserv with PID 3286507 found at Tue Aug 3 00:49:04 UTC 2021 selfserv with PID 3286507 started at Tue Aug 3 00:49:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3286507 at Tue Aug 3 00:49:05 UTC 2021 kill -USR1 3286507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3286507 killed at Tue Aug 3 00:49:05 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3286607 >/dev/null 2>/dev/null selfserv with PID 3286607 found at Tue Aug 3 00:49:05 UTC 2021 selfserv with PID 3286607 started at Tue Aug 3 00:49:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3286607 at Tue Aug 3 00:49:06 UTC 2021 kill -USR1 3286607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3286607 killed at Tue Aug 3 00:49:06 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3286805 >/dev/null 2>/dev/null selfserv with PID 3286805 found at Tue Aug 3 00:49:06 UTC 2021 selfserv with PID 3286805 started at Tue Aug 3 00:49:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3286805 at Tue Aug 3 00:49:07 UTC 2021 kill -USR1 3286805 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3286805 killed at Tue Aug 3 00:49:07 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3287076 >/dev/null 2>/dev/null selfserv with PID 3287076 found at Tue Aug 3 00:49:07 UTC 2021 selfserv with PID 3287076 started at Tue Aug 3 00:49:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3287076 at Tue Aug 3 00:49:07 UTC 2021 kill -USR1 3287076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3287076 killed at Tue Aug 3 00:49:07 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3287268 >/dev/null 2>/dev/null selfserv with PID 3287268 found at Tue Aug 3 00:49:08 UTC 2021 selfserv with PID 3287268 started at Tue Aug 3 00:49:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3287268 at Tue Aug 3 00:49:08 UTC 2021 kill -USR1 3287268 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3287268 killed at Tue Aug 3 00:49:08 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:49:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3287361 >/dev/null 2>/dev/null selfserv with PID 3287361 found at Tue Aug 3 00:49:08 UTC 2021 selfserv with PID 3287361 started at Tue Aug 3 00:49:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3287361 at Tue Aug 3 00:49:09 UTC 2021 kill -USR1 3287361 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3287361 killed at Tue Aug 3 00:49:09 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:49:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3287452 >/dev/null 2>/dev/null selfserv with PID 3287452 found at Tue Aug 3 00:49:09 UTC 2021 selfserv with PID 3287452 started at Tue Aug 3 00:49:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3287452 at Tue Aug 3 00:49:10 UTC 2021 kill -USR1 3287452 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3287452 killed at Tue Aug 3 00:49:10 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:49:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3287546 >/dev/null 2>/dev/null selfserv with PID 3287546 found at Tue Aug 3 00:49:10 UTC 2021 selfserv with PID 3287546 started at Tue Aug 3 00:49:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3287546 at Tue Aug 3 00:49:11 UTC 2021 kill -USR1 3287546 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3287546 killed at Tue Aug 3 00:49:11 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3287635 >/dev/null 2>/dev/null selfserv with PID 3287635 found at Tue Aug 3 00:49:11 UTC 2021 selfserv with PID 3287635 started at Tue Aug 3 00:49:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3287635 at Tue Aug 3 00:49:12 UTC 2021 kill -USR1 3287635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3287635 killed at Tue Aug 3 00:49:12 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3287785 >/dev/null 2>/dev/null selfserv with PID 3287785 found at Tue Aug 3 00:49:12 UTC 2021 selfserv with PID 3287785 started at Tue Aug 3 00:49:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3287785 at Tue Aug 3 00:49:13 UTC 2021 kill -USR1 3287785 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3287785 killed at Tue Aug 3 00:49:13 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3288049 >/dev/null 2>/dev/null selfserv with PID 3288049 found at Tue Aug 3 00:49:13 UTC 2021 selfserv with PID 3288049 started at Tue Aug 3 00:49:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3288049 at Tue Aug 3 00:49:14 UTC 2021 kill -USR1 3288049 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3288049 killed at Tue Aug 3 00:49:14 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3288421 >/dev/null 2>/dev/null selfserv with PID 3288421 found at Tue Aug 3 00:49:14 UTC 2021 selfserv with PID 3288421 started at Tue Aug 3 00:49:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3288421 at Tue Aug 3 00:49:15 UTC 2021 kill -USR1 3288421 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3288421 killed at Tue Aug 3 00:49:15 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3288591 >/dev/null 2>/dev/null selfserv with PID 3288591 found at Tue Aug 3 00:49:15 UTC 2021 selfserv with PID 3288591 started at Tue Aug 3 00:49:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3288591 at Tue Aug 3 00:49:15 UTC 2021 kill -USR1 3288591 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3288591 killed at Tue Aug 3 00:49:15 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3288677 >/dev/null 2>/dev/null selfserv with PID 3288677 found at Tue Aug 3 00:49:16 UTC 2021 selfserv with PID 3288677 started at Tue Aug 3 00:49:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3288677 at Tue Aug 3 00:49:16 UTC 2021 kill -USR1 3288677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3288677 killed at Tue Aug 3 00:49:16 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:49:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3288768 >/dev/null 2>/dev/null selfserv with PID 3288768 found at Tue Aug 3 00:49:16 UTC 2021 selfserv with PID 3288768 started at Tue Aug 3 00:49:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3288768 at Tue Aug 3 00:49:17 UTC 2021 kill -USR1 3288768 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3288768 killed at Tue Aug 3 00:49:17 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:49:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3288852 >/dev/null 2>/dev/null selfserv with PID 3288852 found at Tue Aug 3 00:49:17 UTC 2021 selfserv with PID 3288852 started at Tue Aug 3 00:49:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3288852 at Tue Aug 3 00:49:18 UTC 2021 kill -USR1 3288852 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3288852 killed at Tue Aug 3 00:49:18 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:49:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3288946 >/dev/null 2>/dev/null selfserv with PID 3288946 found at Tue Aug 3 00:49:18 UTC 2021 selfserv with PID 3288946 started at Tue Aug 3 00:49:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3288946 at Tue Aug 3 00:49:19 UTC 2021 kill -USR1 3288946 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3288946 killed at Tue Aug 3 00:49:19 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3289206 >/dev/null 2>/dev/null selfserv with PID 3289206 found at Tue Aug 3 00:49:19 UTC 2021 selfserv with PID 3289206 started at Tue Aug 3 00:49:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3289206 at Tue Aug 3 00:49:20 UTC 2021 kill -USR1 3289206 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3289206 killed at Tue Aug 3 00:49:20 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3289494 >/dev/null 2>/dev/null selfserv with PID 3289494 found at Tue Aug 3 00:49:20 UTC 2021 selfserv with PID 3289494 started at Tue Aug 3 00:49:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3289494 at Tue Aug 3 00:49:21 UTC 2021 kill -USR1 3289494 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3289494 killed at Tue Aug 3 00:49:21 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3289771 >/dev/null 2>/dev/null selfserv with PID 3289771 found at Tue Aug 3 00:49:21 UTC 2021 selfserv with PID 3289771 started at Tue Aug 3 00:49:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3289771 at Tue Aug 3 00:49:22 UTC 2021 kill -USR1 3289771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3289771 killed at Tue Aug 3 00:49:22 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3289995 >/dev/null 2>/dev/null selfserv with PID 3289995 found at Tue Aug 3 00:49:22 UTC 2021 selfserv with PID 3289995 started at Tue Aug 3 00:49:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3289995 at Tue Aug 3 00:49:23 UTC 2021 kill -USR1 3289995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3289995 killed at Tue Aug 3 00:49:23 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3290304 >/dev/null 2>/dev/null selfserv with PID 3290304 found at Tue Aug 3 00:49:23 UTC 2021 selfserv with PID 3290304 started at Tue Aug 3 00:49:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3290304 at Tue Aug 3 00:49:24 UTC 2021 kill -USR1 3290304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3290304 killed at Tue Aug 3 00:49:24 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3290425 >/dev/null 2>/dev/null selfserv with PID 3290425 found at Tue Aug 3 00:49:24 UTC 2021 selfserv with PID 3290425 started at Tue Aug 3 00:49:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3290425 at Tue Aug 3 00:49:25 UTC 2021 kill -USR1 3290425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3290425 killed at Tue Aug 3 00:49:25 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3290668 >/dev/null 2>/dev/null selfserv with PID 3290668 found at Tue Aug 3 00:49:25 UTC 2021 selfserv with PID 3290668 started at Tue Aug 3 00:49:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3290668 at Tue Aug 3 00:49:26 UTC 2021 kill -USR1 3290668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3290668 killed at Tue Aug 3 00:49:26 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3290848 >/dev/null 2>/dev/null selfserv with PID 3290848 found at Tue Aug 3 00:49:26 UTC 2021 selfserv with PID 3290848 started at Tue Aug 3 00:49:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3290848 at Tue Aug 3 00:49:27 UTC 2021 kill -USR1 3290848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3290848 killed at Tue Aug 3 00:49:27 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:49:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3291148 >/dev/null 2>/dev/null selfserv with PID 3291148 found at Tue Aug 3 00:49:27 UTC 2021 selfserv with PID 3291148 started at Tue Aug 3 00:49:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3291148 at Tue Aug 3 00:49:28 UTC 2021 kill -USR1 3291148 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3291148 killed at Tue Aug 3 00:49:28 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3291410 >/dev/null 2>/dev/null selfserv with PID 3291410 found at Tue Aug 3 00:49:28 UTC 2021 selfserv with PID 3291410 started at Tue Aug 3 00:49:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3291410 at Tue Aug 3 00:49:29 UTC 2021 kill -USR1 3291410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3291410 killed at Tue Aug 3 00:49:29 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3291608 >/dev/null 2>/dev/null selfserv with PID 3291608 found at Tue Aug 3 00:49:29 UTC 2021 selfserv with PID 3291608 started at Tue Aug 3 00:49:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3291608 at Tue Aug 3 00:49:30 UTC 2021 kill -USR1 3291608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3291608 killed at Tue Aug 3 00:49:30 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3291830 >/dev/null 2>/dev/null selfserv with PID 3291830 found at Tue Aug 3 00:49:30 UTC 2021 selfserv with PID 3291830 started at Tue Aug 3 00:49:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3291830 at Tue Aug 3 00:49:31 UTC 2021 kill -USR1 3291830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3291830 killed at Tue Aug 3 00:49:31 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3292019 >/dev/null 2>/dev/null selfserv with PID 3292019 found at Tue Aug 3 00:49:31 UTC 2021 selfserv with PID 3292019 started at Tue Aug 3 00:49:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3292019 at Tue Aug 3 00:49:31 UTC 2021 kill -USR1 3292019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3292019 killed at Tue Aug 3 00:49:31 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3292119 >/dev/null 2>/dev/null selfserv with PID 3292119 found at Tue Aug 3 00:49:31 UTC 2021 selfserv with PID 3292119 started at Tue Aug 3 00:49:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3292119 at Tue Aug 3 00:49:32 UTC 2021 kill -USR1 3292119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3292119 killed at Tue Aug 3 00:49:32 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:49:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3292310 >/dev/null 2>/dev/null selfserv with PID 3292310 found at Tue Aug 3 00:49:32 UTC 2021 selfserv with PID 3292310 started at Tue Aug 3 00:49:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3292310 at Tue Aug 3 00:49:33 UTC 2021 kill -USR1 3292310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3292310 killed at Tue Aug 3 00:49:33 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:49:33 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3292524 >/dev/null 2>/dev/null selfserv with PID 3292524 found at Tue Aug 3 00:49:33 UTC 2021 selfserv with PID 3292524 started at Tue Aug 3 00:49:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3292524 at Tue Aug 3 00:49:34 UTC 2021 kill -USR1 3292524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3292524 killed at Tue Aug 3 00:49:34 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:49:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3292770 >/dev/null 2>/dev/null selfserv with PID 3292770 found at Tue Aug 3 00:49:34 UTC 2021 selfserv with PID 3292770 started at Tue Aug 3 00:49:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3292770 at Tue Aug 3 00:49:35 UTC 2021 kill -USR1 3292770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3292770 killed at Tue Aug 3 00:49:35 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:49:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3292902 >/dev/null 2>/dev/null selfserv with PID 3292902 found at Tue Aug 3 00:49:35 UTC 2021 selfserv with PID 3292902 started at Tue Aug 3 00:49:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3292902 at Tue Aug 3 00:49:36 UTC 2021 kill -USR1 3292902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3292902 killed at Tue Aug 3 00:49:36 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3293037 >/dev/null 2>/dev/null selfserv with PID 3293037 found at Tue Aug 3 00:49:36 UTC 2021 selfserv with PID 3293037 started at Tue Aug 3 00:49:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3293037 at Tue Aug 3 00:49:37 UTC 2021 kill -USR1 3293037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3293037 killed at Tue Aug 3 00:49:37 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3293210 >/dev/null 2>/dev/null selfserv with PID 3293210 found at Tue Aug 3 00:49:37 UTC 2021 selfserv with PID 3293210 started at Tue Aug 3 00:49:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3293210 at Tue Aug 3 00:49:38 UTC 2021 kill -USR1 3293210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3293210 killed at Tue Aug 3 00:49:38 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3293326 >/dev/null 2>/dev/null selfserv with PID 3293326 found at Tue Aug 3 00:49:38 UTC 2021 selfserv with PID 3293326 started at Tue Aug 3 00:49:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3293326 at Tue Aug 3 00:49:39 UTC 2021 kill -USR1 3293326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3293326 killed at Tue Aug 3 00:49:39 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3293424 >/dev/null 2>/dev/null selfserv with PID 3293424 found at Tue Aug 3 00:49:39 UTC 2021 selfserv with PID 3293424 started at Tue Aug 3 00:49:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #109: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3293424 at Tue Aug 3 00:49:39 UTC 2021 kill -USR1 3293424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3293424 killed at Tue Aug 3 00:49:39 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3293517 >/dev/null 2>/dev/null selfserv with PID 3293517 found at Tue Aug 3 00:49:40 UTC 2021 selfserv with PID 3293517 started at Tue Aug 3 00:49:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3293517 at Tue Aug 3 00:49:40 UTC 2021 kill -USR1 3293517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3293517 killed at Tue Aug 3 00:49:40 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3293626 >/dev/null 2>/dev/null selfserv with PID 3293626 found at Tue Aug 3 00:49:41 UTC 2021 selfserv with PID 3293626 started at Tue Aug 3 00:49:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #111: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3293626 at Tue Aug 3 00:49:41 UTC 2021 kill -USR1 3293626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3293626 killed at Tue Aug 3 00:49:41 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3293724 >/dev/null 2>/dev/null selfserv with PID 3293724 found at Tue Aug 3 00:49:41 UTC 2021 selfserv with PID 3293724 started at Tue Aug 3 00:49:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #112: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3293724 at Tue Aug 3 00:49:42 UTC 2021 kill -USR1 3293724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3293724 killed at Tue Aug 3 00:49:42 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3293813 >/dev/null 2>/dev/null selfserv with PID 3293813 found at Tue Aug 3 00:49:42 UTC 2021 selfserv with PID 3293813 started at Tue Aug 3 00:49:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #113: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3293813 at Tue Aug 3 00:49:43 UTC 2021 kill -USR1 3293813 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3293813 killed at Tue Aug 3 00:49:43 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3293899 >/dev/null 2>/dev/null selfserv with PID 3293899 found at Tue Aug 3 00:49:43 UTC 2021 selfserv with PID 3293899 started at Tue Aug 3 00:49:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #114: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3293899 at Tue Aug 3 00:49:44 UTC 2021 kill -USR1 3293899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3293899 killed at Tue Aug 3 00:49:44 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294000 >/dev/null 2>/dev/null selfserv with PID 3294000 found at Tue Aug 3 00:49:44 UTC 2021 selfserv with PID 3294000 started at Tue Aug 3 00:49:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #115: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3294000 at Tue Aug 3 00:49:45 UTC 2021 kill -USR1 3294000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294000 killed at Tue Aug 3 00:49:45 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294085 >/dev/null 2>/dev/null selfserv with PID 3294085 found at Tue Aug 3 00:49:45 UTC 2021 selfserv with PID 3294085 started at Tue Aug 3 00:49:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #116: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3294085 at Tue Aug 3 00:49:46 UTC 2021 kill -USR1 3294085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294085 killed at Tue Aug 3 00:49:46 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294178 >/dev/null 2>/dev/null selfserv with PID 3294178 found at Tue Aug 3 00:49:46 UTC 2021 selfserv with PID 3294178 started at Tue Aug 3 00:49:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #117: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3294178 at Tue Aug 3 00:49:47 UTC 2021 kill -USR1 3294178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294178 killed at Tue Aug 3 00:49:47 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294272 >/dev/null 2>/dev/null selfserv with PID 3294272 found at Tue Aug 3 00:49:47 UTC 2021 selfserv with PID 3294272 started at Tue Aug 3 00:49:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #118: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3294272 at Tue Aug 3 00:49:47 UTC 2021 kill -USR1 3294272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294272 killed at Tue Aug 3 00:49:47 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294365 >/dev/null 2>/dev/null selfserv with PID 3294365 found at Tue Aug 3 00:49:48 UTC 2021 selfserv with PID 3294365 started at Tue Aug 3 00:49:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3294365 at Tue Aug 3 00:49:48 UTC 2021 kill -USR1 3294365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294365 killed at Tue Aug 3 00:49:48 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294449 >/dev/null 2>/dev/null selfserv with PID 3294449 found at Tue Aug 3 00:49:48 UTC 2021 selfserv with PID 3294449 started at Tue Aug 3 00:49:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #120: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3294449 at Tue Aug 3 00:49:49 UTC 2021 kill -USR1 3294449 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294449 killed at Tue Aug 3 00:49:49 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294552 >/dev/null 2>/dev/null selfserv with PID 3294552 found at Tue Aug 3 00:49:49 UTC 2021 selfserv with PID 3294552 started at Tue Aug 3 00:49:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #121: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3294552 at Tue Aug 3 00:49:50 UTC 2021 kill -USR1 3294552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294552 killed at Tue Aug 3 00:49:50 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294652 >/dev/null 2>/dev/null selfserv with PID 3294652 found at Tue Aug 3 00:49:50 UTC 2021 selfserv with PID 3294652 started at Tue Aug 3 00:49:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3294652 at Tue Aug 3 00:49:51 UTC 2021 kill -USR1 3294652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294652 killed at Tue Aug 3 00:49:51 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294749 >/dev/null 2>/dev/null selfserv with PID 3294749 found at Tue Aug 3 00:49:51 UTC 2021 selfserv with PID 3294749 started at Tue Aug 3 00:49:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #123: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3294749 at Tue Aug 3 00:49:52 UTC 2021 kill -USR1 3294749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294749 killed at Tue Aug 3 00:49:52 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3294923 >/dev/null 2>/dev/null selfserv with PID 3294923 found at Tue Aug 3 00:49:52 UTC 2021 selfserv with PID 3294923 started at Tue Aug 3 00:49:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #124: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3294923 at Tue Aug 3 00:49:53 UTC 2021 kill -USR1 3294923 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3294923 killed at Tue Aug 3 00:49:53 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295077 >/dev/null 2>/dev/null selfserv with PID 3295077 found at Tue Aug 3 00:49:53 UTC 2021 selfserv with PID 3295077 started at Tue Aug 3 00:49:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #125: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3295077 at Tue Aug 3 00:49:54 UTC 2021 kill -USR1 3295077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295077 killed at Tue Aug 3 00:49:54 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295177 >/dev/null 2>/dev/null selfserv with PID 3295177 found at Tue Aug 3 00:49:54 UTC 2021 selfserv with PID 3295177 started at Tue Aug 3 00:49:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #126: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3295177 at Tue Aug 3 00:49:55 UTC 2021 kill -USR1 3295177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295177 killed at Tue Aug 3 00:49:55 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295270 >/dev/null 2>/dev/null selfserv with PID 3295270 found at Tue Aug 3 00:49:55 UTC 2021 selfserv with PID 3295270 started at Tue Aug 3 00:49:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #127: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3295270 at Tue Aug 3 00:49:56 UTC 2021 kill -USR1 3295270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295270 killed at Tue Aug 3 00:49:56 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295355 >/dev/null 2>/dev/null selfserv with PID 3295355 found at Tue Aug 3 00:49:56 UTC 2021 selfserv with PID 3295355 started at Tue Aug 3 00:49:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #128: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3295355 at Tue Aug 3 00:49:57 UTC 2021 kill -USR1 3295355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295355 killed at Tue Aug 3 00:49:57 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:49:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295442 >/dev/null 2>/dev/null selfserv with PID 3295442 found at Tue Aug 3 00:49:57 UTC 2021 selfserv with PID 3295442 started at Tue Aug 3 00:49:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #129: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3295442 at Tue Aug 3 00:49:58 UTC 2021 kill -USR1 3295442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295442 killed at Tue Aug 3 00:49:58 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295552 >/dev/null 2>/dev/null selfserv with PID 3295552 found at Tue Aug 3 00:49:58 UTC 2021 selfserv with PID 3295552 started at Tue Aug 3 00:49:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #130: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3295552 at Tue Aug 3 00:49:59 UTC 2021 kill -USR1 3295552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295552 killed at Tue Aug 3 00:49:59 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295635 >/dev/null 2>/dev/null selfserv with PID 3295635 found at Tue Aug 3 00:49:59 UTC 2021 selfserv with PID 3295635 started at Tue Aug 3 00:49:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3295635 at Tue Aug 3 00:49:59 UTC 2021 kill -USR1 3295635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295635 killed at Tue Aug 3 00:49:59 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:49:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:49:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295720 >/dev/null 2>/dev/null selfserv with PID 3295720 found at Tue Aug 3 00:49:59 UTC 2021 selfserv with PID 3295720 started at Tue Aug 3 00:49:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #132: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3295720 at Tue Aug 3 00:50:00 UTC 2021 kill -USR1 3295720 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295720 killed at Tue Aug 3 00:50:00 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295816 >/dev/null 2>/dev/null selfserv with PID 3295816 found at Tue Aug 3 00:50:00 UTC 2021 selfserv with PID 3295816 started at Tue Aug 3 00:50:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3295816 at Tue Aug 3 00:50:01 UTC 2021 kill -USR1 3295816 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295816 killed at Tue Aug 3 00:50:01 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3295912 >/dev/null 2>/dev/null selfserv with PID 3295912 found at Tue Aug 3 00:50:01 UTC 2021 selfserv with PID 3295912 started at Tue Aug 3 00:50:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3295912 at Tue Aug 3 00:50:02 UTC 2021 kill -USR1 3295912 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3295912 killed at Tue Aug 3 00:50:02 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3296008 >/dev/null 2>/dev/null selfserv with PID 3296008 found at Tue Aug 3 00:50:02 UTC 2021 selfserv with PID 3296008 started at Tue Aug 3 00:50:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3296008 at Tue Aug 3 00:50:03 UTC 2021 kill -USR1 3296008 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3296008 killed at Tue Aug 3 00:50:03 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3296134 >/dev/null 2>/dev/null selfserv with PID 3296134 found at Tue Aug 3 00:50:03 UTC 2021 selfserv with PID 3296134 started at Tue Aug 3 00:50:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #136: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3296134 at Tue Aug 3 00:50:04 UTC 2021 kill -USR1 3296134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3296134 killed at Tue Aug 3 00:50:04 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3296330 >/dev/null 2>/dev/null selfserv with PID 3296330 found at Tue Aug 3 00:50:04 UTC 2021 selfserv with PID 3296330 started at Tue Aug 3 00:50:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #137: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3296330 at Tue Aug 3 00:50:05 UTC 2021 kill -USR1 3296330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3296330 killed at Tue Aug 3 00:50:05 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3296591 >/dev/null 2>/dev/null selfserv with PID 3296591 found at Tue Aug 3 00:50:05 UTC 2021 selfserv with PID 3296591 started at Tue Aug 3 00:50:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #138: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3296591 at Tue Aug 3 00:50:06 UTC 2021 kill -USR1 3296591 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3296591 killed at Tue Aug 3 00:50:06 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3296805 >/dev/null 2>/dev/null selfserv with PID 3296805 found at Tue Aug 3 00:50:06 UTC 2021 selfserv with PID 3296805 started at Tue Aug 3 00:50:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3296805 at Tue Aug 3 00:50:06 UTC 2021 kill -USR1 3296805 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3296805 killed at Tue Aug 3 00:50:06 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3296937 >/dev/null 2>/dev/null selfserv with PID 3296937 found at Tue Aug 3 00:50:07 UTC 2021 selfserv with PID 3296937 started at Tue Aug 3 00:50:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3296937 at Tue Aug 3 00:50:07 UTC 2021 kill -USR1 3296937 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3296937 killed at Tue Aug 3 00:50:07 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3297099 >/dev/null 2>/dev/null selfserv with PID 3297099 found at Tue Aug 3 00:50:08 UTC 2021 selfserv with PID 3297099 started at Tue Aug 3 00:50:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3297099 at Tue Aug 3 00:50:08 UTC 2021 kill -USR1 3297099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3297099 killed at Tue Aug 3 00:50:08 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3297444 >/dev/null 2>/dev/null selfserv with PID 3297444 found at Tue Aug 3 00:50:08 UTC 2021 selfserv with PID 3297444 started at Tue Aug 3 00:50:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #142: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3297444 at Tue Aug 3 00:50:09 UTC 2021 kill -USR1 3297444 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3297444 killed at Tue Aug 3 00:50:09 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3297750 >/dev/null 2>/dev/null selfserv with PID 3297750 found at Tue Aug 3 00:50:09 UTC 2021 selfserv with PID 3297750 started at Tue Aug 3 00:50:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3297750 at Tue Aug 3 00:50:10 UTC 2021 kill -USR1 3297750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3297750 killed at Tue Aug 3 00:50:10 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3297974 >/dev/null 2>/dev/null selfserv with PID 3297974 found at Tue Aug 3 00:50:10 UTC 2021 selfserv with PID 3297974 started at Tue Aug 3 00:50:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3297974 at Tue Aug 3 00:50:11 UTC 2021 kill -USR1 3297974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3297974 killed at Tue Aug 3 00:50:11 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3298201 >/dev/null 2>/dev/null selfserv with PID 3298201 found at Tue Aug 3 00:50:11 UTC 2021 selfserv with PID 3298201 started at Tue Aug 3 00:50:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3298201 at Tue Aug 3 00:50:12 UTC 2021 kill -USR1 3298201 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3298201 killed at Tue Aug 3 00:50:12 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3298480 >/dev/null 2>/dev/null selfserv with PID 3298480 found at Tue Aug 3 00:50:12 UTC 2021 selfserv with PID 3298480 started at Tue Aug 3 00:50:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3298480 at Tue Aug 3 00:50:13 UTC 2021 kill -USR1 3298480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3298480 killed at Tue Aug 3 00:50:13 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3298712 >/dev/null 2>/dev/null selfserv with PID 3298712 found at Tue Aug 3 00:50:13 UTC 2021 selfserv with PID 3298712 started at Tue Aug 3 00:50:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3298712 at Tue Aug 3 00:50:14 UTC 2021 kill -USR1 3298712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3298712 killed at Tue Aug 3 00:50:14 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3298912 >/dev/null 2>/dev/null selfserv with PID 3298912 found at Tue Aug 3 00:50:14 UTC 2021 selfserv with PID 3298912 started at Tue Aug 3 00:50:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #148: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3298912 at Tue Aug 3 00:50:15 UTC 2021 kill -USR1 3298912 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3298912 killed at Tue Aug 3 00:50:15 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3299132 >/dev/null 2>/dev/null selfserv with PID 3299132 found at Tue Aug 3 00:50:15 UTC 2021 selfserv with PID 3299132 started at Tue Aug 3 00:50:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #149: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3299132 at Tue Aug 3 00:50:15 UTC 2021 kill -USR1 3299132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3299132 killed at Tue Aug 3 00:50:15 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3299247 >/dev/null 2>/dev/null selfserv with PID 3299247 found at Tue Aug 3 00:50:16 UTC 2021 selfserv with PID 3299247 started at Tue Aug 3 00:50:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #150: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3299247 at Tue Aug 3 00:50:16 UTC 2021 kill -USR1 3299247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3299247 killed at Tue Aug 3 00:50:16 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3299384 >/dev/null 2>/dev/null selfserv with PID 3299384 found at Tue Aug 3 00:50:16 UTC 2021 selfserv with PID 3299384 started at Tue Aug 3 00:50:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3299384 at Tue Aug 3 00:50:17 UTC 2021 kill -USR1 3299384 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3299384 killed at Tue Aug 3 00:50:17 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3299511 >/dev/null 2>/dev/null selfserv with PID 3299511 found at Tue Aug 3 00:50:17 UTC 2021 selfserv with PID 3299511 started at Tue Aug 3 00:50:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3299511 at Tue Aug 3 00:50:18 UTC 2021 kill -USR1 3299511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3299511 killed at Tue Aug 3 00:50:18 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3299632 >/dev/null 2>/dev/null selfserv with PID 3299632 found at Tue Aug 3 00:50:18 UTC 2021 selfserv with PID 3299632 started at Tue Aug 3 00:50:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3299632 at Tue Aug 3 00:50:19 UTC 2021 kill -USR1 3299632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3299632 killed at Tue Aug 3 00:50:19 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3299990 >/dev/null 2>/dev/null selfserv with PID 3299990 found at Tue Aug 3 00:50:19 UTC 2021 selfserv with PID 3299990 started at Tue Aug 3 00:50:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #154: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3299990 at Tue Aug 3 00:50:20 UTC 2021 kill -USR1 3299990 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3299990 killed at Tue Aug 3 00:50:20 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3300202 >/dev/null 2>/dev/null selfserv with PID 3300202 found at Tue Aug 3 00:50:20 UTC 2021 selfserv with PID 3300202 started at Tue Aug 3 00:50:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3300202 at Tue Aug 3 00:50:21 UTC 2021 kill -USR1 3300202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3300202 killed at Tue Aug 3 00:50:21 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3300289 >/dev/null 2>/dev/null selfserv with PID 3300289 found at Tue Aug 3 00:50:21 UTC 2021 selfserv with PID 3300289 started at Tue Aug 3 00:50:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #156: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3300289 at Tue Aug 3 00:50:22 UTC 2021 kill -USR1 3300289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3300289 killed at Tue Aug 3 00:50:22 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3300478 >/dev/null 2>/dev/null selfserv with PID 3300478 found at Tue Aug 3 00:50:22 UTC 2021 selfserv with PID 3300478 started at Tue Aug 3 00:50:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3300478 at Tue Aug 3 00:50:23 UTC 2021 kill -USR1 3300478 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3300478 killed at Tue Aug 3 00:50:23 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3300593 >/dev/null 2>/dev/null selfserv with PID 3300593 found at Tue Aug 3 00:50:23 UTC 2021 selfserv with PID 3300593 started at Tue Aug 3 00:50:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3300593 at Tue Aug 3 00:50:24 UTC 2021 kill -USR1 3300593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3300593 killed at Tue Aug 3 00:50:24 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3300815 >/dev/null 2>/dev/null selfserv with PID 3300815 found at Tue Aug 3 00:50:24 UTC 2021 selfserv with PID 3300815 started at Tue Aug 3 00:50:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3300815 at Tue Aug 3 00:50:25 UTC 2021 kill -USR1 3300815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3300815 killed at Tue Aug 3 00:50:25 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3301011 >/dev/null 2>/dev/null selfserv with PID 3301011 found at Tue Aug 3 00:50:25 UTC 2021 selfserv with PID 3301011 started at Tue Aug 3 00:50:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #160: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3301011 at Tue Aug 3 00:50:26 UTC 2021 kill -USR1 3301011 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3301011 killed at Tue Aug 3 00:50:26 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3301090 >/dev/null 2>/dev/null selfserv with PID 3301090 found at Tue Aug 3 00:50:26 UTC 2021 selfserv with PID 3301090 started at Tue Aug 3 00:50:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #161: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3301090 at Tue Aug 3 00:50:26 UTC 2021 kill -USR1 3301090 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3301090 killed at Tue Aug 3 00:50:26 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:50:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3301149 >/dev/null 2>/dev/null selfserv with PID 3301149 found at Tue Aug 3 00:50:27 UTC 2021 selfserv with PID 3301149 started at Tue Aug 3 00:50:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #162: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3301149 at Tue Aug 3 00:50:27 UTC 2021 kill -USR1 3301149 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3301149 killed at Tue Aug 3 00:50:27 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3301263 >/dev/null 2>/dev/null selfserv with PID 3301263 found at Tue Aug 3 00:50:27 UTC 2021 selfserv with PID 3301263 started at Tue Aug 3 00:50:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3301263 at Tue Aug 3 00:50:28 UTC 2021 kill -USR1 3301263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3301263 killed at Tue Aug 3 00:50:28 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3301464 >/dev/null 2>/dev/null selfserv with PID 3301464 found at Tue Aug 3 00:50:28 UTC 2021 selfserv with PID 3301464 started at Tue Aug 3 00:50:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3301464 at Tue Aug 3 00:50:29 UTC 2021 kill -USR1 3301464 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3301464 killed at Tue Aug 3 00:50:29 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3301612 >/dev/null 2>/dev/null selfserv with PID 3301612 found at Tue Aug 3 00:50:29 UTC 2021 selfserv with PID 3301612 started at Tue Aug 3 00:50:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3301612 at Tue Aug 3 00:50:30 UTC 2021 kill -USR1 3301612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3301612 killed at Tue Aug 3 00:50:30 UTC 2021 ssl.sh: Cache CRL SSL Client Tests =============================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv starting at Tue Aug 3 00:50:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:30 UTC 2021 selfserv with PID 3301806 started at Tue Aug 3 00:50:30 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:31 UTC 2021 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:32 UTC 2021 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:32 UTC 2021 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:32 UTC 2021 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:32 UTC 2021 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:33 UTC 2021 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:33 UTC 2021 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:33 UTC 2021 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:33 UTC 2021 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:34 UTC 2021 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:34 UTC 2021 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:34 UTC 2021 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:34 UTC 2021 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:35 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:35 UTC 2021 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:35 UTC 2021 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:35 UTC 2021 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:36 UTC 2021 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:36 UTC 2021 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:36 UTC 2021 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:36 UTC 2021 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:37 UTC 2021 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:37 UTC 2021 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:37 UTC 2021 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:37 UTC 2021 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:38 UTC 2021 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:38 UTC 2021 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:38 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:38 UTC 2021 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:39 UTC 2021 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:39 UTC 2021 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:39 UTC 2021 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:39 UTC 2021 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:39 UTC 2021 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:40 UTC 2021 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:40 UTC 2021 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:40 UTC 2021 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:40 UTC 2021 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:41 UTC 2021 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:41 UTC 2021 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3301806 >/dev/null 2>/dev/null selfserv with PID 3301806 found at Tue Aug 3 00:50:41 UTC 2021 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3301806 at Tue Aug 3 00:50:41 UTC 2021 kill -USR1 3301806 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3301806 killed at Tue Aug 3 00:50:41 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:50:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:41 UTC 2021 selfserv with PID 3303380 started at Tue Aug 3 00:50:41 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:42 UTC 2021 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:42 UTC 2021 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:43 UTC 2021 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:43 UTC 2021 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:43 UTC 2021 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:43 UTC 2021 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:43 UTC 2021 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:43 UTC 2021 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:43 UTC 2021 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:44 UTC 2021 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:44 UTC 2021 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:44 UTC 2021 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:44 UTC 2021 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:44 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:45 UTC 2021 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:45 UTC 2021 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:45 UTC 2021 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:45 UTC 2021 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:45 UTC 2021 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:45 UTC 2021 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:46 UTC 2021 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:46 UTC 2021 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:46 UTC 2021 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:46 UTC 2021 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:46 UTC 2021 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:46 UTC 2021 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:46 UTC 2021 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:47 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:47 UTC 2021 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:47 UTC 2021 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:47 UTC 2021 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:47 UTC 2021 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:48 UTC 2021 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:48 UTC 2021 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:48 UTC 2021 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:48 UTC 2021 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:48 UTC 2021 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:48 UTC 2021 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:48 UTC 2021 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:49 UTC 2021 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3303380 >/dev/null 2>/dev/null selfserv with PID 3303380 found at Tue Aug 3 00:50:49 UTC 2021 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3303380 at Tue Aug 3 00:50:49 UTC 2021 kill -USR1 3303380 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3303380 killed at Tue Aug 3 00:50:49 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:50:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:49 UTC 2021 selfserv with PID 3304810 started at Tue Aug 3 00:50:49 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:50 UTC 2021 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:51 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3304810 >/dev/null 2>/dev/null selfserv with PID 3304810 found at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3304810 at Tue Aug 3 00:50:52 UTC 2021 kill -USR1 3304810 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3304810 killed at Tue Aug 3 00:50:52 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:52 UTC 2021 selfserv with PID 3306152 started at Tue Aug 3 00:50:52 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:53 UTC 2021 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:53 UTC 2021 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:54 UTC 2021 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:54 UTC 2021 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:54 UTC 2021 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:54 UTC 2021 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:54 UTC 2021 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:54 UTC 2021 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:54 UTC 2021 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:55 UTC 2021 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:55 UTC 2021 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:55 UTC 2021 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:55 UTC 2021 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:55 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:55 UTC 2021 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:55 UTC 2021 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:56 UTC 2021 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:56 UTC 2021 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:56 UTC 2021 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:56 UTC 2021 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:56 UTC 2021 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:56 UTC 2021 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:56 UTC 2021 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:57 UTC 2021 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:57 UTC 2021 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:57 UTC 2021 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:57 UTC 2021 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:57 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:57 UTC 2021 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:57 UTC 2021 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:58 UTC 2021 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:58 UTC 2021 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:58 UTC 2021 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:58 UTC 2021 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:58 UTC 2021 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:58 UTC 2021 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:58 UTC 2021 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:59 UTC 2021 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:59 UTC 2021 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:59 UTC 2021 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3306152 >/dev/null 2>/dev/null selfserv with PID 3306152 found at Tue Aug 3 00:50:59 UTC 2021 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3306152 at Tue Aug 3 00:50:59 UTC 2021 kill -USR1 3306152 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3306152 killed at Tue Aug 3 00:50:59 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:50:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3307776 >/dev/null 2>/dev/null selfserv with PID 3307776 found at Tue Aug 3 00:50:59 UTC 2021 selfserv with PID 3307776 started at Tue Aug 3 00:50:59 UTC 2021 trying to kill selfserv with PID 3307776 at Tue Aug 3 00:50:59 UTC 2021 kill -USR1 3307776 ./ssl.sh: line 213: 3307776 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv -b -p 8443 2>/dev/null; selfserv with PID 3307776 killed at Tue Aug 3 00:50:59 UTC 2021 selfserv starting at Tue Aug 3 00:50:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:50:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:50:59 UTC 2021 selfserv with PID 3307828 started at Tue Aug 3 00:50:59 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:00 UTC 2021 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:01 UTC 2021 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:01 UTC 2021 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:01 UTC 2021 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:01 UTC 2021 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:01 UTC 2021 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:02 UTC 2021 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:02 UTC 2021 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:02 UTC 2021 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:02 UTC 2021 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:03 UTC 2021 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:03 UTC 2021 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:03 UTC 2021 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:03 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:04 UTC 2021 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:04 UTC 2021 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:04 UTC 2021 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:04 UTC 2021 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:05 UTC 2021 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:05 UTC 2021 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:05 UTC 2021 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:05 UTC 2021 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:06 UTC 2021 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:06 UTC 2021 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:06 UTC 2021 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:06 UTC 2021 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:07 UTC 2021 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:07 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:07 UTC 2021 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:07 UTC 2021 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:08 UTC 2021 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:08 UTC 2021 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:08 UTC 2021 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:08 UTC 2021 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:09 UTC 2021 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:09 UTC 2021 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:09 UTC 2021 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:09 UTC 2021 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:10 UTC 2021 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:10 UTC 2021 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3307828 >/dev/null 2>/dev/null selfserv with PID 3307828 found at Tue Aug 3 00:51:10 UTC 2021 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3307828 at Tue Aug 3 00:51:10 UTC 2021 kill -USR1 3307828 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3307828 killed at Tue Aug 3 00:51:10 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:51:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:51:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:10 UTC 2021 selfserv with PID 3309584 started at Tue Aug 3 00:51:10 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:11 UTC 2021 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:12 UTC 2021 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:12 UTC 2021 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:12 UTC 2021 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:12 UTC 2021 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:13 UTC 2021 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:13 UTC 2021 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:13 UTC 2021 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:13 UTC 2021 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:14 UTC 2021 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:14 UTC 2021 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:14 UTC 2021 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:14 UTC 2021 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:15 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:15 UTC 2021 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:15 UTC 2021 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:15 UTC 2021 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:16 UTC 2021 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:16 UTC 2021 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:16 UTC 2021 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:17 UTC 2021 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:17 UTC 2021 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:17 UTC 2021 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:17 UTC 2021 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:18 UTC 2021 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:18 UTC 2021 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:18 UTC 2021 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:18 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:19 UTC 2021 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:19 UTC 2021 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:19 UTC 2021 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:19 UTC 2021 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:20 UTC 2021 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:20 UTC 2021 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:20 UTC 2021 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:20 UTC 2021 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:21 UTC 2021 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:21 UTC 2021 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:21 UTC 2021 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:21 UTC 2021 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3309584 >/dev/null 2>/dev/null selfserv with PID 3309584 found at Tue Aug 3 00:51:22 UTC 2021 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3309584 at Tue Aug 3 00:51:22 UTC 2021 kill -USR1 3309584 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3309584 killed at Tue Aug 3 00:51:22 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:51:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:51:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:22 UTC 2021 selfserv with PID 3312418 started at Tue Aug 3 00:51:22 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:23 UTC 2021 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:23 UTC 2021 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:23 UTC 2021 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:23 UTC 2021 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:23 UTC 2021 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:24 UTC 2021 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:24 UTC 2021 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:24 UTC 2021 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:24 UTC 2021 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:24 UTC 2021 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:24 UTC 2021 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:25 UTC 2021 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:25 UTC 2021 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:25 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:25 UTC 2021 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:25 UTC 2021 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:26 UTC 2021 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:26 UTC 2021 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:26 UTC 2021 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:26 UTC 2021 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:26 UTC 2021 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:26 UTC 2021 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:27 UTC 2021 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:27 UTC 2021 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:27 UTC 2021 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:27 UTC 2021 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:27 UTC 2021 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:27 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:28 UTC 2021 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:28 UTC 2021 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:28 UTC 2021 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:28 UTC 2021 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:28 UTC 2021 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:28 UTC 2021 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:29 UTC 2021 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:29 UTC 2021 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:29 UTC 2021 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:29 UTC 2021 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:29 UTC 2021 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:30 UTC 2021 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3312418 >/dev/null 2>/dev/null selfserv with PID 3312418 found at Tue Aug 3 00:51:30 UTC 2021 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3312418 at Tue Aug 3 00:51:30 UTC 2021 kill -USR1 3312418 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3312418 killed at Tue Aug 3 00:51:30 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:51:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:51:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:30 UTC 2021 selfserv with PID 3314634 started at Tue Aug 3 00:51:30 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:31 UTC 2021 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:32 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314634 >/dev/null 2>/dev/null selfserv with PID 3314634 found at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3314634 at Tue Aug 3 00:51:33 UTC 2021 kill -USR1 3314634 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3314634 killed at Tue Aug 3 00:51:33 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:51:33 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:51:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:33 UTC 2021 selfserv with PID 3316305 started at Tue Aug 3 00:51:33 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:34 UTC 2021 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:34 UTC 2021 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:34 UTC 2021 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:35 UTC 2021 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:36 UTC 2021 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:37 UTC 2021 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3316305 >/dev/null 2>/dev/null selfserv with PID 3316305 found at Tue Aug 3 00:51:38 UTC 2021 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3316305 at Tue Aug 3 00:51:38 UTC 2021 kill -USR1 3316305 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3316305 killed at Tue Aug 3 00:51:38 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:51:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:51:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:38 UTC 2021 selfserv with PID 3317665 started at Tue Aug 3 00:51:38 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:39 UTC 2021 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:39 UTC 2021 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:39 UTC 2021 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:39 UTC 2021 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:39 UTC 2021 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:39 UTC 2021 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:40 UTC 2021 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:40 UTC 2021 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:40 UTC 2021 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:40 UTC 2021 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:40 UTC 2021 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:40 UTC 2021 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:40 UTC 2021 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:41 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:41 UTC 2021 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:41 UTC 2021 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:41 UTC 2021 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:41 UTC 2021 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:41 UTC 2021 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:41 UTC 2021 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:42 UTC 2021 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:42 UTC 2021 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:42 UTC 2021 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:42 UTC 2021 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:42 UTC 2021 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:42 UTC 2021 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:43 UTC 2021 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:43 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:43 UTC 2021 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:43 UTC 2021 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:43 UTC 2021 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:43 UTC 2021 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:43 UTC 2021 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:44 UTC 2021 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:44 UTC 2021 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:44 UTC 2021 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:44 UTC 2021 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:44 UTC 2021 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:44 UTC 2021 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:44 UTC 2021 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3317665 >/dev/null 2>/dev/null selfserv with PID 3317665 found at Tue Aug 3 00:51:45 UTC 2021 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3317665 at Tue Aug 3 00:51:45 UTC 2021 kill -USR1 3317665 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3317665 killed at Tue Aug 3 00:51:45 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:51:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:51:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3319040 >/dev/null 2>/dev/null selfserv with PID 3319040 found at Tue Aug 3 00:51:45 UTC 2021 selfserv with PID 3319040 started at Tue Aug 3 00:51:45 UTC 2021 trying to kill selfserv with PID 3319040 at Tue Aug 3 00:51:45 UTC 2021 kill -USR1 3319040 ./ssl.sh: line 213: 3319040 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv -b -p 8443 2>/dev/null; selfserv with PID 3319040 killed at Tue Aug 3 00:51:45 UTC 2021 selfserv starting at Tue Aug 3 00:51:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:51:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:45 UTC 2021 selfserv with PID 3319083 started at Tue Aug 3 00:51:45 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:46 UTC 2021 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:46 UTC 2021 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:46 UTC 2021 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:47 UTC 2021 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:47 UTC 2021 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:47 UTC 2021 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:47 UTC 2021 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:48 UTC 2021 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:48 UTC 2021 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:48 UTC 2021 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:48 UTC 2021 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:49 UTC 2021 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:49 UTC 2021 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:49 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:49 UTC 2021 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:50 UTC 2021 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:50 UTC 2021 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:50 UTC 2021 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:50 UTC 2021 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:51 UTC 2021 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:51 UTC 2021 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:51 UTC 2021 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:51 UTC 2021 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:52 UTC 2021 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:52 UTC 2021 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:52 UTC 2021 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:52 UTC 2021 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:53 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:53 UTC 2021 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:53 UTC 2021 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:53 UTC 2021 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:54 UTC 2021 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:54 UTC 2021 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:54 UTC 2021 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:54 UTC 2021 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:54 UTC 2021 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:55 UTC 2021 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:55 UTC 2021 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:55 UTC 2021 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:55 UTC 2021 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3319083 >/dev/null 2>/dev/null selfserv with PID 3319083 found at Tue Aug 3 00:51:56 UTC 2021 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3319083 at Tue Aug 3 00:51:56 UTC 2021 kill -USR1 3319083 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3319083 killed at Tue Aug 3 00:51:56 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:51:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:51:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:56 UTC 2021 selfserv with PID 3320686 started at Tue Aug 3 00:51:56 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:57 UTC 2021 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:57 UTC 2021 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:57 UTC 2021 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:58 UTC 2021 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:58 UTC 2021 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:58 UTC 2021 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:58 UTC 2021 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:59 UTC 2021 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:59 UTC 2021 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:51:59 UTC 2021 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:00 UTC 2021 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:00 UTC 2021 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:00 UTC 2021 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:00 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:01 UTC 2021 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:01 UTC 2021 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:01 UTC 2021 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:01 UTC 2021 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:02 UTC 2021 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:02 UTC 2021 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:02 UTC 2021 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:02 UTC 2021 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:03 UTC 2021 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:03 UTC 2021 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:03 UTC 2021 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:03 UTC 2021 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:04 UTC 2021 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:04 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:04 UTC 2021 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:04 UTC 2021 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:05 UTC 2021 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:05 UTC 2021 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:05 UTC 2021 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:06 UTC 2021 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:06 UTC 2021 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:06 UTC 2021 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:06 UTC 2021 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:07 UTC 2021 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:07 UTC 2021 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:07 UTC 2021 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3320686 >/dev/null 2>/dev/null selfserv with PID 3320686 found at Tue Aug 3 00:52:07 UTC 2021 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3320686 at Tue Aug 3 00:52:07 UTC 2021 kill -USR1 3320686 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3320686 killed at Tue Aug 3 00:52:07 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:52:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:07 UTC 2021 selfserv with PID 3323742 started at Tue Aug 3 00:52:07 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:08 UTC 2021 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:09 UTC 2021 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:09 UTC 2021 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:09 UTC 2021 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:09 UTC 2021 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:09 UTC 2021 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:09 UTC 2021 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:10 UTC 2021 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:10 UTC 2021 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:10 UTC 2021 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:10 UTC 2021 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:10 UTC 2021 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:10 UTC 2021 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:11 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:11 UTC 2021 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:11 UTC 2021 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:11 UTC 2021 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:11 UTC 2021 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:11 UTC 2021 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:12 UTC 2021 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:12 UTC 2021 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:12 UTC 2021 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:12 UTC 2021 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:12 UTC 2021 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:13 UTC 2021 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:13 UTC 2021 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:13 UTC 2021 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:13 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:13 UTC 2021 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:13 UTC 2021 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:14 UTC 2021 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:14 UTC 2021 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:14 UTC 2021 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:14 UTC 2021 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:14 UTC 2021 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:14 UTC 2021 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:15 UTC 2021 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:15 UTC 2021 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:15 UTC 2021 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:15 UTC 2021 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3323742 >/dev/null 2>/dev/null selfserv with PID 3323742 found at Tue Aug 3 00:52:15 UTC 2021 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3323742 at Tue Aug 3 00:52:15 UTC 2021 kill -USR1 3323742 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3323742 killed at Tue Aug 3 00:52:15 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:52:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:15 UTC 2021 selfserv with PID 3326058 started at Tue Aug 3 00:52:15 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:16 UTC 2021 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:16 UTC 2021 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:16 UTC 2021 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:16 UTC 2021 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:16 UTC 2021 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:17 UTC 2021 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:18 UTC 2021 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:19 UTC 2021 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:19 UTC 2021 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:19 UTC 2021 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:19 UTC 2021 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:19 UTC 2021 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:19 UTC 2021 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3326058 >/dev/null 2>/dev/null selfserv with PID 3326058 found at Tue Aug 3 00:52:19 UTC 2021 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3326058 at Tue Aug 3 00:52:19 UTC 2021 kill -USR1 3326058 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3326058 killed at Tue Aug 3 00:52:19 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:52:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:19 UTC 2021 selfserv with PID 3327661 started at Tue Aug 3 00:52:19 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:20 UTC 2021 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:20 UTC 2021 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:20 UTC 2021 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:20 UTC 2021 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:20 UTC 2021 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:20 UTC 2021 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:20 UTC 2021 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:20 UTC 2021 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:21 UTC 2021 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:22 UTC 2021 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3327661 >/dev/null 2>/dev/null selfserv with PID 3327661 found at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3327661 at Tue Aug 3 00:52:23 UTC 2021 kill -USR1 3327661 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3327661 killed at Tue Aug 3 00:52:23 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:52:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:23 UTC 2021 selfserv with PID 3329601 started at Tue Aug 3 00:52:23 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:24 UTC 2021 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:24 UTC 2021 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:25 UTC 2021 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:25 UTC 2021 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:25 UTC 2021 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:25 UTC 2021 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:25 UTC 2021 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:25 UTC 2021 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:25 UTC 2021 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:26 UTC 2021 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:26 UTC 2021 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:26 UTC 2021 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:26 UTC 2021 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:26 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:26 UTC 2021 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:26 UTC 2021 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:27 UTC 2021 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:27 UTC 2021 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:27 UTC 2021 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:27 UTC 2021 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:27 UTC 2021 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:27 UTC 2021 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:28 UTC 2021 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:28 UTC 2021 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:28 UTC 2021 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:28 UTC 2021 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:28 UTC 2021 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:28 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:28 UTC 2021 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:29 UTC 2021 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:29 UTC 2021 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:29 UTC 2021 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:29 UTC 2021 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:29 UTC 2021 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:29 UTC 2021 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:29 UTC 2021 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:30 UTC 2021 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:30 UTC 2021 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:30 UTC 2021 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:30 UTC 2021 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3329601 >/dev/null 2>/dev/null selfserv with PID 3329601 found at Tue Aug 3 00:52:30 UTC 2021 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3329601 at Tue Aug 3 00:52:30 UTC 2021 kill -USR1 3329601 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3329601 killed at Tue Aug 3 00:52:30 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:52:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3331278 >/dev/null 2>/dev/null selfserv with PID 3331278 found at Tue Aug 3 00:52:30 UTC 2021 selfserv with PID 3331278 started at Tue Aug 3 00:52:30 UTC 2021 trying to kill selfserv with PID 3331278 at Tue Aug 3 00:52:30 UTC 2021 kill -USR1 3331278 ./ssl.sh: line 213: 3331278 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv -b -p 8443 2>/dev/null; selfserv with PID 3331278 killed at Tue Aug 3 00:52:30 UTC 2021 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv starting at Tue Aug 3 00:52:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3331336 >/dev/null 2>/dev/null selfserv with PID 3331336 found at Tue Aug 3 00:52:30 UTC 2021 selfserv with PID 3331336 started at Tue Aug 3 00:52:30 UTC 2021 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv with PID 3331336 at Tue Aug 3 00:52:32 UTC 2021 kill -USR1 3331336 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3331336 killed at Tue Aug 3 00:52:32 UTC 2021 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv starting at Tue Aug 3 00:52:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3331977 >/dev/null 2>/dev/null selfserv with PID 3331977 found at Tue Aug 3 00:52:32 UTC 2021 selfserv with PID 3331977 started at Tue Aug 3 00:52:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3331977 at Tue Aug 3 00:52:34 UTC 2021 kill -USR1 3331977 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3331977 killed at Tue Aug 3 00:52:34 UTC 2021 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv starting at Tue Aug 3 00:52:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3332863 >/dev/null 2>/dev/null selfserv with PID 3332863 found at Tue Aug 3 00:52:34 UTC 2021 selfserv with PID 3332863 started at Tue Aug 3 00:52:34 UTC 2021 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3332863 at Tue Aug 3 00:52:34 UTC 2021 kill -USR1 3332863 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3332863 killed at Tue Aug 3 00:52:34 UTC 2021 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3332937 >/dev/null 2>/dev/null selfserv with PID 3332937 found at Tue Aug 3 00:52:34 UTC 2021 selfserv with PID 3332937 started at Tue Aug 3 00:52:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3332937 at Tue Aug 3 00:52:35 UTC 2021 kill -USR1 3332937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3332937 killed at Tue Aug 3 00:52:35 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:52:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333113 >/dev/null 2>/dev/null selfserv with PID 3333113 found at Tue Aug 3 00:52:35 UTC 2021 selfserv with PID 3333113 started at Tue Aug 3 00:52:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333113 at Tue Aug 3 00:52:36 UTC 2021 kill -USR1 3333113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333113 killed at Tue Aug 3 00:52:36 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:52:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333170 >/dev/null 2>/dev/null selfserv with PID 3333170 found at Tue Aug 3 00:52:36 UTC 2021 selfserv with PID 3333170 started at Tue Aug 3 00:52:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333170 at Tue Aug 3 00:52:37 UTC 2021 kill -USR1 3333170 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333170 killed at Tue Aug 3 00:52:37 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333224 >/dev/null 2>/dev/null selfserv with PID 3333224 found at Tue Aug 3 00:52:37 UTC 2021 selfserv with PID 3333224 started at Tue Aug 3 00:52:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3333224 at Tue Aug 3 00:52:38 UTC 2021 kill -USR1 3333224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333224 killed at Tue Aug 3 00:52:38 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:52:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333290 >/dev/null 2>/dev/null selfserv with PID 3333290 found at Tue Aug 3 00:52:38 UTC 2021 selfserv with PID 3333290 started at Tue Aug 3 00:52:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3333290 at Tue Aug 3 00:52:39 UTC 2021 kill -USR1 3333290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333290 killed at Tue Aug 3 00:52:39 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:52:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333349 >/dev/null 2>/dev/null selfserv with PID 3333349 found at Tue Aug 3 00:52:39 UTC 2021 selfserv with PID 3333349 started at Tue Aug 3 00:52:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333349 at Tue Aug 3 00:52:40 UTC 2021 kill -USR1 3333349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333349 killed at Tue Aug 3 00:52:40 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333413 >/dev/null 2>/dev/null selfserv with PID 3333413 found at Tue Aug 3 00:52:40 UTC 2021 selfserv with PID 3333413 started at Tue Aug 3 00:52:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333413 at Tue Aug 3 00:52:41 UTC 2021 kill -USR1 3333413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333413 killed at Tue Aug 3 00:52:41 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:52:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333467 >/dev/null 2>/dev/null selfserv with PID 3333467 found at Tue Aug 3 00:52:41 UTC 2021 selfserv with PID 3333467 started at Tue Aug 3 00:52:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333467 at Tue Aug 3 00:52:41 UTC 2021 kill -USR1 3333467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333467 killed at Tue Aug 3 00:52:41 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:52:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333522 >/dev/null 2>/dev/null selfserv with PID 3333522 found at Tue Aug 3 00:52:42 UTC 2021 selfserv with PID 3333522 started at Tue Aug 3 00:52:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333522 at Tue Aug 3 00:52:42 UTC 2021 kill -USR1 3333522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333522 killed at Tue Aug 3 00:52:42 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333579 >/dev/null 2>/dev/null selfserv with PID 3333579 found at Tue Aug 3 00:52:43 UTC 2021 selfserv with PID 3333579 started at Tue Aug 3 00:52:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3333579 at Tue Aug 3 00:52:43 UTC 2021 kill -USR1 3333579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333579 killed at Tue Aug 3 00:52:43 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:52:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333642 >/dev/null 2>/dev/null selfserv with PID 3333642 found at Tue Aug 3 00:52:43 UTC 2021 selfserv with PID 3333642 started at Tue Aug 3 00:52:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3333642 at Tue Aug 3 00:52:44 UTC 2021 kill -USR1 3333642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333642 killed at Tue Aug 3 00:52:44 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:52:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333718 >/dev/null 2>/dev/null selfserv with PID 3333718 found at Tue Aug 3 00:52:44 UTC 2021 selfserv with PID 3333718 started at Tue Aug 3 00:52:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333718 at Tue Aug 3 00:52:45 UTC 2021 kill -USR1 3333718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333718 killed at Tue Aug 3 00:52:45 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333794 >/dev/null 2>/dev/null selfserv with PID 3333794 found at Tue Aug 3 00:52:45 UTC 2021 selfserv with PID 3333794 started at Tue Aug 3 00:52:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333794 at Tue Aug 3 00:52:46 UTC 2021 kill -USR1 3333794 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333794 killed at Tue Aug 3 00:52:46 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:52:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333856 >/dev/null 2>/dev/null selfserv with PID 3333856 found at Tue Aug 3 00:52:46 UTC 2021 selfserv with PID 3333856 started at Tue Aug 3 00:52:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333856 at Tue Aug 3 00:52:47 UTC 2021 kill -USR1 3333856 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333856 killed at Tue Aug 3 00:52:47 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:52:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3333936 >/dev/null 2>/dev/null selfserv with PID 3333936 found at Tue Aug 3 00:52:47 UTC 2021 selfserv with PID 3333936 started at Tue Aug 3 00:52:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3333936 at Tue Aug 3 00:52:48 UTC 2021 kill -USR1 3333936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3333936 killed at Tue Aug 3 00:52:48 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3334205 >/dev/null 2>/dev/null selfserv with PID 3334205 found at Tue Aug 3 00:52:48 UTC 2021 selfserv with PID 3334205 started at Tue Aug 3 00:52:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3334205 at Tue Aug 3 00:52:49 UTC 2021 kill -USR1 3334205 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3334205 killed at Tue Aug 3 00:52:49 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:52:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3334264 >/dev/null 2>/dev/null selfserv with PID 3334264 found at Tue Aug 3 00:52:49 UTC 2021 selfserv with PID 3334264 started at Tue Aug 3 00:52:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3334264 at Tue Aug 3 00:52:49 UTC 2021 kill -USR1 3334264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3334264 killed at Tue Aug 3 00:52:49 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:52:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3334418 >/dev/null 2>/dev/null selfserv with PID 3334418 found at Tue Aug 3 00:52:50 UTC 2021 selfserv with PID 3334418 started at Tue Aug 3 00:52:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3334418 at Tue Aug 3 00:52:51 UTC 2021 kill -USR1 3334418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3334418 killed at Tue Aug 3 00:52:51 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3334634 >/dev/null 2>/dev/null selfserv with PID 3334634 found at Tue Aug 3 00:52:51 UTC 2021 selfserv with PID 3334634 started at Tue Aug 3 00:52:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3334634 at Tue Aug 3 00:52:51 UTC 2021 kill -USR1 3334634 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3334634 killed at Tue Aug 3 00:52:51 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:52:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3334820 >/dev/null 2>/dev/null selfserv with PID 3334820 found at Tue Aug 3 00:52:52 UTC 2021 selfserv with PID 3334820 started at Tue Aug 3 00:52:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3334820 at Tue Aug 3 00:52:52 UTC 2021 kill -USR1 3334820 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3334820 killed at Tue Aug 3 00:52:52 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:52:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3334932 >/dev/null 2>/dev/null selfserv with PID 3334932 found at Tue Aug 3 00:52:52 UTC 2021 selfserv with PID 3334932 started at Tue Aug 3 00:52:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3334932 at Tue Aug 3 00:52:53 UTC 2021 kill -USR1 3334932 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3334932 killed at Tue Aug 3 00:52:53 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3334996 >/dev/null 2>/dev/null selfserv with PID 3334996 found at Tue Aug 3 00:52:54 UTC 2021 selfserv with PID 3334996 started at Tue Aug 3 00:52:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3334996 at Tue Aug 3 00:52:54 UTC 2021 kill -USR1 3334996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3334996 killed at Tue Aug 3 00:52:54 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:52:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335059 >/dev/null 2>/dev/null selfserv with PID 3335059 found at Tue Aug 3 00:52:54 UTC 2021 selfserv with PID 3335059 started at Tue Aug 3 00:52:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3335059 at Tue Aug 3 00:52:55 UTC 2021 kill -USR1 3335059 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335059 killed at Tue Aug 3 00:52:55 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:52:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335140 >/dev/null 2>/dev/null selfserv with PID 3335140 found at Tue Aug 3 00:52:55 UTC 2021 selfserv with PID 3335140 started at Tue Aug 3 00:52:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3335140 at Tue Aug 3 00:52:56 UTC 2021 kill -USR1 3335140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335140 killed at Tue Aug 3 00:52:56 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335205 >/dev/null 2>/dev/null selfserv with PID 3335205 found at Tue Aug 3 00:52:56 UTC 2021 selfserv with PID 3335205 started at Tue Aug 3 00:52:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3335205 at Tue Aug 3 00:52:57 UTC 2021 kill -USR1 3335205 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335205 killed at Tue Aug 3 00:52:57 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:52:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335259 >/dev/null 2>/dev/null selfserv with PID 3335259 found at Tue Aug 3 00:52:57 UTC 2021 selfserv with PID 3335259 started at Tue Aug 3 00:52:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3335259 at Tue Aug 3 00:52:58 UTC 2021 kill -USR1 3335259 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335259 killed at Tue Aug 3 00:52:58 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:52:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335313 >/dev/null 2>/dev/null selfserv with PID 3335313 found at Tue Aug 3 00:52:58 UTC 2021 selfserv with PID 3335313 started at Tue Aug 3 00:52:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3335313 at Tue Aug 3 00:52:59 UTC 2021 kill -USR1 3335313 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335313 killed at Tue Aug 3 00:52:59 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:52:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:52:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335376 >/dev/null 2>/dev/null selfserv with PID 3335376 found at Tue Aug 3 00:52:59 UTC 2021 selfserv with PID 3335376 started at Tue Aug 3 00:52:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3335376 at Tue Aug 3 00:53:00 UTC 2021 kill -USR1 3335376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335376 killed at Tue Aug 3 00:53:00 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:53:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335433 >/dev/null 2>/dev/null selfserv with PID 3335433 found at Tue Aug 3 00:53:00 UTC 2021 selfserv with PID 3335433 started at Tue Aug 3 00:53:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3335433 at Tue Aug 3 00:53:01 UTC 2021 kill -USR1 3335433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335433 killed at Tue Aug 3 00:53:01 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:53:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335496 >/dev/null 2>/dev/null selfserv with PID 3335496 found at Tue Aug 3 00:53:01 UTC 2021 selfserv with PID 3335496 started at Tue Aug 3 00:53:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3335496 at Tue Aug 3 00:53:02 UTC 2021 kill -USR1 3335496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335496 killed at Tue Aug 3 00:53:02 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:53:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335569 >/dev/null 2>/dev/null selfserv with PID 3335569 found at Tue Aug 3 00:53:02 UTC 2021 selfserv with PID 3335569 started at Tue Aug 3 00:53:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3335569 at Tue Aug 3 00:53:03 UTC 2021 kill -USR1 3335569 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335569 killed at Tue Aug 3 00:53:03 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:53:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335646 >/dev/null 2>/dev/null selfserv with PID 3335646 found at Tue Aug 3 00:53:03 UTC 2021 selfserv with PID 3335646 started at Tue Aug 3 00:53:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3335646 at Tue Aug 3 00:53:04 UTC 2021 kill -USR1 3335646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335646 killed at Tue Aug 3 00:53:04 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:53:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335712 >/dev/null 2>/dev/null selfserv with PID 3335712 found at Tue Aug 3 00:53:04 UTC 2021 selfserv with PID 3335712 started at Tue Aug 3 00:53:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3335712 at Tue Aug 3 00:53:05 UTC 2021 kill -USR1 3335712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335712 killed at Tue Aug 3 00:53:05 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:53:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335776 >/dev/null 2>/dev/null selfserv with PID 3335776 found at Tue Aug 3 00:53:05 UTC 2021 selfserv with PID 3335776 started at Tue Aug 3 00:53:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3335776 at Tue Aug 3 00:53:05 UTC 2021 kill -USR1 3335776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335776 killed at Tue Aug 3 00:53:05 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:53:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3335847 >/dev/null 2>/dev/null selfserv with PID 3335847 found at Tue Aug 3 00:53:05 UTC 2021 selfserv with PID 3335847 started at Tue Aug 3 00:53:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3335847 at Tue Aug 3 00:53:06 UTC 2021 kill -USR1 3335847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3335847 killed at Tue Aug 3 00:53:06 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336033 >/dev/null 2>/dev/null selfserv with PID 3336033 found at Tue Aug 3 00:53:06 UTC 2021 selfserv with PID 3336033 started at Tue Aug 3 00:53:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336033 at Tue Aug 3 00:53:07 UTC 2021 kill -USR1 3336033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336033 killed at Tue Aug 3 00:53:07 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336235 >/dev/null 2>/dev/null selfserv with PID 3336235 found at Tue Aug 3 00:53:07 UTC 2021 selfserv with PID 3336235 started at Tue Aug 3 00:53:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336235 at Tue Aug 3 00:53:08 UTC 2021 kill -USR1 3336235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336235 killed at Tue Aug 3 00:53:08 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336342 >/dev/null 2>/dev/null selfserv with PID 3336342 found at Tue Aug 3 00:53:08 UTC 2021 selfserv with PID 3336342 started at Tue Aug 3 00:53:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #821: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3336342 at Tue Aug 3 00:53:09 UTC 2021 kill -USR1 3336342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336342 killed at Tue Aug 3 00:53:09 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336424 >/dev/null 2>/dev/null selfserv with PID 3336424 found at Tue Aug 3 00:53:09 UTC 2021 selfserv with PID 3336424 started at Tue Aug 3 00:53:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336424 at Tue Aug 3 00:53:10 UTC 2021 kill -USR1 3336424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336424 killed at Tue Aug 3 00:53:10 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336486 >/dev/null 2>/dev/null selfserv with PID 3336486 found at Tue Aug 3 00:53:10 UTC 2021 selfserv with PID 3336486 started at Tue Aug 3 00:53:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336486 at Tue Aug 3 00:53:11 UTC 2021 kill -USR1 3336486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336486 killed at Tue Aug 3 00:53:11 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336549 >/dev/null 2>/dev/null selfserv with PID 3336549 found at Tue Aug 3 00:53:11 UTC 2021 selfserv with PID 3336549 started at Tue Aug 3 00:53:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336549 at Tue Aug 3 00:53:12 UTC 2021 kill -USR1 3336549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336549 killed at Tue Aug 3 00:53:12 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336604 >/dev/null 2>/dev/null selfserv with PID 3336604 found at Tue Aug 3 00:53:12 UTC 2021 selfserv with PID 3336604 started at Tue Aug 3 00:53:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #825: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3336604 at Tue Aug 3 00:53:13 UTC 2021 kill -USR1 3336604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336604 killed at Tue Aug 3 00:53:13 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336664 >/dev/null 2>/dev/null selfserv with PID 3336664 found at Tue Aug 3 00:53:13 UTC 2021 selfserv with PID 3336664 started at Tue Aug 3 00:53:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336664 at Tue Aug 3 00:53:14 UTC 2021 kill -USR1 3336664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336664 killed at Tue Aug 3 00:53:14 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336720 >/dev/null 2>/dev/null selfserv with PID 3336720 found at Tue Aug 3 00:53:14 UTC 2021 selfserv with PID 3336720 started at Tue Aug 3 00:53:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336720 at Tue Aug 3 00:53:14 UTC 2021 kill -USR1 3336720 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336720 killed at Tue Aug 3 00:53:14 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336798 >/dev/null 2>/dev/null selfserv with PID 3336798 found at Tue Aug 3 00:53:15 UTC 2021 selfserv with PID 3336798 started at Tue Aug 3 00:53:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336798 at Tue Aug 3 00:53:15 UTC 2021 kill -USR1 3336798 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336798 killed at Tue Aug 3 00:53:15 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336867 >/dev/null 2>/dev/null selfserv with PID 3336867 found at Tue Aug 3 00:53:15 UTC 2021 selfserv with PID 3336867 started at Tue Aug 3 00:53:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #829: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3336867 at Tue Aug 3 00:53:16 UTC 2021 kill -USR1 3336867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336867 killed at Tue Aug 3 00:53:16 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336930 >/dev/null 2>/dev/null selfserv with PID 3336930 found at Tue Aug 3 00:53:16 UTC 2021 selfserv with PID 3336930 started at Tue Aug 3 00:53:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336930 at Tue Aug 3 00:53:17 UTC 2021 kill -USR1 3336930 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336930 killed at Tue Aug 3 00:53:17 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3336989 >/dev/null 2>/dev/null selfserv with PID 3336989 found at Tue Aug 3 00:53:17 UTC 2021 selfserv with PID 3336989 started at Tue Aug 3 00:53:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3336989 at Tue Aug 3 00:53:18 UTC 2021 kill -USR1 3336989 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3336989 killed at Tue Aug 3 00:53:18 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3337128 >/dev/null 2>/dev/null selfserv with PID 3337128 found at Tue Aug 3 00:53:18 UTC 2021 selfserv with PID 3337128 started at Tue Aug 3 00:53:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3337128 at Tue Aug 3 00:53:19 UTC 2021 kill -USR1 3337128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3337128 killed at Tue Aug 3 00:53:19 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3337329 >/dev/null 2>/dev/null selfserv with PID 3337329 found at Tue Aug 3 00:53:19 UTC 2021 selfserv with PID 3337329 started at Tue Aug 3 00:53:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #833: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3337329 at Tue Aug 3 00:53:20 UTC 2021 kill -USR1 3337329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3337329 killed at Tue Aug 3 00:53:20 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3337532 >/dev/null 2>/dev/null selfserv with PID 3337532 found at Tue Aug 3 00:53:20 UTC 2021 selfserv with PID 3337532 started at Tue Aug 3 00:53:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3337532 at Tue Aug 3 00:53:21 UTC 2021 kill -USR1 3337532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3337532 killed at Tue Aug 3 00:53:21 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3337681 >/dev/null 2>/dev/null selfserv with PID 3337681 found at Tue Aug 3 00:53:21 UTC 2021 selfserv with PID 3337681 started at Tue Aug 3 00:53:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3337681 at Tue Aug 3 00:53:22 UTC 2021 kill -USR1 3337681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3337681 killed at Tue Aug 3 00:53:22 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3337807 >/dev/null 2>/dev/null selfserv with PID 3337807 found at Tue Aug 3 00:53:22 UTC 2021 selfserv with PID 3337807 started at Tue Aug 3 00:53:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3337807 at Tue Aug 3 00:53:23 UTC 2021 kill -USR1 3337807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3337807 killed at Tue Aug 3 00:53:23 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:53:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3337874 >/dev/null 2>/dev/null selfserv with PID 3337874 found at Tue Aug 3 00:53:23 UTC 2021 selfserv with PID 3337874 started at Tue Aug 3 00:53:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #837: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3337874 at Tue Aug 3 00:53:23 UTC 2021 kill -USR1 3337874 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3337874 killed at Tue Aug 3 00:53:23 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:53:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3337963 >/dev/null 2>/dev/null selfserv with PID 3337963 found at Tue Aug 3 00:53:24 UTC 2021 selfserv with PID 3337963 started at Tue Aug 3 00:53:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3337963 at Tue Aug 3 00:53:24 UTC 2021 kill -USR1 3337963 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3337963 killed at Tue Aug 3 00:53:24 UTC 2021 ssl.sh: TLS Server hello response without SNI ---- selfserv starting at Tue Aug 3 00:53:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3338225 >/dev/null 2>/dev/null selfserv with PID 3338225 found at Tue Aug 3 00:53:25 UTC 2021 selfserv with PID 3338225 started at Tue Aug 3 00:53:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3338225 at Tue Aug 3 00:53:26 UTC 2021 kill -USR1 3338225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3338225 killed at Tue Aug 3 00:53:26 UTC 2021 ssl.sh: TLS Server hello response with SNI ---- selfserv starting at Tue Aug 3 00:53:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3338461 >/dev/null 2>/dev/null selfserv with PID 3338461 found at Tue Aug 3 00:53:26 UTC 2021 selfserv with PID 3338461 started at Tue Aug 3 00:53:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3338461 at Tue Aug 3 00:53:27 UTC 2021 kill -USR1 3338461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3338461 killed at Tue Aug 3 00:53:27 UTC 2021 ssl.sh: TLS Server response with alert ---- selfserv starting at Tue Aug 3 00:53:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3338553 >/dev/null 2>/dev/null selfserv with PID 3338553 found at Tue Aug 3 00:53:27 UTC 2021 selfserv with PID 3338553 started at Tue Aug 3 00:53:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #841: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3338553 at Tue Aug 3 00:53:27 UTC 2021 kill -USR1 3338553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3338553 killed at Tue Aug 3 00:53:27 UTC 2021 ssl.sh: SSL3 Server hello response without SNI ---- selfserv starting at Tue Aug 3 00:53:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3338632 >/dev/null 2>/dev/null selfserv with PID 3338632 found at Tue Aug 3 00:53:27 UTC 2021 selfserv with PID 3338632 started at Tue Aug 3 00:53:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3338632 at Tue Aug 3 00:53:28 UTC 2021 kill -USR1 3338632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3338632 killed at Tue Aug 3 00:53:28 UTC 2021 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv starting at Tue Aug 3 00:53:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3338714 >/dev/null 2>/dev/null selfserv with PID 3338714 found at Tue Aug 3 00:53:28 UTC 2021 selfserv with PID 3338714 started at Tue Aug 3 00:53:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #843: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3338714 at Tue Aug 3 00:53:29 UTC 2021 kill -USR1 3338714 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3338714 killed at Tue Aug 3 00:53:29 UTC 2021 ssl.sh: TLS Server hello response without SNI ---- selfserv starting at Tue Aug 3 00:53:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3338779 >/dev/null 2>/dev/null selfserv with PID 3338779 found at Tue Aug 3 00:53:29 UTC 2021 selfserv with PID 3338779 started at Tue Aug 3 00:53:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #844: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3338779 at Tue Aug 3 00:53:30 UTC 2021 kill -USR1 3338779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3338779 killed at Tue Aug 3 00:53:30 UTC 2021 ssl.sh: TLS Server hello response with SNI ---- selfserv starting at Tue Aug 3 00:53:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3338844 >/dev/null 2>/dev/null selfserv with PID 3338844 found at Tue Aug 3 00:53:30 UTC 2021 selfserv with PID 3338844 started at Tue Aug 3 00:53:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3338844 at Tue Aug 3 00:53:32 UTC 2021 kill -USR1 3338844 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3338844 killed at Tue Aug 3 00:53:32 UTC 2021 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv starting at Tue Aug 3 00:53:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3338909 >/dev/null 2>/dev/null selfserv with PID 3338909 found at Tue Aug 3 00:53:32 UTC 2021 selfserv with PID 3338909 started at Tue Aug 3 00:53:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #846: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3338909 at Tue Aug 3 00:53:32 UTC 2021 kill -USR1 3338909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3338909 killed at Tue Aug 3 00:53:32 UTC 2021 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv starting at Tue Aug 3 00:53:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3338979 >/dev/null 2>/dev/null selfserv with PID 3338979 found at Tue Aug 3 00:53:33 UTC 2021 selfserv with PID 3338979 started at Tue Aug 3 00:53:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #847: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3338979 at Tue Aug 3 00:53:33 UTC 2021 kill -USR1 3338979 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3338979 killed at Tue Aug 3 00:53:33 UTC 2021 ssl.sh: TLS Server response with alert ---- selfserv starting at Tue Aug 3 00:53:33 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3339046 >/dev/null 2>/dev/null selfserv with PID 3339046 found at Tue Aug 3 00:53:33 UTC 2021 selfserv with PID 3339046 started at Tue Aug 3 00:53:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #848: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3339046 at Tue Aug 3 00:53:34 UTC 2021 kill -USR1 3339046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3339046 killed at Tue Aug 3 00:53:34 UTC 2021 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv starting at Tue Aug 3 00:53:34 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3339109 >/dev/null 2>/dev/null selfserv with PID 3339109 found at Tue Aug 3 00:53:34 UTC 2021 selfserv with PID 3339109 started at Tue Aug 3 00:53:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3339109 at Tue Aug 3 00:53:35 UTC 2021 kill -USR1 3339109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3339109 killed at Tue Aug 3 00:53:35 UTC 2021 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv starting at Tue Aug 3 00:53:35 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3339178 >/dev/null 2>/dev/null selfserv with PID 3339178 found at Tue Aug 3 00:53:35 UTC 2021 selfserv with PID 3339178 started at Tue Aug 3 00:53:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv with PID 3339178 at Tue Aug 3 00:53:36 UTC 2021 kill -USR1 3339178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3339178 killed at Tue Aug 3 00:53:36 UTC 2021 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv starting at Tue Aug 3 00:53:36 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3339404 >/dev/null 2>/dev/null selfserv with PID 3339404 found at Tue Aug 3 00:53:36 UTC 2021 selfserv with PID 3339404 started at Tue Aug 3 00:53:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3339404 at Tue Aug 3 00:53:37 UTC 2021 kill -USR1 3339404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3339404 killed at Tue Aug 3 00:53:37 UTC 2021 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv starting at Tue Aug 3 00:53:37 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3339532 >/dev/null 2>/dev/null selfserv with PID 3339532 found at Tue Aug 3 00:53:37 UTC 2021 selfserv with PID 3339532 started at Tue Aug 3 00:53:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3339532 at Tue Aug 3 00:53:37 UTC 2021 kill -USR1 3339532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3339532 killed at Tue Aug 3 00:53:37 UTC 2021 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv starting at Tue Aug 3 00:53:37 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3339577 >/dev/null 2>/dev/null selfserv with PID 3339577 found at Tue Aug 3 00:53:37 UTC 2021 selfserv with PID 3339577 started at Tue Aug 3 00:53:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3339577 at Tue Aug 3 00:53:38 UTC 2021 kill -USR1 3339577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3339577 killed at Tue Aug 3 00:53:38 UTC 2021 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv starting at Tue Aug 3 00:53:38 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3339621 >/dev/null 2>/dev/null selfserv with PID 3339621 found at Tue Aug 3 00:53:38 UTC 2021 selfserv with PID 3339621 started at Tue Aug 3 00:53:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3339621 at Tue Aug 3 00:53:39 UTC 2021 kill -USR1 3339621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3339621 killed at Tue Aug 3 00:53:39 UTC 2021 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv starting at Tue Aug 3 00:53:39 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3339666 >/dev/null 2>/dev/null selfserv with PID 3339666 found at Tue Aug 3 00:53:39 UTC 2021 selfserv with PID 3339666 started at Tue Aug 3 00:53:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3339666 at Tue Aug 3 00:53:39 UTC 2021 kill -USR1 3339666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3339666 killed at Tue Aug 3 00:53:39 UTC 2021 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv starting at Tue Aug 3 00:53:39 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3339720 >/dev/null 2>/dev/null selfserv with PID 3339720 found at Tue Aug 3 00:53:39 UTC 2021 selfserv with PID 3339720 started at Tue Aug 3 00:53:39 UTC 2021 strsclnt -4 -q -p 8443 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Aug 3 00:53:39 UTC 2021 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Aug 3 00:53:42 UTC 2021 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv with PID 3339720 at Tue Aug 3 00:53:42 UTC 2021 kill -USR1 3339720 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3339720 killed at Tue Aug 3 00:53:42 UTC 2021 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv starting at Tue Aug 3 00:53:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340097 >/dev/null 2>/dev/null selfserv with PID 3340097 found at Tue Aug 3 00:53:42 UTC 2021 selfserv with PID 3340097 started at Tue Aug 3 00:53:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3340097 at Tue Aug 3 00:53:42 UTC 2021 kill -USR1 3340097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340097 killed at Tue Aug 3 00:53:42 UTC 2021 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:53:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340267 >/dev/null 2>/dev/null selfserv with PID 3340267 found at Tue Aug 3 00:53:43 UTC 2021 selfserv with PID 3340267 started at Tue Aug 3 00:53:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3340267 at Tue Aug 3 00:53:43 UTC 2021 kill -USR1 3340267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340267 killed at Tue Aug 3 00:53:43 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340357 >/dev/null 2>/dev/null selfserv with PID 3340357 found at Tue Aug 3 00:53:43 UTC 2021 selfserv with PID 3340357 started at Tue Aug 3 00:53:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3340357 at Tue Aug 3 00:53:43 UTC 2021 kill -USR1 3340357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340357 killed at Tue Aug 3 00:53:43 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340443 >/dev/null 2>/dev/null selfserv with PID 3340443 found at Tue Aug 3 00:53:43 UTC 2021 selfserv with PID 3340443 started at Tue Aug 3 00:53:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3340443 at Tue Aug 3 00:53:43 UTC 2021 kill -USR1 3340443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340443 killed at Tue Aug 3 00:53:43 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:53:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340571 >/dev/null 2>/dev/null selfserv with PID 3340571 found at Tue Aug 3 00:53:44 UTC 2021 selfserv with PID 3340571 started at Tue Aug 3 00:53:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3340571 at Tue Aug 3 00:53:44 UTC 2021 kill -USR1 3340571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340571 killed at Tue Aug 3 00:53:44 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340679 >/dev/null 2>/dev/null selfserv with PID 3340679 found at Tue Aug 3 00:53:44 UTC 2021 selfserv with PID 3340679 started at Tue Aug 3 00:53:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3340679 at Tue Aug 3 00:53:44 UTC 2021 kill -USR1 3340679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340679 killed at Tue Aug 3 00:53:44 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340751 >/dev/null 2>/dev/null selfserv with PID 3340751 found at Tue Aug 3 00:53:44 UTC 2021 selfserv with PID 3340751 started at Tue Aug 3 00:53:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3340751 at Tue Aug 3 00:53:44 UTC 2021 kill -USR1 3340751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340751 killed at Tue Aug 3 00:53:44 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:53:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340829 >/dev/null 2>/dev/null selfserv with PID 3340829 found at Tue Aug 3 00:53:45 UTC 2021 selfserv with PID 3340829 started at Tue Aug 3 00:53:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3340829 at Tue Aug 3 00:53:45 UTC 2021 kill -USR1 3340829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340829 killed at Tue Aug 3 00:53:45 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340887 >/dev/null 2>/dev/null selfserv with PID 3340887 found at Tue Aug 3 00:53:45 UTC 2021 selfserv with PID 3340887 started at Tue Aug 3 00:53:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3340887 at Tue Aug 3 00:53:45 UTC 2021 kill -USR1 3340887 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340887 killed at Tue Aug 3 00:53:45 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340928 >/dev/null 2>/dev/null selfserv with PID 3340928 found at Tue Aug 3 00:53:45 UTC 2021 selfserv with PID 3340928 started at Tue Aug 3 00:53:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3340928 at Tue Aug 3 00:53:45 UTC 2021 kill -USR1 3340928 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340928 killed at Tue Aug 3 00:53:46 UTC 2021 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:53:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3340970 >/dev/null 2>/dev/null selfserv with PID 3340970 found at Tue Aug 3 00:53:46 UTC 2021 selfserv with PID 3340970 started at Tue Aug 3 00:53:46 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3340970 at Tue Aug 3 00:53:46 UTC 2021 kill -USR1 3340970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3340970 killed at Tue Aug 3 00:53:46 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3341012 >/dev/null 2>/dev/null selfserv with PID 3341012 found at Tue Aug 3 00:53:46 UTC 2021 selfserv with PID 3341012 started at Tue Aug 3 00:53:46 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3341012 at Tue Aug 3 00:53:46 UTC 2021 kill -USR1 3341012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3341012 killed at Tue Aug 3 00:53:46 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3341054 >/dev/null 2>/dev/null selfserv with PID 3341054 found at Tue Aug 3 00:53:46 UTC 2021 selfserv with PID 3341054 started at Tue Aug 3 00:53:46 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3341054 at Tue Aug 3 00:53:46 UTC 2021 kill -USR1 3341054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3341054 killed at Tue Aug 3 00:53:47 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:53:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3341099 >/dev/null 2>/dev/null selfserv with PID 3341099 found at Tue Aug 3 00:53:47 UTC 2021 selfserv with PID 3341099 started at Tue Aug 3 00:53:47 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3341099 at Tue Aug 3 00:53:47 UTC 2021 kill -USR1 3341099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3341099 killed at Tue Aug 3 00:53:47 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3341145 >/dev/null 2>/dev/null selfserv with PID 3341145 found at Tue Aug 3 00:53:47 UTC 2021 selfserv with PID 3341145 started at Tue Aug 3 00:53:47 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3341145 at Tue Aug 3 00:53:47 UTC 2021 kill -USR1 3341145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3341145 killed at Tue Aug 3 00:53:47 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3341189 >/dev/null 2>/dev/null selfserv with PID 3341189 found at Tue Aug 3 00:53:47 UTC 2021 selfserv with PID 3341189 started at Tue Aug 3 00:53:47 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3341189 at Tue Aug 3 00:53:47 UTC 2021 kill -USR1 3341189 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3341189 killed at Tue Aug 3 00:53:48 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:53:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3341235 >/dev/null 2>/dev/null selfserv with PID 3341235 found at Tue Aug 3 00:53:48 UTC 2021 selfserv with PID 3341235 started at Tue Aug 3 00:53:48 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3341235 at Tue Aug 3 00:53:48 UTC 2021 kill -USR1 3341235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3341235 killed at Tue Aug 3 00:53:48 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3341283 >/dev/null 2>/dev/null selfserv with PID 3341283 found at Tue Aug 3 00:53:48 UTC 2021 selfserv with PID 3341283 started at Tue Aug 3 00:53:48 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3341283 at Tue Aug 3 00:53:48 UTC 2021 kill -USR1 3341283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3341283 killed at Tue Aug 3 00:53:48 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:53:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3341336 >/dev/null 2>/dev/null selfserv with PID 3341336 found at Tue Aug 3 00:53:48 UTC 2021 selfserv with PID 3341336 started at Tue Aug 3 00:53:48 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3341336 at Tue Aug 3 00:53:49 UTC 2021 kill -USR1 3341336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3341336 killed at Tue Aug 3 00:53:49 UTC 2021 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv starting at Tue Aug 3 00:53:49 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3341382 >/dev/null 2>/dev/null selfserv with PID 3341382 found at Tue Aug 3 00:53:49 UTC 2021 selfserv with PID 3341382 started at Tue Aug 3 00:53:49 UTC 2021 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv with PID 3341382 at Tue Aug 3 00:53:51 UTC 2021 kill -USR1 3341382 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3341382 killed at Tue Aug 3 00:53:51 UTC 2021 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv starting at Tue Aug 3 00:53:51 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3342166 >/dev/null 2>/dev/null selfserv with PID 3342166 found at Tue Aug 3 00:53:51 UTC 2021 selfserv with PID 3342166 started at Tue Aug 3 00:53:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3342166 at Tue Aug 3 00:53:53 UTC 2021 kill -USR1 3342166 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3342166 killed at Tue Aug 3 00:53:53 UTC 2021 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:53:53 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3343605 >/dev/null 2>/dev/null selfserv with PID 3343605 found at Tue Aug 3 00:53:53 UTC 2021 selfserv with PID 3343605 started at Tue Aug 3 00:53:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3343605 at Tue Aug 3 00:53:56 UTC 2021 kill -USR1 3343605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3343605 killed at Tue Aug 3 00:53:56 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:53:56 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3344306 >/dev/null 2>/dev/null selfserv with PID 3344306 found at Tue Aug 3 00:53:56 UTC 2021 selfserv with PID 3344306 started at Tue Aug 3 00:53:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3344306 at Tue Aug 3 00:53:58 UTC 2021 kill -USR1 3344306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3344306 killed at Tue Aug 3 00:53:58 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:53:58 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:53:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3344708 >/dev/null 2>/dev/null selfserv with PID 3344708 found at Tue Aug 3 00:53:58 UTC 2021 selfserv with PID 3344708 started at Tue Aug 3 00:53:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3344708 at Tue Aug 3 00:54:00 UTC 2021 kill -USR1 3344708 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3344708 killed at Tue Aug 3 00:54:00 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:54:00 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3345207 >/dev/null 2>/dev/null selfserv with PID 3345207 found at Tue Aug 3 00:54:01 UTC 2021 selfserv with PID 3345207 started at Tue Aug 3 00:54:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3345207 at Tue Aug 3 00:54:03 UTC 2021 kill -USR1 3345207 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3345207 killed at Tue Aug 3 00:54:03 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:54:03 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3345412 >/dev/null 2>/dev/null selfserv with PID 3345412 found at Tue Aug 3 00:54:03 UTC 2021 selfserv with PID 3345412 started at Tue Aug 3 00:54:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3345412 at Tue Aug 3 00:54:05 UTC 2021 kill -USR1 3345412 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3345412 killed at Tue Aug 3 00:54:05 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:54:05 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3345770 >/dev/null 2>/dev/null selfserv with PID 3345770 found at Tue Aug 3 00:54:05 UTC 2021 selfserv with PID 3345770 started at Tue Aug 3 00:54:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3345770 at Tue Aug 3 00:54:08 UTC 2021 kill -USR1 3345770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3345770 killed at Tue Aug 3 00:54:08 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:54:08 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3345898 >/dev/null 2>/dev/null selfserv with PID 3345898 found at Tue Aug 3 00:54:08 UTC 2021 selfserv with PID 3345898 started at Tue Aug 3 00:54:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3345898 at Tue Aug 3 00:54:10 UTC 2021 kill -USR1 3345898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3345898 killed at Tue Aug 3 00:54:10 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:54:10 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3346230 >/dev/null 2>/dev/null selfserv with PID 3346230 found at Tue Aug 3 00:54:10 UTC 2021 selfserv with PID 3346230 started at Tue Aug 3 00:54:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3346230 at Tue Aug 3 00:54:12 UTC 2021 kill -USR1 3346230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3346230 killed at Tue Aug 3 00:54:12 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:54:12 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3346383 >/dev/null 2>/dev/null selfserv with PID 3346383 found at Tue Aug 3 00:54:12 UTC 2021 selfserv with PID 3346383 started at Tue Aug 3 00:54:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3346383 at Tue Aug 3 00:54:15 UTC 2021 kill -USR1 3346383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3346383 killed at Tue Aug 3 00:54:15 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:54:15 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3346520 >/dev/null 2>/dev/null selfserv with PID 3346520 found at Tue Aug 3 00:54:15 UTC 2021 selfserv with PID 3346520 started at Tue Aug 3 00:54:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3346520 at Tue Aug 3 00:54:17 UTC 2021 kill -USR1 3346520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3346520 killed at Tue Aug 3 00:54:17 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 00:54:17 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3346875 >/dev/null 2>/dev/null selfserv with PID 3346875 found at Tue Aug 3 00:54:17 UTC 2021 selfserv with PID 3346875 started at Tue Aug 3 00:54:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3346875 at Tue Aug 3 00:54:19 UTC 2021 kill -USR1 3346875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3346875 killed at Tue Aug 3 00:54:19 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 00:54:19 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3347133 >/dev/null 2>/dev/null selfserv with PID 3347133 found at Tue Aug 3 00:54:19 UTC 2021 selfserv with PID 3347133 started at Tue Aug 3 00:54:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3347133 at Tue Aug 3 00:54:22 UTC 2021 kill -USR1 3347133 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3347133 killed at Tue Aug 3 00:54:22 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:54:22 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3347561 >/dev/null 2>/dev/null selfserv with PID 3347561 found at Tue Aug 3 00:54:22 UTC 2021 selfserv with PID 3347561 started at Tue Aug 3 00:54:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3347561 at Tue Aug 3 00:54:24 UTC 2021 kill -USR1 3347561 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3347561 killed at Tue Aug 3 00:54:24 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:54:24 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3347638 >/dev/null 2>/dev/null selfserv with PID 3347638 found at Tue Aug 3 00:54:24 UTC 2021 selfserv with PID 3347638 started at Tue Aug 3 00:54:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3347638 at Tue Aug 3 00:54:26 UTC 2021 kill -USR1 3347638 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3347638 killed at Tue Aug 3 00:54:26 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:54:26 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3347963 >/dev/null 2>/dev/null selfserv with PID 3347963 found at Tue Aug 3 00:54:26 UTC 2021 selfserv with PID 3347963 started at Tue Aug 3 00:54:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3347963 at Tue Aug 3 00:54:29 UTC 2021 kill -USR1 3347963 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3347963 killed at Tue Aug 3 00:54:29 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:54:29 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3348231 >/dev/null 2>/dev/null selfserv with PID 3348231 found at Tue Aug 3 00:54:29 UTC 2021 selfserv with PID 3348231 started at Tue Aug 3 00:54:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3348231 at Tue Aug 3 00:54:31 UTC 2021 kill -USR1 3348231 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3348231 killed at Tue Aug 3 00:54:31 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:54:31 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3348409 >/dev/null 2>/dev/null selfserv with PID 3348409 found at Tue Aug 3 00:54:31 UTC 2021 selfserv with PID 3348409 started at Tue Aug 3 00:54:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3348409 at Tue Aug 3 00:54:33 UTC 2021 kill -USR1 3348409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3348409 killed at Tue Aug 3 00:54:33 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:54:33 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3348591 >/dev/null 2>/dev/null selfserv with PID 3348591 found at Tue Aug 3 00:54:34 UTC 2021 selfserv with PID 3348591 started at Tue Aug 3 00:54:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3348591 at Tue Aug 3 00:54:36 UTC 2021 kill -USR1 3348591 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3348591 killed at Tue Aug 3 00:54:36 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:54:36 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3348968 >/dev/null 2>/dev/null selfserv with PID 3348968 found at Tue Aug 3 00:54:36 UTC 2021 selfserv with PID 3348968 started at Tue Aug 3 00:54:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3348968 at Tue Aug 3 00:54:38 UTC 2021 kill -USR1 3348968 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3348968 killed at Tue Aug 3 00:54:38 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:54:38 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3349084 >/dev/null 2>/dev/null selfserv with PID 3349084 found at Tue Aug 3 00:54:38 UTC 2021 selfserv with PID 3349084 started at Tue Aug 3 00:54:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3349084 at Tue Aug 3 00:54:41 UTC 2021 kill -USR1 3349084 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3349084 killed at Tue Aug 3 00:54:41 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:54:41 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3349361 >/dev/null 2>/dev/null selfserv with PID 3349361 found at Tue Aug 3 00:54:41 UTC 2021 selfserv with PID 3349361 started at Tue Aug 3 00:54:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3349361 at Tue Aug 3 00:54:43 UTC 2021 kill -USR1 3349361 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3349361 killed at Tue Aug 3 00:54:43 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:54:43 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3349801 >/dev/null 2>/dev/null selfserv with PID 3349801 found at Tue Aug 3 00:54:43 UTC 2021 selfserv with PID 3349801 started at Tue Aug 3 00:54:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3349801 at Tue Aug 3 00:54:46 UTC 2021 kill -USR1 3349801 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3349801 killed at Tue Aug 3 00:54:46 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:54:46 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3350434 >/dev/null 2>/dev/null selfserv with PID 3350434 found at Tue Aug 3 00:54:46 UTC 2021 selfserv with PID 3350434 started at Tue Aug 3 00:54:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3350434 at Tue Aug 3 00:54:48 UTC 2021 kill -USR1 3350434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3350434 killed at Tue Aug 3 00:54:48 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:54:48 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3350689 >/dev/null 2>/dev/null selfserv with PID 3350689 found at Tue Aug 3 00:54:48 UTC 2021 selfserv with PID 3350689 started at Tue Aug 3 00:54:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3350689 at Tue Aug 3 00:54:50 UTC 2021 kill -USR1 3350689 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3350689 killed at Tue Aug 3 00:54:50 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:54:50 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3350820 >/dev/null 2>/dev/null selfserv with PID 3350820 found at Tue Aug 3 00:54:51 UTC 2021 selfserv with PID 3350820 started at Tue Aug 3 00:54:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3350820 at Tue Aug 3 00:54:53 UTC 2021 kill -USR1 3350820 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3350820 killed at Tue Aug 3 00:54:53 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:54:53 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3350912 >/dev/null 2>/dev/null selfserv with PID 3350912 found at Tue Aug 3 00:54:53 UTC 2021 selfserv with PID 3350912 started at Tue Aug 3 00:54:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3350912 at Tue Aug 3 00:54:55 UTC 2021 kill -USR1 3350912 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3350912 killed at Tue Aug 3 00:54:55 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:54:55 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3351004 >/dev/null 2>/dev/null selfserv with PID 3351004 found at Tue Aug 3 00:54:55 UTC 2021 selfserv with PID 3351004 started at Tue Aug 3 00:54:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3351004 at Tue Aug 3 00:54:58 UTC 2021 kill -USR1 3351004 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3351004 killed at Tue Aug 3 00:54:58 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:54:58 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:54:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3351281 >/dev/null 2>/dev/null selfserv with PID 3351281 found at Tue Aug 3 00:54:58 UTC 2021 selfserv with PID 3351281 started at Tue Aug 3 00:54:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3351281 at Tue Aug 3 00:55:00 UTC 2021 kill -USR1 3351281 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3351281 killed at Tue Aug 3 00:55:00 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 00:55:00 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3351500 >/dev/null 2>/dev/null selfserv with PID 3351500 found at Tue Aug 3 00:55:00 UTC 2021 selfserv with PID 3351500 started at Tue Aug 3 00:55:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3351500 at Tue Aug 3 00:55:02 UTC 2021 kill -USR1 3351500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3351500 killed at Tue Aug 3 00:55:02 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 00:55:02 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3351865 >/dev/null 2>/dev/null selfserv with PID 3351865 found at Tue Aug 3 00:55:02 UTC 2021 selfserv with PID 3351865 started at Tue Aug 3 00:55:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3351865 at Tue Aug 3 00:55:05 UTC 2021 kill -USR1 3351865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3351865 killed at Tue Aug 3 00:55:05 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:55:05 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3351970 >/dev/null 2>/dev/null selfserv with PID 3351970 found at Tue Aug 3 00:55:05 UTC 2021 selfserv with PID 3351970 started at Tue Aug 3 00:55:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3351970 at Tue Aug 3 00:55:07 UTC 2021 kill -USR1 3351970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3351970 killed at Tue Aug 3 00:55:07 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 00:55:07 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3352097 >/dev/null 2>/dev/null selfserv with PID 3352097 found at Tue Aug 3 00:55:08 UTC 2021 selfserv with PID 3352097 started at Tue Aug 3 00:55:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3352097 at Tue Aug 3 00:55:10 UTC 2021 kill -USR1 3352097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3352097 killed at Tue Aug 3 00:55:10 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:55:10 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3352397 >/dev/null 2>/dev/null selfserv with PID 3352397 found at Tue Aug 3 00:55:10 UTC 2021 selfserv with PID 3352397 started at Tue Aug 3 00:55:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3352397 at Tue Aug 3 00:55:12 UTC 2021 kill -USR1 3352397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3352397 killed at Tue Aug 3 00:55:12 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 00:55:12 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3352723 >/dev/null 2>/dev/null selfserv with PID 3352723 found at Tue Aug 3 00:55:12 UTC 2021 selfserv with PID 3352723 started at Tue Aug 3 00:55:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3352723 at Tue Aug 3 00:55:15 UTC 2021 kill -USR1 3352723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3352723 killed at Tue Aug 3 00:55:15 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 00:55:15 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3353348 >/dev/null 2>/dev/null selfserv with PID 3353348 found at Tue Aug 3 00:55:15 UTC 2021 selfserv with PID 3353348 started at Tue Aug 3 00:55:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3353348 at Tue Aug 3 00:55:17 UTC 2021 kill -USR1 3353348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3353348 killed at Tue Aug 3 00:55:17 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:55:17 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3353526 >/dev/null 2>/dev/null selfserv with PID 3353526 found at Tue Aug 3 00:55:17 UTC 2021 selfserv with PID 3353526 started at Tue Aug 3 00:55:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3353526 at Tue Aug 3 00:55:19 UTC 2021 kill -USR1 3353526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3353526 killed at Tue Aug 3 00:55:19 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:55:20 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3353992 >/dev/null 2>/dev/null selfserv with PID 3353992 found at Tue Aug 3 00:55:20 UTC 2021 selfserv with PID 3353992 started at Tue Aug 3 00:55:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3353992 at Tue Aug 3 00:55:22 UTC 2021 kill -USR1 3353992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3353992 killed at Tue Aug 3 00:55:22 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:55:22 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3354328 >/dev/null 2>/dev/null selfserv with PID 3354328 found at Tue Aug 3 00:55:22 UTC 2021 selfserv with PID 3354328 started at Tue Aug 3 00:55:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #975: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3354328 at Tue Aug 3 00:55:24 UTC 2021 kill -USR1 3354328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3354328 killed at Tue Aug 3 00:55:24 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:55:24 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3354608 >/dev/null 2>/dev/null selfserv with PID 3354608 found at Tue Aug 3 00:55:24 UTC 2021 selfserv with PID 3354608 started at Tue Aug 3 00:55:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #976: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3354608 at Tue Aug 3 00:55:27 UTC 2021 kill -USR1 3354608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3354608 killed at Tue Aug 3 00:55:27 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:55:27 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3354822 >/dev/null 2>/dev/null selfserv with PID 3354822 found at Tue Aug 3 00:55:27 UTC 2021 selfserv with PID 3354822 started at Tue Aug 3 00:55:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3354822 at Tue Aug 3 00:55:29 UTC 2021 kill -USR1 3354822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3354822 killed at Tue Aug 3 00:55:29 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:55:29 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3355299 >/dev/null 2>/dev/null selfserv with PID 3355299 found at Tue Aug 3 00:55:29 UTC 2021 selfserv with PID 3355299 started at Tue Aug 3 00:55:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3355299 at Tue Aug 3 00:55:32 UTC 2021 kill -USR1 3355299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3355299 killed at Tue Aug 3 00:55:32 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:55:32 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3355783 >/dev/null 2>/dev/null selfserv with PID 3355783 found at Tue Aug 3 00:55:32 UTC 2021 selfserv with PID 3355783 started at Tue Aug 3 00:55:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #979: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3355783 at Tue Aug 3 00:55:34 UTC 2021 kill -USR1 3355783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3355783 killed at Tue Aug 3 00:55:34 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:55:34 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3356102 >/dev/null 2>/dev/null selfserv with PID 3356102 found at Tue Aug 3 00:55:34 UTC 2021 selfserv with PID 3356102 started at Tue Aug 3 00:55:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #980: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3356102 at Tue Aug 3 00:55:37 UTC 2021 kill -USR1 3356102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3356102 killed at Tue Aug 3 00:55:37 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:55:37 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3356495 >/dev/null 2>/dev/null selfserv with PID 3356495 found at Tue Aug 3 00:55:37 UTC 2021 selfserv with PID 3356495 started at Tue Aug 3 00:55:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3356495 at Tue Aug 3 00:55:39 UTC 2021 kill -USR1 3356495 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3356495 killed at Tue Aug 3 00:55:39 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:55:39 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3356880 >/dev/null 2>/dev/null selfserv with PID 3356880 found at Tue Aug 3 00:55:39 UTC 2021 selfserv with PID 3356880 started at Tue Aug 3 00:55:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3356880 at Tue Aug 3 00:55:41 UTC 2021 kill -USR1 3356880 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3356880 killed at Tue Aug 3 00:55:41 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:55:41 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3357042 >/dev/null 2>/dev/null selfserv with PID 3357042 found at Tue Aug 3 00:55:42 UTC 2021 selfserv with PID 3357042 started at Tue Aug 3 00:55:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #983: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3357042 at Tue Aug 3 00:55:44 UTC 2021 kill -USR1 3357042 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3357042 killed at Tue Aug 3 00:55:44 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:55:44 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3357221 >/dev/null 2>/dev/null selfserv with PID 3357221 found at Tue Aug 3 00:55:44 UTC 2021 selfserv with PID 3357221 started at Tue Aug 3 00:55:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3357221 at Tue Aug 3 00:55:46 UTC 2021 kill -USR1 3357221 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3357221 killed at Tue Aug 3 00:55:46 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:55:46 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3357413 >/dev/null 2>/dev/null selfserv with PID 3357413 found at Tue Aug 3 00:55:46 UTC 2021 selfserv with PID 3357413 started at Tue Aug 3 00:55:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3357413 at Tue Aug 3 00:55:48 UTC 2021 kill -USR1 3357413 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3357413 killed at Tue Aug 3 00:55:48 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:55:48 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3357872 >/dev/null 2>/dev/null selfserv with PID 3357872 found at Tue Aug 3 00:55:49 UTC 2021 selfserv with PID 3357872 started at Tue Aug 3 00:55:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3357872 at Tue Aug 3 00:55:51 UTC 2021 kill -USR1 3357872 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3357872 killed at Tue Aug 3 00:55:51 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:55:51 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358022 >/dev/null 2>/dev/null selfserv with PID 3358022 found at Tue Aug 3 00:55:51 UTC 2021 selfserv with PID 3358022 started at Tue Aug 3 00:55:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #987: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3358022 at Tue Aug 3 00:55:53 UTC 2021 kill -USR1 3358022 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358022 killed at Tue Aug 3 00:55:53 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:55:53 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358120 >/dev/null 2>/dev/null selfserv with PID 3358120 found at Tue Aug 3 00:55:53 UTC 2021 selfserv with PID 3358120 started at Tue Aug 3 00:55:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3358120 at Tue Aug 3 00:55:56 UTC 2021 kill -USR1 3358120 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358120 killed at Tue Aug 3 00:55:56 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:55:56 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358188 >/dev/null 2>/dev/null selfserv with PID 3358188 found at Tue Aug 3 00:55:56 UTC 2021 selfserv with PID 3358188 started at Tue Aug 3 00:55:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3358188 at Tue Aug 3 00:55:58 UTC 2021 kill -USR1 3358188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358188 killed at Tue Aug 3 00:55:58 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:55:58 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:55:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358271 >/dev/null 2>/dev/null selfserv with PID 3358271 found at Tue Aug 3 00:55:58 UTC 2021 selfserv with PID 3358271 started at Tue Aug 3 00:55:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3358271 at Tue Aug 3 00:56:01 UTC 2021 kill -USR1 3358271 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358271 killed at Tue Aug 3 00:56:01 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 00:56:01 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358371 >/dev/null 2>/dev/null selfserv with PID 3358371 found at Tue Aug 3 00:56:01 UTC 2021 selfserv with PID 3358371 started at Tue Aug 3 00:56:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #991: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3358371 at Tue Aug 3 00:56:03 UTC 2021 kill -USR1 3358371 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358371 killed at Tue Aug 3 00:56:03 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 00:56:03 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358537 >/dev/null 2>/dev/null selfserv with PID 3358537 found at Tue Aug 3 00:56:03 UTC 2021 selfserv with PID 3358537 started at Tue Aug 3 00:56:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3358537 at Tue Aug 3 00:56:06 UTC 2021 kill -USR1 3358537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358537 killed at Tue Aug 3 00:56:06 UTC 2021 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv starting at Tue Aug 3 00:56:06 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358645 >/dev/null 2>/dev/null selfserv with PID 3358645 found at Tue Aug 3 00:56:06 UTC 2021 selfserv with PID 3358645 started at Tue Aug 3 00:56:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3358645 at Tue Aug 3 00:56:07 UTC 2021 kill -USR1 3358645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358645 killed at Tue Aug 3 00:56:07 UTC 2021 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:56:07 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358732 >/dev/null 2>/dev/null selfserv with PID 3358732 found at Tue Aug 3 00:56:07 UTC 2021 selfserv with PID 3358732 started at Tue Aug 3 00:56:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3358732 at Tue Aug 3 00:56:07 UTC 2021 kill -USR1 3358732 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358732 killed at Tue Aug 3 00:56:07 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:07 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358786 >/dev/null 2>/dev/null selfserv with PID 3358786 found at Tue Aug 3 00:56:08 UTC 2021 selfserv with PID 3358786 started at Tue Aug 3 00:56:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3358786 at Tue Aug 3 00:56:08 UTC 2021 kill -USR1 3358786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358786 killed at Tue Aug 3 00:56:08 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:08 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358843 >/dev/null 2>/dev/null selfserv with PID 3358843 found at Tue Aug 3 00:56:08 UTC 2021 selfserv with PID 3358843 started at Tue Aug 3 00:56:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3358843 at Tue Aug 3 00:56:09 UTC 2021 kill -USR1 3358843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358843 killed at Tue Aug 3 00:56:09 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:56:09 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358885 >/dev/null 2>/dev/null selfserv with PID 3358885 found at Tue Aug 3 00:56:09 UTC 2021 selfserv with PID 3358885 started at Tue Aug 3 00:56:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3358885 at Tue Aug 3 00:56:09 UTC 2021 kill -USR1 3358885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358885 killed at Tue Aug 3 00:56:09 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:09 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3358989 >/dev/null 2>/dev/null selfserv with PID 3358989 found at Tue Aug 3 00:56:10 UTC 2021 selfserv with PID 3358989 started at Tue Aug 3 00:56:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3358989 at Tue Aug 3 00:56:10 UTC 2021 kill -USR1 3358989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3358989 killed at Tue Aug 3 00:56:10 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:10 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359104 >/dev/null 2>/dev/null selfserv with PID 3359104 found at Tue Aug 3 00:56:10 UTC 2021 selfserv with PID 3359104 started at Tue Aug 3 00:56:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3359104 at Tue Aug 3 00:56:11 UTC 2021 kill -USR1 3359104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359104 killed at Tue Aug 3 00:56:11 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:56:11 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359202 >/dev/null 2>/dev/null selfserv with PID 3359202 found at Tue Aug 3 00:56:11 UTC 2021 selfserv with PID 3359202 started at Tue Aug 3 00:56:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3359202 at Tue Aug 3 00:56:11 UTC 2021 kill -USR1 3359202 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359202 killed at Tue Aug 3 00:56:11 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:11 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359276 >/dev/null 2>/dev/null selfserv with PID 3359276 found at Tue Aug 3 00:56:12 UTC 2021 selfserv with PID 3359276 started at Tue Aug 3 00:56:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3359276 at Tue Aug 3 00:56:12 UTC 2021 kill -USR1 3359276 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359276 killed at Tue Aug 3 00:56:12 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:12 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359320 >/dev/null 2>/dev/null selfserv with PID 3359320 found at Tue Aug 3 00:56:12 UTC 2021 selfserv with PID 3359320 started at Tue Aug 3 00:56:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3359320 at Tue Aug 3 00:56:13 UTC 2021 kill -USR1 3359320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359320 killed at Tue Aug 3 00:56:13 UTC 2021 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:56:13 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359383 >/dev/null 2>/dev/null selfserv with PID 3359383 found at Tue Aug 3 00:56:13 UTC 2021 selfserv with PID 3359383 started at Tue Aug 3 00:56:13 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3359383 at Tue Aug 3 00:56:13 UTC 2021 kill -USR1 3359383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359383 killed at Tue Aug 3 00:56:13 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:13 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359431 >/dev/null 2>/dev/null selfserv with PID 3359431 found at Tue Aug 3 00:56:14 UTC 2021 selfserv with PID 3359431 started at Tue Aug 3 00:56:14 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3359431 at Tue Aug 3 00:56:14 UTC 2021 kill -USR1 3359431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359431 killed at Tue Aug 3 00:56:14 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:14 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359492 >/dev/null 2>/dev/null selfserv with PID 3359492 found at Tue Aug 3 00:56:14 UTC 2021 selfserv with PID 3359492 started at Tue Aug 3 00:56:14 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3359492 at Tue Aug 3 00:56:15 UTC 2021 kill -USR1 3359492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359492 killed at Tue Aug 3 00:56:15 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:56:15 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359538 >/dev/null 2>/dev/null selfserv with PID 3359538 found at Tue Aug 3 00:56:15 UTC 2021 selfserv with PID 3359538 started at Tue Aug 3 00:56:15 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3359538 at Tue Aug 3 00:56:15 UTC 2021 kill -USR1 3359538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359538 killed at Tue Aug 3 00:56:15 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:15 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359631 >/dev/null 2>/dev/null selfserv with PID 3359631 found at Tue Aug 3 00:56:16 UTC 2021 selfserv with PID 3359631 started at Tue Aug 3 00:56:16 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3359631 at Tue Aug 3 00:56:16 UTC 2021 kill -USR1 3359631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359631 killed at Tue Aug 3 00:56:16 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:16 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359769 >/dev/null 2>/dev/null selfserv with PID 3359769 found at Tue Aug 3 00:56:16 UTC 2021 selfserv with PID 3359769 started at Tue Aug 3 00:56:16 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3359769 at Tue Aug 3 00:56:17 UTC 2021 kill -USR1 3359769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359769 killed at Tue Aug 3 00:56:17 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 00:56:17 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3359899 >/dev/null 2>/dev/null selfserv with PID 3359899 found at Tue Aug 3 00:56:17 UTC 2021 selfserv with PID 3359899 started at Tue Aug 3 00:56:17 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3359899 at Tue Aug 3 00:56:17 UTC 2021 kill -USR1 3359899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3359899 killed at Tue Aug 3 00:56:17 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:17 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3360123 >/dev/null 2>/dev/null selfserv with PID 3360123 found at Tue Aug 3 00:56:18 UTC 2021 selfserv with PID 3360123 started at Tue Aug 3 00:56:18 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3360123 at Tue Aug 3 00:56:18 UTC 2021 kill -USR1 3360123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3360123 killed at Tue Aug 3 00:56:18 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 00:56:18 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 00:56:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3360241 >/dev/null 2>/dev/null selfserv with PID 3360241 found at Tue Aug 3 00:56:18 UTC 2021 selfserv with PID 3360241 started at Tue Aug 3 00:56:18 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3360241 at Tue Aug 3 00:56:19 UTC 2021 kill -USR1 3360241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3360241 killed at Tue Aug 3 00:56:19 UTC 2021 TIMESTAMP ssl END: Tue Aug 3 00:56:19 UTC 2021 Running tests for ocsp TIMESTAMP ocsp BEGIN: Tue Aug 3 00:56:19 UTC 2021 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Tue Aug 3 00:56:19 UTC 2021 Running tests for pkits TIMESTAMP pkits BEGIN: Tue Aug 3 00:56:19 UTC 2021 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Tue Aug 3 00:56:19 UTC 2021 Running tests for ec TIMESTAMP ec BEGIN: Tue Aug 3 00:56:19 UTC 2021 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Tue Aug 3 00:56:19 UTC 2021 ecperf.sh: ecperf test =============================== Testing NIST-P256 using freebl implementation... ECDH_Derive count: 100 sec: 0.09 op/sec: 1137.05 ECDSA_Sign count: 100 sec: 0.03 op/sec: 3316.64 ECDHE max rate = 1113.42 ECDSA_Verify count: 100 sec: 0.07 op/sec: 1435.67 ... okay. Testing NIST-P384 using freebl implementation... ECDH_Derive count: 100 sec: 0.26 op/sec: 384.22 ECDSA_Sign count: 100 sec: 0.05 op/sec: 1863.52 ECDHE max rate = 561.93 ECDSA_Verify count: 100 sec: 0.16 op/sec: 635.05 ... okay. Testing NIST-P521 using freebl implementation... ECDH_Derive count: 100 sec: 0.16 op/sec: 620.79 ECDSA_Sign count: 100 sec: 0.06 op/sec: 1795.43 ECDHE max rate = 604.06 ECDSA_Verify count: 100 sec: 0.11 op/sec: 905.16 ... okay. Testing Curve25519 using freebl implementation... ECDH_Derive count: 100 sec: 0.01 op/sec: 14834.59 ... okay. ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Tue Aug 3 00:56:20 UTC 2021 Running ec tests for ectest TIMESTAMP ectest BEGIN: Tue Aug 3 00:56:20 UTC 2021 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: freebl ec tests - PASSED ectest.sh: #7: pk11 ec tests - PASSED TIMESTAMP ectest END: Tue Aug 3 00:56:20 UTC 2021 TIMESTAMP ec END: Tue Aug 3 00:56:20 UTC 2021 Running tests for gtests TIMESTAMP gtests BEGIN: Tue Aug 3 00:56:20 UTC 2021 /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/gtests gtests: prng_gtest certhigh_gtest certdb_gtest der_gtest pk11_gtest util_gtest freebl_gtest softoken_gtest sysinit_gtest blake2b_gtest smime_gtest mozpkix_gtest gtests.sh: prng_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/prng_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/prng_gtest -n dummy -s CN=dummy -t ,, -x -m 1 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #1: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/prng_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing prng_gtest [==========] Running 240 tests from 1 test suite. [----------] Global test environment set-up. [----------] 240 tests from NISTTestVector/PRNGTest [ RUN ] NISTTestVector/PRNGTest.HashDRBG/0 [ OK ] NISTTestVector/PRNGTest.HashDRBG/0 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/1 [ OK ] NISTTestVector/PRNGTest.HashDRBG/1 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/2 [ OK ] NISTTestVector/PRNGTest.HashDRBG/2 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/3 [ OK ] NISTTestVector/PRNGTest.HashDRBG/3 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/4 [ OK ] NISTTestVector/PRNGTest.HashDRBG/4 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/5 [ OK ] NISTTestVector/PRNGTest.HashDRBG/5 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/6 [ OK ] NISTTestVector/PRNGTest.HashDRBG/6 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/7 [ OK ] NISTTestVector/PRNGTest.HashDRBG/7 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/8 [ OK ] NISTTestVector/PRNGTest.HashDRBG/8 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/9 [ OK ] NISTTestVector/PRNGTest.HashDRBG/9 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/10 [ OK ] NISTTestVector/PRNGTest.HashDRBG/10 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/11 [ OK ] NISTTestVector/PRNGTest.HashDRBG/11 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/12 [ OK ] NISTTestVector/PRNGTest.HashDRBG/12 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/13 [ OK ] NISTTestVector/PRNGTest.HashDRBG/13 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/14 [ OK ] NISTTestVector/PRNGTest.HashDRBG/14 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/15 [ OK ] NISTTestVector/PRNGTest.HashDRBG/15 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/16 [ OK ] NISTTestVector/PRNGTest.HashDRBG/16 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/17 [ OK ] NISTTestVector/PRNGTest.HashDRBG/17 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/18 [ OK ] NISTTestVector/PRNGTest.HashDRBG/18 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/19 [ OK ] NISTTestVector/PRNGTest.HashDRBG/19 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/20 [ OK ] NISTTestVector/PRNGTest.HashDRBG/20 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/21 [ OK ] NISTTestVector/PRNGTest.HashDRBG/21 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/22 [ OK ] NISTTestVector/PRNGTest.HashDRBG/22 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/23 [ OK ] NISTTestVector/PRNGTest.HashDRBG/23 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/24 [ OK ] NISTTestVector/PRNGTest.HashDRBG/24 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/25 [ OK ] NISTTestVector/PRNGTest.HashDRBG/25 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/26 [ OK ] NISTTestVector/PRNGTest.HashDRBG/26 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/27 [ OK ] NISTTestVector/PRNGTest.HashDRBG/27 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/28 [ OK ] NISTTestVector/PRNGTest.HashDRBG/28 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/29 [ OK ] NISTTestVector/PRNGTest.HashDRBG/29 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/30 [ OK ] NISTTestVector/PRNGTest.HashDRBG/30 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/31 [ OK ] NISTTestVector/PRNGTest.HashDRBG/31 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/32 [ OK ] NISTTestVector/PRNGTest.HashDRBG/32 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/33 [ OK ] NISTTestVector/PRNGTest.HashDRBG/33 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/34 [ OK ] NISTTestVector/PRNGTest.HashDRBG/34 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/35 [ OK ] NISTTestVector/PRNGTest.HashDRBG/35 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/36 [ OK ] NISTTestVector/PRNGTest.HashDRBG/36 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/37 [ OK ] NISTTestVector/PRNGTest.HashDRBG/37 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/38 [ OK ] NISTTestVector/PRNGTest.HashDRBG/38 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/39 [ OK ] NISTTestVector/PRNGTest.HashDRBG/39 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/40 [ OK ] NISTTestVector/PRNGTest.HashDRBG/40 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/41 [ OK ] NISTTestVector/PRNGTest.HashDRBG/41 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/42 [ OK ] NISTTestVector/PRNGTest.HashDRBG/42 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/43 [ OK ] NISTTestVector/PRNGTest.HashDRBG/43 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/44 [ OK ] NISTTestVector/PRNGTest.HashDRBG/44 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/45 [ OK ] NISTTestVector/PRNGTest.HashDRBG/45 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/46 [ OK ] NISTTestVector/PRNGTest.HashDRBG/46 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/47 [ OK ] NISTTestVector/PRNGTest.HashDRBG/47 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/48 [ OK ] NISTTestVector/PRNGTest.HashDRBG/48 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/49 [ OK ] NISTTestVector/PRNGTest.HashDRBG/49 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/50 [ OK ] NISTTestVector/PRNGTest.HashDRBG/50 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/51 [ OK ] NISTTestVector/PRNGTest.HashDRBG/51 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/52 [ OK ] NISTTestVector/PRNGTest.HashDRBG/52 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/53 [ OK ] NISTTestVector/PRNGTest.HashDRBG/53 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/54 [ OK ] NISTTestVector/PRNGTest.HashDRBG/54 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/55 [ OK ] NISTTestVector/PRNGTest.HashDRBG/55 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/56 [ OK ] NISTTestVector/PRNGTest.HashDRBG/56 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/57 [ OK ] NISTTestVector/PRNGTest.HashDRBG/57 (1 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/58 [ OK ] NISTTestVector/PRNGTest.HashDRBG/58 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/59 [ OK ] NISTTestVector/PRNGTest.HashDRBG/59 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/60 [ OK ] NISTTestVector/PRNGTest.HashDRBG/60 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/61 [ OK ] NISTTestVector/PRNGTest.HashDRBG/61 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/62 [ OK ] NISTTestVector/PRNGTest.HashDRBG/62 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/63 [ OK ] NISTTestVector/PRNGTest.HashDRBG/63 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/64 [ OK ] NISTTestVector/PRNGTest.HashDRBG/64 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/65 [ OK ] NISTTestVector/PRNGTest.HashDRBG/65 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/66 [ OK ] NISTTestVector/PRNGTest.HashDRBG/66 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/67 [ OK ] NISTTestVector/PRNGTest.HashDRBG/67 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/68 [ OK ] NISTTestVector/PRNGTest.HashDRBG/68 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/69 [ OK ] NISTTestVector/PRNGTest.HashDRBG/69 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/70 [ OK ] NISTTestVector/PRNGTest.HashDRBG/70 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/71 [ OK ] NISTTestVector/PRNGTest.HashDRBG/71 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/72 [ OK ] NISTTestVector/PRNGTest.HashDRBG/72 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/73 [ OK ] NISTTestVector/PRNGTest.HashDRBG/73 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/74 [ OK ] NISTTestVector/PRNGTest.HashDRBG/74 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/75 [ OK ] NISTTestVector/PRNGTest.HashDRBG/75 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/76 [ OK ] NISTTestVector/PRNGTest.HashDRBG/76 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/77 [ OK ] NISTTestVector/PRNGTest.HashDRBG/77 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/78 [ OK ] NISTTestVector/PRNGTest.HashDRBG/78 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/79 [ OK ] NISTTestVector/PRNGTest.HashDRBG/79 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/80 [ OK ] NISTTestVector/PRNGTest.HashDRBG/80 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/81 [ OK ] NISTTestVector/PRNGTest.HashDRBG/81 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/82 [ OK ] NISTTestVector/PRNGTest.HashDRBG/82 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/83 [ OK ] NISTTestVector/PRNGTest.HashDRBG/83 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/84 [ OK ] NISTTestVector/PRNGTest.HashDRBG/84 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/85 [ OK ] NISTTestVector/PRNGTest.HashDRBG/85 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/86 [ OK ] NISTTestVector/PRNGTest.HashDRBG/86 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/87 [ OK ] NISTTestVector/PRNGTest.HashDRBG/87 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/88 [ OK ] NISTTestVector/PRNGTest.HashDRBG/88 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/89 [ OK ] NISTTestVector/PRNGTest.HashDRBG/89 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/90 [ OK ] NISTTestVector/PRNGTest.HashDRBG/90 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/91 [ OK ] NISTTestVector/PRNGTest.HashDRBG/91 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/92 [ OK ] NISTTestVector/PRNGTest.HashDRBG/92 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/93 [ OK ] NISTTestVector/PRNGTest.HashDRBG/93 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/94 [ OK ] NISTTestVector/PRNGTest.HashDRBG/94 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/95 [ OK ] NISTTestVector/PRNGTest.HashDRBG/95 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/96 [ OK ] NISTTestVector/PRNGTest.HashDRBG/96 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/97 [ OK ] NISTTestVector/PRNGTest.HashDRBG/97 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/98 [ OK ] NISTTestVector/PRNGTest.HashDRBG/98 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/99 [ OK ] NISTTestVector/PRNGTest.HashDRBG/99 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/100 [ OK ] NISTTestVector/PRNGTest.HashDRBG/100 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/101 [ OK ] NISTTestVector/PRNGTest.HashDRBG/101 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/102 [ OK ] NISTTestVector/PRNGTest.HashDRBG/102 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/103 [ OK ] NISTTestVector/PRNGTest.HashDRBG/103 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/104 [ OK ] NISTTestVector/PRNGTest.HashDRBG/104 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/105 [ OK ] NISTTestVector/PRNGTest.HashDRBG/105 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/106 [ OK ] NISTTestVector/PRNGTest.HashDRBG/106 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/107 [ OK ] NISTTestVector/PRNGTest.HashDRBG/107 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/108 [ OK ] NISTTestVector/PRNGTest.HashDRBG/108 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/109 [ OK ] NISTTestVector/PRNGTest.HashDRBG/109 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/110 [ OK ] NISTTestVector/PRNGTest.HashDRBG/110 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/111 [ OK ] NISTTestVector/PRNGTest.HashDRBG/111 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/112 [ OK ] NISTTestVector/PRNGTest.HashDRBG/112 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/113 [ OK ] NISTTestVector/PRNGTest.HashDRBG/113 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/114 [ OK ] NISTTestVector/PRNGTest.HashDRBG/114 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/115 [ OK ] NISTTestVector/PRNGTest.HashDRBG/115 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/116 [ OK ] NISTTestVector/PRNGTest.HashDRBG/116 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/117 [ OK ] NISTTestVector/PRNGTest.HashDRBG/117 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/118 [ OK ] NISTTestVector/PRNGTest.HashDRBG/118 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/119 [ OK ] NISTTestVector/PRNGTest.HashDRBG/119 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/120 [ OK ] NISTTestVector/PRNGTest.HashDRBG/120 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/121 [ OK ] NISTTestVector/PRNGTest.HashDRBG/121 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/122 [ OK ] NISTTestVector/PRNGTest.HashDRBG/122 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/123 [ OK ] NISTTestVector/PRNGTest.HashDRBG/123 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/124 [ OK ] NISTTestVector/PRNGTest.HashDRBG/124 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/125 [ OK ] NISTTestVector/PRNGTest.HashDRBG/125 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/126 [ OK ] NISTTestVector/PRNGTest.HashDRBG/126 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/127 [ OK ] NISTTestVector/PRNGTest.HashDRBG/127 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/128 [ OK ] NISTTestVector/PRNGTest.HashDRBG/128 (1 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/129 [ OK ] NISTTestVector/PRNGTest.HashDRBG/129 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/130 [ OK ] NISTTestVector/PRNGTest.HashDRBG/130 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/131 [ OK ] NISTTestVector/PRNGTest.HashDRBG/131 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/132 [ OK ] NISTTestVector/PRNGTest.HashDRBG/132 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/133 [ OK ] NISTTestVector/PRNGTest.HashDRBG/133 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/134 [ OK ] NISTTestVector/PRNGTest.HashDRBG/134 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/135 [ OK ] NISTTestVector/PRNGTest.HashDRBG/135 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/136 [ OK ] NISTTestVector/PRNGTest.HashDRBG/136 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/137 [ OK ] NISTTestVector/PRNGTest.HashDRBG/137 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/138 [ OK ] NISTTestVector/PRNGTest.HashDRBG/138 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/139 [ OK ] NISTTestVector/PRNGTest.HashDRBG/139 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/140 [ OK ] NISTTestVector/PRNGTest.HashDRBG/140 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/141 [ OK ] NISTTestVector/PRNGTest.HashDRBG/141 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/142 [ OK ] NISTTestVector/PRNGTest.HashDRBG/142 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/143 [ OK ] NISTTestVector/PRNGTest.HashDRBG/143 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/144 [ OK ] NISTTestVector/PRNGTest.HashDRBG/144 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/145 [ OK ] NISTTestVector/PRNGTest.HashDRBG/145 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/146 [ OK ] NISTTestVector/PRNGTest.HashDRBG/146 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/147 [ OK ] NISTTestVector/PRNGTest.HashDRBG/147 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/148 [ OK ] NISTTestVector/PRNGTest.HashDRBG/148 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/149 [ OK ] NISTTestVector/PRNGTest.HashDRBG/149 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/150 [ OK ] NISTTestVector/PRNGTest.HashDRBG/150 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/151 [ OK ] NISTTestVector/PRNGTest.HashDRBG/151 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/152 [ OK ] NISTTestVector/PRNGTest.HashDRBG/152 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/153 [ OK ] NISTTestVector/PRNGTest.HashDRBG/153 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/154 [ OK ] NISTTestVector/PRNGTest.HashDRBG/154 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/155 [ OK ] NISTTestVector/PRNGTest.HashDRBG/155 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/156 [ OK ] NISTTestVector/PRNGTest.HashDRBG/156 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/157 [ OK ] NISTTestVector/PRNGTest.HashDRBG/157 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/158 [ OK ] NISTTestVector/PRNGTest.HashDRBG/158 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/159 [ OK ] NISTTestVector/PRNGTest.HashDRBG/159 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/160 [ OK ] NISTTestVector/PRNGTest.HashDRBG/160 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/161 [ OK ] NISTTestVector/PRNGTest.HashDRBG/161 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/162 [ OK ] NISTTestVector/PRNGTest.HashDRBG/162 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/163 [ OK ] NISTTestVector/PRNGTest.HashDRBG/163 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/164 [ OK ] NISTTestVector/PRNGTest.HashDRBG/164 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/165 [ OK ] NISTTestVector/PRNGTest.HashDRBG/165 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/166 [ OK ] NISTTestVector/PRNGTest.HashDRBG/166 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/167 [ OK ] NISTTestVector/PRNGTest.HashDRBG/167 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/168 [ OK ] NISTTestVector/PRNGTest.HashDRBG/168 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/169 [ OK ] NISTTestVector/PRNGTest.HashDRBG/169 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/170 [ OK ] NISTTestVector/PRNGTest.HashDRBG/170 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/171 [ OK ] NISTTestVector/PRNGTest.HashDRBG/171 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/172 [ OK ] NISTTestVector/PRNGTest.HashDRBG/172 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/173 [ OK ] NISTTestVector/PRNGTest.HashDRBG/173 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/174 [ OK ] NISTTestVector/PRNGTest.HashDRBG/174 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/175 [ OK ] NISTTestVector/PRNGTest.HashDRBG/175 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/176 [ OK ] NISTTestVector/PRNGTest.HashDRBG/176 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/177 [ OK ] NISTTestVector/PRNGTest.HashDRBG/177 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/178 [ OK ] NISTTestVector/PRNGTest.HashDRBG/178 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/179 [ OK ] NISTTestVector/PRNGTest.HashDRBG/179 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/180 [ OK ] NISTTestVector/PRNGTest.HashDRBG/180 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/181 [ OK ] NISTTestVector/PRNGTest.HashDRBG/181 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/182 [ OK ] NISTTestVector/PRNGTest.HashDRBG/182 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/183 [ OK ] NISTTestVector/PRNGTest.HashDRBG/183 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/184 [ OK ] NISTTestVector/PRNGTest.HashDRBG/184 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/185 [ OK ] NISTTestVector/PRNGTest.HashDRBG/185 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/186 [ OK ] NISTTestVector/PRNGTest.HashDRBG/186 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/187 [ OK ] NISTTestVector/PRNGTest.HashDRBG/187 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/188 [ OK ] NISTTestVector/PRNGTest.HashDRBG/188 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/189 [ OK ] NISTTestVector/PRNGTest.HashDRBG/189 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/190 [ OK ] NISTTestVector/PRNGTest.HashDRBG/190 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/191 [ OK ] NISTTestVector/PRNGTest.HashDRBG/191 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/192 [ OK ] NISTTestVector/PRNGTest.HashDRBG/192 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/193 [ OK ] NISTTestVector/PRNGTest.HashDRBG/193 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/194 [ OK ] NISTTestVector/PRNGTest.HashDRBG/194 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/195 [ OK ] NISTTestVector/PRNGTest.HashDRBG/195 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/196 [ OK ] NISTTestVector/PRNGTest.HashDRBG/196 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/197 [ OK ] NISTTestVector/PRNGTest.HashDRBG/197 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/198 [ OK ] NISTTestVector/PRNGTest.HashDRBG/198 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/199 [ OK ] NISTTestVector/PRNGTest.HashDRBG/199 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/200 [ OK ] NISTTestVector/PRNGTest.HashDRBG/200 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/201 [ OK ] NISTTestVector/PRNGTest.HashDRBG/201 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/202 [ OK ] NISTTestVector/PRNGTest.HashDRBG/202 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/203 [ OK ] NISTTestVector/PRNGTest.HashDRBG/203 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/204 [ OK ] NISTTestVector/PRNGTest.HashDRBG/204 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/205 [ OK ] NISTTestVector/PRNGTest.HashDRBG/205 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/206 [ OK ] NISTTestVector/PRNGTest.HashDRBG/206 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/207 [ OK ] NISTTestVector/PRNGTest.HashDRBG/207 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/208 [ OK ] NISTTestVector/PRNGTest.HashDRBG/208 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/209 [ OK ] NISTTestVector/PRNGTest.HashDRBG/209 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/210 [ OK ] NISTTestVector/PRNGTest.HashDRBG/210 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/211 [ OK ] NISTTestVector/PRNGTest.HashDRBG/211 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/212 [ OK ] NISTTestVector/PRNGTest.HashDRBG/212 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/213 [ OK ] NISTTestVector/PRNGTest.HashDRBG/213 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/214 [ OK ] NISTTestVector/PRNGTest.HashDRBG/214 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/215 [ OK ] NISTTestVector/PRNGTest.HashDRBG/215 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/216 [ OK ] NISTTestVector/PRNGTest.HashDRBG/216 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/217 [ OK ] NISTTestVector/PRNGTest.HashDRBG/217 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/218 [ OK ] NISTTestVector/PRNGTest.HashDRBG/218 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/219 [ OK ] NISTTestVector/PRNGTest.HashDRBG/219 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/220 [ OK ] NISTTestVector/PRNGTest.HashDRBG/220 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/221 [ OK ] NISTTestVector/PRNGTest.HashDRBG/221 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/222 [ OK ] NISTTestVector/PRNGTest.HashDRBG/222 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/223 [ OK ] NISTTestVector/PRNGTest.HashDRBG/223 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/224 [ OK ] NISTTestVector/PRNGTest.HashDRBG/224 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/225 [ OK ] NISTTestVector/PRNGTest.HashDRBG/225 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/226 [ OK ] NISTTestVector/PRNGTest.HashDRBG/226 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/227 [ OK ] NISTTestVector/PRNGTest.HashDRBG/227 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/228 [ OK ] NISTTestVector/PRNGTest.HashDRBG/228 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/229 [ OK ] NISTTestVector/PRNGTest.HashDRBG/229 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/230 [ OK ] NISTTestVector/PRNGTest.HashDRBG/230 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/231 [ OK ] NISTTestVector/PRNGTest.HashDRBG/231 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/232 [ OK ] NISTTestVector/PRNGTest.HashDRBG/232 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/233 [ OK ] NISTTestVector/PRNGTest.HashDRBG/233 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/234 [ OK ] NISTTestVector/PRNGTest.HashDRBG/234 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/235 [ OK ] NISTTestVector/PRNGTest.HashDRBG/235 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/236 [ OK ] NISTTestVector/PRNGTest.HashDRBG/236 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/237 [ OK ] NISTTestVector/PRNGTest.HashDRBG/237 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/238 [ OK ] NISTTestVector/PRNGTest.HashDRBG/238 (0 ms) [ RUN ] NISTTestVector/PRNGTest.HashDRBG/239 [ OK ] NISTTestVector/PRNGTest.HashDRBG/239 (0 ms) [----------] 240 tests from NISTTestVector/PRNGTest (3 ms total) [----------] Global test environment tear-down [==========] 240 tests from 1 test suite ran. (3 ms total) [ PASSED ] 240 tests. gtests.sh: #2: prng_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/prng_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: certhigh_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/certhigh_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/certhigh_gtest -n dummy -s CN=dummy -t ,, -x -m 2 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #3: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/certhigh_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing certhigh_gtest [==========] Running 1 test from 1 test suite. [----------] Global test environment set-up. [----------] 1 test from CERT_FormatNameUnitTest [ RUN ] CERT_FormatNameUnitTest.Overflow [ OK ] CERT_FormatNameUnitTest.Overflow (0 ms) [----------] 1 test from CERT_FormatNameUnitTest (0 ms total) [----------] Global test environment tear-down [==========] 1 test from 1 test suite ran. (0 ms total) [ PASSED ] 1 test. gtests.sh: #4: certhigh_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/certhigh_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: certdb_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/certdb_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/certdb_gtest -n dummy -s CN=dummy -t ,, -x -m 3 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #5: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/certdb_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing certdb_gtest [==========] Running 21 tests from 5 test suites. [----------] Global test environment set-up. [----------] 2 tests from Alg1485Test [ RUN ] Alg1485Test.ShortOIDTest [ OK ] Alg1485Test.ShortOIDTest (0 ms) [ RUN ] Alg1485Test.BrokenOIDTest [ OK ] Alg1485Test.BrokenOIDTest (0 ms) [----------] 2 tests from Alg1485Test (0 ms total) [----------] 2 tests from CertTest [ RUN ] CertTest.GetCertDer [ OK ] CertTest.GetCertDer (1 ms) [ RUN ] CertTest.GetCertDerBad [ OK ] CertTest.GetCertDerBad (0 ms) [----------] 2 tests from CertTest (1 ms total) [----------] 1 test from DecodeCertsTest [ RUN ] DecodeCertsTest.EmptyCertPackage [ OK ] DecodeCertsTest.EmptyCertPackage (0 ms) [----------] 1 test from DecodeCertsTest (0 ms total) [----------] 11 tests from ParseAVAStrings/Alg1485ParseTest [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/0 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/0 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/1 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/1 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/2 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/2 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/3 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/3 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/4 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/4 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/5 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/5 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/6 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/6 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/7 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/7 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/8 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/8 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/9 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/9 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/10 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/10 (0 ms) [----------] 11 tests from ParseAVAStrings/Alg1485ParseTest (0 ms total) [----------] 5 tests from CompareAVAStrings/Alg1485CompareTest [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/0 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/0 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/1 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/1 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/2 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/2 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/3 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/3 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/4 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/4 (0 ms) [----------] 5 tests from CompareAVAStrings/Alg1485CompareTest (0 ms total) [----------] Global test environment tear-down [==========] 21 tests from 5 test suites ran. (1 ms total) [ PASSED ] 21 tests. gtests.sh: #6: certdb_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/certdb_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: der_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/der_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/der_gtest -n dummy -s CN=dummy -t ,, -x -m 4 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #7: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/der_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing der_gtest [==========] Running 20 tests from 3 test suites. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (0 ms total) [----------] 1 test from PK12ImportTest [ RUN ] PK12ImportTest.ImportPK12With2P7 [ OK ] PK12ImportTest.ImportPK12With2P7 (4 ms) [----------] 1 test from PK12ImportTest (4 ms total) [----------] 6 tests from QuickderTestsInvalidLengths/QuickDERTest [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/0 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/0 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/1 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/1 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/2 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/2 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/3 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/3 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/4 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/4 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/5 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/5 (0 ms) [----------] 6 tests from QuickderTestsInvalidLengths/QuickDERTest (0 ms total) [----------] Global test environment tear-down [==========] 20 tests from 3 test suites ran. (4 ms total) [ PASSED ] 20 tests. gtests.sh: #8: der_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/der_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: pk11_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/pk11_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/pk11_gtest -n dummy -s CN=dummy -t ,, -x -m 5 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #9: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/pk11_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing pk11_gtest [==========] Running 13692 tests from 89 test suites. [----------] Global test environment set-up. [----------] 3 tests from Pkcs11AesCmacTest [ RUN ] Pkcs11AesCmacTest.Aes128NistExample1 [ OK ] Pkcs11AesCmacTest.Aes128NistExample1 (0 ms) [ RUN ] Pkcs11AesCmacTest.General [ OK ] Pkcs11AesCmacTest.General (0 ms) [ RUN ] Pkcs11AesCmacTest.InvalidKeySize [ OK ] Pkcs11AesCmacTest.InvalidKeySize (0 ms) [----------] 3 tests from Pkcs11AesCmacTest (0 ms total) [----------] 11 tests from Pkcs11AesGcmTest [ RUN ] Pkcs11AesGcmTest.ZeroLengthIV [ OK ] Pkcs11AesGcmTest.ZeroLengthIV (0 ms) [ RUN ] Pkcs11AesGcmTest.AllZeroIV [ OK ] Pkcs11AesGcmTest.AllZeroIV (0 ms) [ RUN ] Pkcs11AesGcmTest.TwelveByteZeroIV [ OK ] Pkcs11AesGcmTest.TwelveByteZeroIV (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceBasic [ OK ] Pkcs11AesGcmTest.MessageInterfaceBasic (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceSeparateTags [ OK ] Pkcs11AesGcmTest.MessageInterfaceSeparateTags (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceIVMask [ OK ] Pkcs11AesGcmTest.MessageInterfaceIVMask (1 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceXorCounter [ OK ] Pkcs11AesGcmTest.MessageInterfaceXorCounter (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceCounterOverflow [ OK ] Pkcs11AesGcmTest.MessageInterfaceCounterOverflow (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceXorCounterOverflow [ OK ] Pkcs11AesGcmTest.MessageInterfaceXorCounterOverflow (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceRandomIV [ OK ] Pkcs11AesGcmTest.MessageInterfaceRandomIV (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceRandomOverflow [ OK ] Pkcs11AesGcmTest.MessageInterfaceRandomOverflow (0 ms) [----------] 11 tests from Pkcs11AesGcmTest (1 ms total) [----------] 10 tests from Pkcs11AESKeyWrapPadTest [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapECKey [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapECKey (3 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRsaKey [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRsaKey (17 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_EvenBlock [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_EvenBlock (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock1 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock1 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock2 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock2 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_PaddingTooLong [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_PaddingTooLong (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_NoPadding [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_NoPadding (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding1 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding1 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding2 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding2 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_ShortValidPadding [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_ShortValidPadding (0 ms) [----------] 10 tests from Pkcs11AESKeyWrapPadTest (20 ms total) [----------] 1 test from Pkcs11CbcPadTest [ RUN ] Pkcs11CbcPadTest.FailEncryptShortParam [ OK ] Pkcs11CbcPadTest.FailEncryptShortParam (0 ms) [----------] 1 test from Pkcs11CbcPadTest (0 ms total) [----------] 6 tests from Pkcs11ChaCha20Poly1305Test [ RUN ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt [ OK ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.Xor [ OK ] Pkcs11ChaCha20Poly1305Test.Xor (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.GenerateXor [ OK ] Pkcs11ChaCha20Poly1305Test.GenerateXor (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.XorInvalidParams [ OK ] Pkcs11ChaCha20Poly1305Test.XorInvalidParams (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.ChaCha201305MessageInterfaceBasic [ OK ] Pkcs11ChaCha20Poly1305Test.ChaCha201305MessageInterfaceBasic (1 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.ChaCha20Poly1305MessageInterfaceSeparateTags [ OK ] Pkcs11ChaCha20Poly1305Test.ChaCha20Poly1305MessageInterfaceSeparateTags (0 ms) [----------] 6 tests from Pkcs11ChaCha20Poly1305Test (1 ms total) [----------] 2 tests from Pkcs11CipherOp [ RUN ] Pkcs11CipherOp.SingleCtxMultipleUnalignedCipherOps [ OK ] Pkcs11CipherOp.SingleCtxMultipleUnalignedCipherOps (0 ms) [ RUN ] Pkcs11CipherOp.SingleCtxMultipleUnalignedCipherOpsChaCha20 [ OK ] Pkcs11CipherOp.SingleCtxMultipleUnalignedCipherOpsChaCha20 (0 ms) [----------] 2 tests from Pkcs11CipherOp (0 ms total) [----------] 4 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (2 ms) [ RUN ] DERPrivateKeyImportTest.ImportEcdsaKey [ OK ] DERPrivateKeyImportTest.ImportEcdsaKey (1 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 4 tests from DERPrivateKeyImportTest (3 ms total) [----------] 4 tests from Pkcs11DesTest [ RUN ] Pkcs11DesTest.ZeroLengthIV [ OK ] Pkcs11DesTest.ZeroLengthIV (0 ms) [ RUN ] Pkcs11DesTest.IVTooShort [ OK ] Pkcs11DesTest.IVTooShort (0 ms) [ RUN ] Pkcs11DesTest.WrongLengthIV [ OK ] Pkcs11DesTest.WrongLengthIV (0 ms) [ RUN ] Pkcs11DesTest.AllGood [ OK ] Pkcs11DesTest.AllGood (0 ms) [----------] 4 tests from Pkcs11DesTest (0 ms total) [----------] 10 tests from Pkcs11EcdsaSha256Test [ RUN ] Pkcs11EcdsaSha256Test.ImportNoCurveOIDOrAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportNoCurveOIDOrAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportOnlyAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportOnlyAlgorithmParams (1 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportMatchingCurveOIDAndAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportMatchingCurveOIDAndAlgorithmParams (1 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportDissimilarCurveOIDAndAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportDissimilarCurveOIDAndAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportNoAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportNoAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportInvalidAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportInvalidAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportPointNotOnCurve [ OK ] Pkcs11EcdsaSha256Test.ImportPointNotOnCurve (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportNoPublicKey [ OK ] Pkcs11EcdsaSha256Test.ImportNoPublicKey (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportSpkiNoAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportSpkiNoAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportSpkiPointNotOnCurve [ OK ] Pkcs11EcdsaSha256Test.ImportSpkiPointNotOnCurve (0 ms) [----------] 10 tests from Pkcs11EcdsaSha256Test (2 ms total) [----------] 1 test from PK11FindCertsTestBase [ RUN ] PK11FindCertsTestBase.CertAddListWithData [ OK ] PK11FindCertsTestBase.CertAddListWithData (3 ms) [----------] 1 test from PK11FindCertsTestBase (3 ms total) [----------] 6 tests from PK11FindRawCertsBySubjectTest [ RUN ] PK11FindRawCertsBySubjectTest.TestNoCertsImportedNoCertsFound [ OK ] PK11FindRawCertsBySubjectTest.TestNoCertsImportedNoCertsFound (1 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestOneCertImportedNoCertsFound [ OK ] PK11FindRawCertsBySubjectTest.TestOneCertImportedNoCertsFound (3 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestMultipleMatchingCertsFound [ OK ] PK11FindRawCertsBySubjectTest.TestMultipleMatchingCertsFound (4 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestNoCertsOnInternalSlots [ OK ] PK11FindRawCertsBySubjectTest.TestNoCertsOnInternalSlots (3 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestFindEmptySubject [ OK ] PK11FindRawCertsBySubjectTest.TestFindEmptySubject (3 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestSearchForNullSubject [ OK ] PK11FindRawCertsBySubjectTest.TestSearchForNullSubject (2 ms) [----------] 6 tests from PK11FindRawCertsBySubjectTest (16 ms total) [----------] 4 tests from PK11GetCertsMatchingPrivateKeyTest [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsAtAll [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsAtAll (2 ms) [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsForKey [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsForKey (2 ms) [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestOneCertForKey [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestOneCertForKey (4 ms) [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestTwoCertsForKey [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestTwoCertsForKey (6 ms) [----------] 4 tests from PK11GetCertsMatchingPrivateKeyTest (14 ms total) [----------] 1 test from PK11FindEncodedCertInSlotTest [ RUN ] PK11FindEncodedCertInSlotTest.TestFindEncodedCert [ OK ] PK11FindEncodedCertInSlotTest.TestFindEncodedCert (2 ms) [----------] 1 test from PK11FindEncodedCertInSlotTest (2 ms total) [----------] 3 tests from ModeParameterizedTest [ RUN ] ModeParameterizedTest.BadEncapsulatedPubKey [ OK ] ModeParameterizedTest.BadEncapsulatedPubKey (0 ms) [ RUN ] ModeParameterizedTest.InvalidContextParams [ OK ] ModeParameterizedTest.InvalidContextParams (0 ms) [ RUN ] ModeParameterizedTest.InvalidReceiverKeyType [ OK ] ModeParameterizedTest.InvalidReceiverKeyType (21 ms) [----------] 3 tests from ModeParameterizedTest (21 ms total) [----------] 1 test from Pkcs11KbkdfTest [ RUN ] Pkcs11KbkdfTest.TestAdditionalKey [ OK ] Pkcs11KbkdfTest.TestAdditionalKey (0 ms) [----------] 1 test from Pkcs11KbkdfTest (0 ms total) [----------] 1 test from Pkcs11DhNullKeyTest [ RUN ] Pkcs11DhNullKeyTest.UseNullPublicValue Generate DH pair [ OK ] Pkcs11DhNullKeyTest.UseNullPublicValue (116 ms) [----------] 1 test from Pkcs11DhNullKeyTest (116 ms total) [----------] 3 tests from Pkcs11ModuleTest [ RUN ] Pkcs11ModuleTest.LoadUnload [ OK ] Pkcs11ModuleTest.LoadUnload (0 ms) [ RUN ] Pkcs11ModuleTest.ListSlots loaded slot: NSS User Private Key and Certificate Services loaded slot: NSS Internal Cryptographic Services loaded slot: Test PKCS11 Public Certs Slot loaded slot: Test PKCS11 Slot 二 [ OK ] Pkcs11ModuleTest.ListSlots (1 ms) [ RUN ] Pkcs11ModuleTest.PublicCertificatesToken [ OK ] Pkcs11ModuleTest.PublicCertificatesToken (0 ms) [----------] 3 tests from Pkcs11ModuleTest (1 ms total) [----------] 3 tests from Pkcs11Pbkdf2Test [ RUN ] Pkcs11Pbkdf2Test.DeriveKnown1 [ OK ] Pkcs11Pbkdf2Test.DeriveKnown1 (28 ms) [ RUN ] Pkcs11Pbkdf2Test.DeriveKnown2 [ OK ] Pkcs11Pbkdf2Test.DeriveKnown2 (53 ms) [ RUN ] Pkcs11Pbkdf2Test.KeyLenSizes [ OK ] Pkcs11Pbkdf2Test.KeyLenSizes (0 ms) [----------] 3 tests from Pkcs11Pbkdf2Test (81 ms total) [----------] 5 tests from TlsPrfTest [ RUN ] TlsPrfTest.ExtendedMsParamErr [ OK ] TlsPrfTest.ExtendedMsParamErr (0 ms) [ RUN ] TlsPrfTest.ExtendedMsDhTlsPrf [ OK ] TlsPrfTest.ExtendedMsDhTlsPrf (0 ms) [ RUN ] TlsPrfTest.ExtendedMsRsaTlsPrf [ OK ] TlsPrfTest.ExtendedMsRsaTlsPrf (0 ms) [ RUN ] TlsPrfTest.ExtendedMsDhSha256 [ OK ] TlsPrfTest.ExtendedMsDhSha256 (0 ms) [ RUN ] TlsPrfTest.ExtendedMsRsaSha256 [ OK ] TlsPrfTest.ExtendedMsRsaSha256 (0 ms) [----------] 5 tests from TlsPrfTest (0 ms total) [----------] 1 test from RsaEncryptTest [ RUN ] RsaEncryptTest.MessageLengths [ OK ] RsaEncryptTest.MessageLengths (0 ms) [----------] 1 test from RsaEncryptTest (0 ms total) [----------] 1 test from Pkcs11RsaOaepTest [ RUN ] Pkcs11RsaOaepTest.TestOaepWrapUnwrap [ OK ] Pkcs11RsaOaepTest.TestOaepWrapUnwrap (107 ms) [----------] 1 test from Pkcs11RsaOaepTest (107 ms total) [----------] 2 tests from RsaPkcs1Test [ RUN ] RsaPkcs1Test.Pkcs1MinimumPadding [ OK ] RsaPkcs1Test.Pkcs1MinimumPadding (33 ms) [ RUN ] RsaPkcs1Test.RequireNullParameter [ OK ] RsaPkcs1Test.RequireNullParameter (0 ms) [----------] 2 tests from RsaPkcs1Test (33 ms total) [----------] 2 tests from Pkcs11RsaPssTest [ RUN ] Pkcs11RsaPssTest.GenerateAndSignAndVerify [ OK ] Pkcs11RsaPssTest.GenerateAndSignAndVerify (18 ms) [ RUN ] Pkcs11RsaPssTest.NoLeakWithInvalidExponent [ OK ] Pkcs11RsaPssTest.NoLeakWithInvalidExponent (0 ms) [----------] 2 tests from Pkcs11RsaPssTest (18 ms total) [----------] 4 tests from Pkcs11SeedTest [ RUN ] Pkcs11SeedTest.CBC_ValidArgs [ OK ] Pkcs11SeedTest.CBC_ValidArgs (0 ms) [ RUN ] Pkcs11SeedTest.CBC_InvalidArgs [ OK ] Pkcs11SeedTest.CBC_InvalidArgs (0 ms) [ RUN ] Pkcs11SeedTest.ECB_Singleblock [ OK ] Pkcs11SeedTest.ECB_Singleblock (0 ms) [ RUN ] Pkcs11SeedTest.ECB_Multiblock [ OK ] Pkcs11SeedTest.ECB_Multiblock (0 ms) [----------] 4 tests from Pkcs11SeedTest (0 ms total) [----------] 308 tests from WycheproofTestVector/Pkcs11AesCmacTest [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/99 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/182 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/183 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/184 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/185 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/186 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/187 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/188 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/189 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/190 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/191 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/192 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/193 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/194 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/195 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/196 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/197 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/198 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/199 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/200 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/201 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/202 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/203 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/204 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/205 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/206 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/207 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/208 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/209 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/210 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/211 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/212 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/213 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/214 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/215 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/216 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/217 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/218 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/219 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/220 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/221 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/222 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/223 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/224 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/225 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/226 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/227 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/228 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/229 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/230 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/231 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/232 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/233 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/234 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/235 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/236 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/237 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/238 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/239 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/240 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/241 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/242 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/243 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/244 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/245 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/246 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/247 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/248 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/249 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/250 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/251 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/252 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/253 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/254 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/255 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/256 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/256 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/257 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/257 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/258 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/258 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/259 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/259 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/260 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/260 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/261 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/261 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/262 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/262 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/263 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/263 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/264 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/264 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/265 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/265 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/266 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/266 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/267 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/267 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/268 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/268 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/269 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/269 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/270 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/270 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/271 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/271 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/272 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/272 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/273 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/273 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/274 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/274 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/275 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/275 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/276 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/276 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/277 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/277 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/278 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/278 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/279 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/279 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/280 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/280 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/281 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/281 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/282 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/282 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/283 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/283 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/284 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/284 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/285 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/285 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/286 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/286 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/287 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/287 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/288 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/288 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/289 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/289 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/290 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/290 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/291 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/291 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/292 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/292 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/293 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/293 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/294 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/294 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/295 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/295 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/296 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/296 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/297 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/297 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/298 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/298 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/299 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/299 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/300 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/300 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/301 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/301 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/302 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/302 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/303 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/303 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/304 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/304 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/305 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/305 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/306 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/306 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/307 [ OK ] WycheproofTestVector/Pkcs11AesCmacTest.TestVectors/307 (0 ms) [----------] 308 tests from WycheproofTestVector/Pkcs11AesCmacTest (4 ms total) [----------] 19 tests from NISTTestVector/Pkcs11AesGcmTest [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/0 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/0 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/1 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/1 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/2 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/2 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/3 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/3 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/4 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/4 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/5 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/5 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/6 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/6 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/7 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/7 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/8 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/8 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/9 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/9 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/10 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/10 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/11 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/11 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/12 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/12 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/13 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/13 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/14 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/14 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/15 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/15 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/16 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/16 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/17 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/17 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/18 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/18 (0 ms) [----------] 19 tests from NISTTestVector/Pkcs11AesGcmTest (0 ms total) [----------] 256 tests from WycheproofTestVector/Pkcs11AesGcmTest [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/3 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/54 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/105 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/157 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/182 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/183 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/184 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/185 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/186 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/187 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/188 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/189 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/190 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/191 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/192 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/193 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/194 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/195 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/196 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/197 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/198 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/199 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/200 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/201 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/202 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/203 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/204 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/205 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/206 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/207 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/208 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/209 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/210 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/211 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/212 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/213 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/214 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/215 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/216 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/217 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/218 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/219 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/220 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/221 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/222 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/223 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/224 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/225 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/226 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/227 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/228 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/229 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/230 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/231 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/232 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/233 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/234 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/235 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/236 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/237 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/238 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/239 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/240 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/241 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/242 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/243 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/244 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/245 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/246 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/247 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/248 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/249 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/250 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/251 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/252 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/253 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/254 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/255 (0 ms) [----------] 256 tests from WycheproofTestVector/Pkcs11AesGcmTest (5 ms total) [----------] 163 tests from Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/0 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/0 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/1 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/1 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/2 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/2 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/3 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/3 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/4 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/4 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/5 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/5 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/6 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/6 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/7 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/7 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/8 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/8 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/9 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/9 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/10 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/10 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/11 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/11 (1 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/12 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/12 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/13 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/13 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/14 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/14 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/15 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/15 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/16 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/16 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/17 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/17 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/18 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/18 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/19 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/19 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/20 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/20 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/21 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/21 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/22 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/22 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/23 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/23 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/24 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/24 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/25 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/25 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/26 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/26 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/27 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/27 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/28 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/28 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/29 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/29 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/30 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/30 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/31 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/31 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/32 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/32 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/33 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/33 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/34 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/34 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/35 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/35 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/36 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/36 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/37 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/37 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/38 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/38 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/39 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/39 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/40 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/40 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/41 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/41 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/42 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/42 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/43 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/43 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/44 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/44 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/45 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/45 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/46 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/46 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/47 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/47 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/48 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/48 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/49 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/49 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/50 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/50 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/51 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/51 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/52 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/52 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/53 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/53 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/54 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/54 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/55 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/55 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/56 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/56 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/57 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/57 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/58 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/58 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/59 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/59 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/60 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/60 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/61 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/61 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/62 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/62 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/63 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/63 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/64 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/64 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/65 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/65 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/66 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/66 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/67 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/67 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/68 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/68 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/69 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/69 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/70 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/70 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/71 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/71 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/72 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/72 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/73 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/73 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/74 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/74 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/75 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/75 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/76 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/76 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/77 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/77 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/78 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/78 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/79 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/79 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/80 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/80 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/81 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/81 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/82 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/82 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/83 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/83 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/84 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/84 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/85 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/85 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/86 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/86 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/87 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/87 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/88 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/88 (1 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/89 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/89 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/90 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/90 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/91 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/91 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/92 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/92 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/93 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/93 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/94 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/94 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/95 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/95 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/96 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/96 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/97 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/97 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/98 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/98 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/99 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/99 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/100 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/100 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/101 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/101 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/102 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/102 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/103 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/103 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/104 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/104 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/105 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/105 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/106 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/106 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/107 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/107 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/108 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/108 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/109 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/109 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/110 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/110 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/111 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/111 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/112 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/112 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/113 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/113 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/114 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/114 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/115 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/115 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/116 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/116 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/117 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/117 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/118 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/118 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/119 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/119 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/120 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/120 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/121 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/121 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/122 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/122 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/123 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/123 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/124 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/124 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/125 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/125 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/126 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/126 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/127 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/127 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/128 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/128 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/129 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/129 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/130 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/130 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/131 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/131 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/132 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/132 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/133 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/133 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/134 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/134 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/135 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/135 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/136 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/136 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/137 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/137 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/138 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/138 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/139 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/139 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/140 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/140 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/141 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/141 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/142 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/142 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/143 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/143 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/144 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/144 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/145 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/145 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/146 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/146 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/147 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/147 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/148 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/148 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/149 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/149 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/150 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/150 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/151 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/151 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/152 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/152 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/153 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/153 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/154 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/154 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/155 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/155 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/156 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/156 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/157 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/157 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/158 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/158 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/159 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/159 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/160 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/160 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/161 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/161 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/162 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/162 (0 ms) [----------] 163 tests from Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest (2 ms total) [----------] 1500 tests from Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/0 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/0 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/2 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/2 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/3 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/3 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/4 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/4 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/5 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/5 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/6 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/6 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/7 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/7 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/8 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/8 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/9 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/9 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/10 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/10 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/11 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/11 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/12 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/12 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/13 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/13 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/14 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/14 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/15 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/15 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/16 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/16 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/17 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/17 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/18 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/18 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/19 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/19 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/20 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/20 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/21 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/21 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/22 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/22 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/23 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/23 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/24 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/24 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/25 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/25 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/26 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/26 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/27 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/27 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/28 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/28 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/29 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/29 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/30 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/30 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/31 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/31 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/32 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/32 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/33 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/33 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/34 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/34 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/35 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/35 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/36 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/36 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/37 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/37 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/38 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/38 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/39 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/39 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/40 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/40 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/41 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/41 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/42 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/42 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/43 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/43 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/44 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/44 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/45 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/45 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/46 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/46 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/47 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/47 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/48 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/48 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/49 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/49 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/50 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/50 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/51 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/51 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/52 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/52 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/53 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/53 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/54 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/54 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/55 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/55 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/56 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/56 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/57 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/57 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/58 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/58 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/59 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/59 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/60 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/60 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/61 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/61 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/62 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/62 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/63 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/63 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/64 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/64 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/65 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/65 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/66 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/66 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/67 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/67 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/68 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/68 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/69 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/69 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/70 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/70 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/71 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/71 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/72 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/72 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/73 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/73 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/74 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/74 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/75 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/75 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/76 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/76 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/77 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/77 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/78 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/78 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/79 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/79 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/80 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/80 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/81 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/81 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/82 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/82 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/83 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/83 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/84 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/84 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/85 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/85 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/86 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/86 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/87 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/87 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/88 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/88 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/89 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/89 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/90 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/90 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/91 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/91 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/92 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/92 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/93 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/93 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/94 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/94 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/95 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/95 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/96 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/96 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/97 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/97 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/98 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/98 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/99 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/99 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/100 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/100 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/101 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/101 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/102 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/102 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/103 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/103 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/104 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/104 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/105 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/105 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/106 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/106 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/107 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/107 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/108 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/108 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/109 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/109 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/110 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/110 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/111 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/111 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/112 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/112 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/113 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/113 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/114 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/114 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/115 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/115 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/116 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/116 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/117 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/117 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/118 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/118 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/119 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/119 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/120 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/120 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/121 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/121 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/122 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/122 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/123 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/123 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/124 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/124 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/125 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/125 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/126 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/126 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/127 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/127 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/128 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/128 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/129 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/129 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/130 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/130 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/131 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/131 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/132 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/132 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/133 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/133 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/134 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/134 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/135 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/135 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/136 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/136 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/137 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/137 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/138 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/138 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/139 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/139 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/140 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/140 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/141 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/141 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/142 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/142 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/143 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/143 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/144 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/144 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/145 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/145 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/146 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/146 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/147 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/147 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/148 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/148 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/149 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/149 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/150 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/150 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/151 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/151 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/152 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/152 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/153 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/153 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/154 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/154 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/155 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/155 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/156 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/156 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/157 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/157 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/158 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/158 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/159 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/159 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/160 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/160 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/161 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/161 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/162 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/162 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/163 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/163 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/164 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/164 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/165 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/165 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/166 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/166 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/167 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/167 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/168 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/168 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/169 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/169 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/170 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/170 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/171 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/171 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/172 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/172 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/173 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/173 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/174 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/174 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/175 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/175 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/176 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/176 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/177 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/177 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/178 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/178 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/179 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/179 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/180 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/180 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/181 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/181 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/182 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/182 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/183 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/183 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/184 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/184 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/185 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/185 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/186 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/186 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/187 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/187 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/188 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/188 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/189 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/189 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/190 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/190 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/191 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/191 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/192 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/192 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/193 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/193 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/194 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/194 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/195 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/195 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/196 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/196 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/197 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/197 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/198 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/198 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/199 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/199 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/200 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/200 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/201 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/201 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/202 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/202 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/203 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/203 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/204 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/204 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/205 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/205 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/206 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/206 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/207 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/207 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/208 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/208 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/209 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/209 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/210 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/210 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/211 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/211 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/212 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/212 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/213 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/213 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/214 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/214 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/215 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/215 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/216 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/216 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/217 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/217 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/218 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/218 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/219 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/219 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/220 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/220 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/221 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/221 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/222 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/222 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/223 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/223 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/224 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/224 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/225 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/225 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/226 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/226 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/227 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/227 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/228 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/228 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/229 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/229 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/230 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/230 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/231 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/231 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/232 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/232 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/233 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/233 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/234 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/234 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/235 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/235 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/236 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/236 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/237 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/237 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/238 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/238 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/239 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/239 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/240 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/240 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/241 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/241 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/242 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/242 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/243 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/243 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/244 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/244 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/245 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/245 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/246 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/246 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/247 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/247 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/248 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/248 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/249 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/249 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/250 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/250 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/251 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/251 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/252 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/252 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/253 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/253 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/254 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/254 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/255 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/255 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/256 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/256 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/257 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/257 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/258 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/258 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/259 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/259 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/260 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/260 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/261 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/261 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/262 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/262 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/263 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/263 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/264 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/264 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/265 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/265 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/266 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/266 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/267 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/267 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/268 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/268 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/269 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/269 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/270 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/270 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/271 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/271 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/272 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/272 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/273 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/273 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/274 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/274 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/275 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/275 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/276 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/276 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/277 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/277 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/278 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/278 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/279 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/279 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/280 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/280 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/281 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/281 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/282 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/282 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/283 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/283 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/284 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/284 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/285 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/285 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/286 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/286 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/287 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/287 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/288 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/288 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/289 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/289 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/290 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/290 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/291 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/291 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/292 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/292 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/293 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/293 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/294 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/294 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/295 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/295 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/296 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/296 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/297 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/297 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/298 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/298 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/299 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/299 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/300 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/300 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/301 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/301 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/302 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/302 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/303 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/303 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/304 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/304 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/305 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/305 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/306 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/306 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/307 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/307 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/308 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/308 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/309 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/309 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/310 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/310 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/311 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/311 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/312 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/312 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/313 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/313 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/314 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/314 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/315 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/315 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/316 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/316 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/317 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/317 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/318 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/318 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/319 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/319 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/320 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/320 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/321 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/321 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/322 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/322 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/323 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/323 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/324 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/324 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/325 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/325 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/326 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/326 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/327 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/327 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/328 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/328 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/329 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/329 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/330 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/330 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/331 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/331 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/332 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/332 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/333 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/333 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/334 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/334 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/335 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/335 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/336 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/336 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/337 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/337 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/338 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/338 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/339 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/339 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/340 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/340 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/341 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/341 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/342 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/342 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/343 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/343 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/344 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/344 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/345 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/345 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/346 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/346 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/347 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/347 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/348 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/348 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/349 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/349 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/350 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/350 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/351 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/351 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/352 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/352 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/353 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/353 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/354 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/354 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/355 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/355 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/356 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/356 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/357 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/357 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/358 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/358 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/359 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/359 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/360 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/360 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/361 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/361 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/362 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/362 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/363 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/363 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/364 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/364 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/365 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/365 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/366 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/366 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/367 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/367 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/368 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/368 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/369 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/369 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/370 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/370 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/371 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/371 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/372 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/372 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/373 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/373 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/374 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/374 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/375 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/375 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/376 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/376 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/377 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/377 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/378 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/378 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/379 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/379 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/380 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/380 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/381 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/381 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/382 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/382 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/383 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/383 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/384 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/384 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/385 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/385 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/386 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/386 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/387 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/387 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/388 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/388 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/389 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/389 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/390 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/390 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/391 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/391 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/392 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/392 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/393 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/393 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/394 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/394 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/395 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/395 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/396 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/396 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/397 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/397 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/398 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/398 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/399 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/399 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/400 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/400 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/401 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/401 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/402 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/402 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/403 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/403 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/404 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/404 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/405 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/405 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/406 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/406 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/407 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/407 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/408 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/408 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/409 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/409 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/410 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/410 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/411 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/411 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/412 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/412 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/413 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/413 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/414 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/414 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/415 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/415 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/416 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/416 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/417 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/417 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/418 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/418 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/419 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/419 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/420 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/420 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/421 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/421 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/422 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/422 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/423 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/423 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/424 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/424 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/425 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/425 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/426 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/426 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/427 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/427 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/428 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/428 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/429 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/429 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/430 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/430 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/431 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/431 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/432 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/432 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/433 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/433 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/434 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/434 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/435 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/435 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/436 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/436 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/437 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/437 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/438 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/438 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/439 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/439 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/440 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/440 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/441 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/441 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/442 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/442 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/443 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/443 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/444 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/444 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/445 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/445 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/446 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/446 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/447 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/447 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/448 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/448 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/449 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/449 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/450 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/450 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/451 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/451 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/452 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/452 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/453 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/453 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/454 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/454 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/455 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/455 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/456 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/456 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/457 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/457 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/458 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/458 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/459 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/459 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/460 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/460 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/461 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/461 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/462 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/462 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/463 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/463 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/464 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/464 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/465 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/465 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/466 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/466 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/467 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/467 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/468 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/468 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/469 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/469 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/470 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/470 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/471 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/471 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/472 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/472 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/473 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/473 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/474 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/474 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/475 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/475 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/476 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/476 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/477 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/477 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/478 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/478 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/479 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/479 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/480 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/480 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/481 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/481 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/482 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/482 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/483 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/483 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/484 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/484 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/485 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/485 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/486 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/486 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/487 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/487 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/488 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/488 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/489 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/489 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/490 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/490 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/491 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/491 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/492 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/492 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/493 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/493 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/494 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/494 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/495 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/495 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/496 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/496 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/497 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/497 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/498 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/498 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/499 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/499 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/500 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/500 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/501 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/501 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/502 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/502 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/503 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/503 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/504 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/504 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/505 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/505 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/506 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/506 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/507 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/507 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/508 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/508 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/509 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/509 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/510 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/510 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/511 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/511 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/512 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/512 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/513 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/513 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/514 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/514 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/515 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/515 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/516 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/516 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/517 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/517 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/518 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/518 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/519 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/519 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/520 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/520 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/521 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/521 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/522 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/522 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/523 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/523 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/524 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/524 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/525 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/525 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/526 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/526 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/527 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/527 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/528 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/528 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/529 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/529 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/530 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/530 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/531 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/531 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/532 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/532 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/533 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/533 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/534 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/534 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/535 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/535 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/536 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/536 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/537 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/537 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/538 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/538 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/539 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/539 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/540 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/540 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/541 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/541 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/542 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/542 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/543 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/543 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/544 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/544 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/545 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/545 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/546 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/546 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/547 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/547 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/548 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/548 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/549 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/549 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/550 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/550 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/551 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/551 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/552 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/552 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/553 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/553 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/554 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/554 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/555 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/555 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/556 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/556 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/557 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/557 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/558 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/558 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/559 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/559 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/560 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/560 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/561 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/561 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/562 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/562 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/563 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/563 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/564 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/564 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/565 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/565 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/566 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/566 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/567 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/567 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/568 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/568 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/569 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/569 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/570 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/570 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/571 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/571 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/572 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/572 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/573 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/573 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/574 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/574 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/575 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/575 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/576 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/576 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/577 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/577 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/578 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/578 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/579 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/579 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/580 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/580 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/581 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/581 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/582 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/582 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/583 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/583 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/584 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/584 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/585 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/585 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/586 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/586 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/587 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/587 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/588 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/588 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/589 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/589 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/590 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/590 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/591 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/591 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/592 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/592 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/593 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/593 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/594 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/594 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/595 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/595 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/596 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/596 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/597 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/597 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/598 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/598 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/599 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/599 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/600 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/600 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/601 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/601 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/602 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/602 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/603 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/603 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/604 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/604 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/605 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/605 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/606 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/606 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/607 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/607 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/608 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/608 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/609 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/609 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/610 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/610 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/611 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/611 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/612 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/612 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/613 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/613 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/614 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/614 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/615 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/615 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/616 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/616 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/617 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/617 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/618 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/618 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/619 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/619 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/620 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/620 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/621 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/621 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/622 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/622 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/623 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/623 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/624 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/624 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/625 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/625 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/626 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/626 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/627 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/627 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/628 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/628 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/629 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/629 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/630 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/630 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/631 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/631 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/632 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/632 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/633 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/633 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/634 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/634 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/635 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/635 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/636 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/636 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/637 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/637 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/638 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/638 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/639 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/639 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/640 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/640 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/641 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/641 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/642 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/642 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/643 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/643 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/644 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/644 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/645 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/645 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/646 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/646 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/647 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/647 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/648 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/648 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/649 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/649 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/650 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/650 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/651 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/651 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/652 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/652 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/653 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/653 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/654 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/654 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/655 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/655 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/656 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/656 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/657 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/657 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/658 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/658 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/659 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/659 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/660 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/660 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/661 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/661 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/662 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/662 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/663 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/663 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/664 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/664 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/665 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/665 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/666 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/666 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/667 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/667 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/668 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/668 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/669 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/669 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/670 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/670 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/671 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/671 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/672 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/672 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/673 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/673 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/674 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/674 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/675 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/675 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/676 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/676 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/677 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/677 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/678 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/678 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/679 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/679 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/680 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/680 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/681 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/681 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/682 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/682 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/683 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/683 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/684 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/684 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/685 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/685 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/686 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/686 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/687 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/687 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/688 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/688 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/689 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/689 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/690 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/690 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/691 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/691 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/692 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/692 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/693 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/693 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/694 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/694 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/695 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/695 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/696 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/696 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/697 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/697 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/698 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/698 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/699 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/699 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/700 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/700 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/701 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/701 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/702 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/702 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/703 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/703 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/704 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/704 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/705 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/705 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/706 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/706 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/707 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/707 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/708 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/708 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/709 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/709 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/710 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/710 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/711 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/711 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/712 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/712 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/713 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/713 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/714 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/714 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/715 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/715 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/716 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/716 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/717 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/717 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/718 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/718 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/719 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/719 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/720 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/720 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/721 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/721 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/722 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/722 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/723 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/723 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/724 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/724 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/725 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/725 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/726 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/726 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/727 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/727 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/728 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/728 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/729 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/729 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/730 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/730 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/731 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/731 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/732 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/732 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/733 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/733 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/734 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/734 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/735 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/735 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/736 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/736 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/737 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/737 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/738 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/738 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/739 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/739 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/740 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/740 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/741 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/741 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/742 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/742 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/743 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/743 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/744 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/744 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/745 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/745 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/746 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/746 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/747 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/747 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/748 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/748 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/749 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/749 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/750 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/750 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/751 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/751 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/752 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/752 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/753 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/753 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/754 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/754 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/755 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/755 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/756 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/756 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/757 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/757 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/758 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/758 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/759 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/759 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/760 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/760 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/761 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/761 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/762 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/762 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/763 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/763 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/764 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/764 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/765 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/765 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/766 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/766 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/767 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/767 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/768 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/768 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/769 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/769 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/770 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/770 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/771 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/771 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/772 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/772 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/773 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/773 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/774 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/774 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/775 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/775 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/776 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/776 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/777 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/777 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/778 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/778 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/779 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/779 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/780 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/780 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/781 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/781 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/782 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/782 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/783 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/783 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/784 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/784 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/785 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/785 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/786 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/786 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/787 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/787 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/788 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/788 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/789 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/789 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/790 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/790 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/791 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/791 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/792 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/792 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/793 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/793 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/794 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/794 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/795 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/795 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/796 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/796 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/797 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/797 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/798 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/798 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/799 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/799 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/800 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/800 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/801 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/801 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/802 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/802 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/803 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/803 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/804 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/804 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/805 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/805 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/806 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/806 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/807 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/807 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/808 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/808 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/809 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/809 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/810 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/810 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/811 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/811 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/812 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/812 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/813 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/813 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/814 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/814 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/815 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/815 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/816 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/816 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/817 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/817 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/818 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/818 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/819 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/819 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/820 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/820 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/821 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/821 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/822 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/822 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/823 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/823 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/824 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/824 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/825 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/825 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/826 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/826 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/827 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/827 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/828 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/828 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/829 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/829 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/830 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/830 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/831 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/831 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/832 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/832 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/833 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/833 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/834 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/834 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/835 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/835 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/836 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/836 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/837 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/837 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/838 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/838 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/839 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/839 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/840 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/840 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/841 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/841 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/842 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/842 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/843 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/843 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/844 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/844 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/845 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/845 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/846 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/846 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/847 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/847 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/848 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/848 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/849 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/849 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/850 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/850 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/851 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/851 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/852 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/852 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/853 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/853 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/854 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/854 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/855 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/855 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/856 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/856 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/857 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/857 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/858 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/858 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/859 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/859 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/860 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/860 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/861 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/861 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/862 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/862 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/863 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/863 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/864 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/864 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/865 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/865 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/866 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/866 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/867 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/867 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/868 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/868 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/869 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/869 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/870 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/870 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/871 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/871 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/872 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/872 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/873 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/873 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/874 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/874 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/875 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/875 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/876 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/876 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/877 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/877 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/878 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/878 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/879 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/879 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/880 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/880 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/881 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/881 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/882 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/882 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/883 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/883 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/884 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/884 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/885 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/885 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/886 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/886 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/887 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/887 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/888 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/888 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/889 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/889 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/890 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/890 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/891 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/891 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/892 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/892 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/893 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/893 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/894 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/894 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/895 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/895 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/896 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/896 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/897 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/897 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/898 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/898 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/899 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/899 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/900 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/900 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/901 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/901 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/902 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/902 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/903 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/903 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/904 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/904 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/905 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/905 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/906 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/906 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/907 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/907 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/908 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/908 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/909 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/909 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/910 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/910 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/911 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/911 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/912 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/912 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/913 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/913 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/914 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/914 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/915 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/915 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/916 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/916 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/917 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/917 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/918 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/918 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/919 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/919 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/920 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/920 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/921 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/921 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/922 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/922 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/923 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/923 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/924 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/924 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/925 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/925 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/926 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/926 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/927 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/927 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/928 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/928 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/929 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/929 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/930 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/930 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/931 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/931 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/932 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/932 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/933 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/933 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/934 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/934 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/935 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/935 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/936 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/936 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/937 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/937 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/938 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/938 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/939 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/939 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/940 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/940 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/941 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/941 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/942 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/942 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/943 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/943 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/944 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/944 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/945 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/945 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/946 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/946 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/947 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/947 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/948 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/948 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/949 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/949 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/950 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/950 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/951 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/951 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/952 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/952 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/953 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/953 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/954 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/954 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/955 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/955 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/956 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/956 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/957 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/957 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/958 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/958 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/959 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/959 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/960 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/960 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/961 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/961 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/962 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/962 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/963 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/963 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/964 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/964 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/965 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/965 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/966 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/966 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/967 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/967 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/968 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/968 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/969 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/969 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/970 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/970 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/971 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/971 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/972 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/972 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/973 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/973 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/974 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/974 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/975 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/975 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/976 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/976 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/977 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/977 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/978 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/978 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/979 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/979 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/980 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/980 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/981 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/981 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/982 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/982 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/983 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/983 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/984 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/984 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/985 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/985 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/986 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/986 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/987 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/987 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/988 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/988 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/989 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/989 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/990 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/990 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/991 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/991 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/992 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/992 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/993 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/993 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/994 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/994 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/995 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/995 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/996 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/996 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/997 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/997 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/998 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/998 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/999 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/999 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1000 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1000 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1001 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1001 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1002 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1002 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1003 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1003 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1004 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1004 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1005 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1005 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1006 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1006 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1007 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1007 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1008 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1008 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1009 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1009 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1010 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1010 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1011 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1011 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1012 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1012 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1013 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1013 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1014 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1014 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1015 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1015 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1016 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1016 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1017 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1017 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1018 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1018 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1019 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1019 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1020 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1020 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1021 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1021 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1022 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1022 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1023 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1023 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1024 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1024 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1025 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1025 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1026 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1026 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1027 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1027 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1028 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1028 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1029 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1029 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1030 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1030 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1031 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1031 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1032 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1032 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1033 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1033 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1034 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1034 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1035 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1035 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1036 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1036 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1037 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1037 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1038 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1038 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1039 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1039 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1040 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1040 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1041 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1041 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1042 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1042 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1043 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1043 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1044 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1044 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1045 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1045 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1046 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1046 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1047 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1047 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1048 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1048 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1049 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1049 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1050 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1050 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1051 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1051 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1052 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1052 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1053 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1053 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1054 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1054 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1055 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1055 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1056 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1056 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1057 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1057 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1058 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1058 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1059 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1059 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1060 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1060 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1061 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1061 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1062 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1062 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1063 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1063 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1064 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1064 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1065 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1065 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1066 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1066 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1067 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1067 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1068 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1068 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1069 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1069 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1070 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1070 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1071 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1071 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1072 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1072 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1073 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1073 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1074 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1074 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1075 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1075 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1076 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1076 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1077 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1077 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1078 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1078 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1079 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1079 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1080 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1080 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1081 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1081 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1082 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1082 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1083 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1083 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1084 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1084 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1085 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1085 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1086 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1086 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1087 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1087 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1088 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1088 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1089 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1089 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1090 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1090 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1091 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1091 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1092 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1092 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1093 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1093 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1094 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1094 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1095 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1095 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1096 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1096 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1097 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1097 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1098 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1098 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1099 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1099 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1100 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1100 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1101 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1101 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1102 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1102 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1103 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1103 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1104 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1104 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1105 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1105 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1106 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1106 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1107 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1107 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1108 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1108 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1109 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1109 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1110 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1110 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1111 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1111 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1112 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1112 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1113 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1113 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1114 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1114 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1115 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1115 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1116 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1116 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1117 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1117 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1118 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1118 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1119 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1119 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1120 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1120 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1121 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1121 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1122 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1122 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1123 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1123 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1124 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1124 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1125 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1125 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1126 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1126 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1127 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1127 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1128 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1128 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1129 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1129 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1130 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1130 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1131 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1131 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1132 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1132 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1133 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1133 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1134 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1134 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1135 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1135 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1136 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1136 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1137 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1137 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1138 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1138 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1139 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1139 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1140 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1140 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1141 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1141 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1142 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1142 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1143 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1143 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1144 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1144 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1145 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1145 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1146 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1146 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1147 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1147 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1148 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1148 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1149 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1149 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1150 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1150 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1151 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1151 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1152 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1152 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1153 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1153 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1154 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1154 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1155 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1155 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1156 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1156 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1157 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1157 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1158 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1158 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1159 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1159 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1160 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1160 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1161 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1161 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1162 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1162 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1163 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1163 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1164 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1164 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1165 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1165 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1166 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1166 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1167 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1167 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1168 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1168 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1169 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1169 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1170 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1170 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1171 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1171 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1172 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1172 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1173 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1173 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1174 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1174 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1175 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1175 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1176 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1176 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1177 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1177 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1178 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1178 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1179 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1179 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1180 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1180 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1181 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1181 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1182 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1182 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1183 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1183 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1184 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1184 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1185 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1185 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1186 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1186 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1187 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1187 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1188 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1188 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1189 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1189 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1190 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1190 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1191 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1191 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1192 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1192 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1193 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1193 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1194 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1194 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1195 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1195 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1196 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1196 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1197 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1197 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1198 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1198 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1199 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1199 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1200 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1200 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1201 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1201 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1202 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1202 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1203 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1203 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1204 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1204 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1205 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1205 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1206 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1206 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1207 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1207 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1208 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1208 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1209 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1209 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1210 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1210 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1211 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1211 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1212 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1212 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1213 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1213 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1214 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1214 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1215 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1215 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1216 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1216 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1217 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1217 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1218 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1218 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1219 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1219 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1220 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1220 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1221 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1221 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1222 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1222 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1223 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1223 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1224 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1224 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1225 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1225 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1226 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1226 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1227 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1227 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1228 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1228 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1229 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1229 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1230 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1230 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1231 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1231 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1232 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1232 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1233 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1233 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1234 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1234 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1235 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1235 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1236 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1236 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1237 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1237 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1238 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1238 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1239 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1239 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1240 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1240 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1241 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1241 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1242 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1242 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1243 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1243 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1244 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1244 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1245 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1245 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1246 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1246 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1247 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1247 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1248 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1248 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1249 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1249 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1250 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1250 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1251 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1251 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1252 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1252 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1253 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1253 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1254 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1254 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1255 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1255 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1256 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1256 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1257 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1257 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1258 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1258 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1259 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1259 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1260 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1260 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1261 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1261 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1262 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1262 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1263 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1263 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1264 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1264 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1265 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1265 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1266 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1266 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1267 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1267 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1268 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1268 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1269 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1269 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1270 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1270 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1271 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1271 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1272 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1272 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1273 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1273 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1274 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1274 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1275 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1275 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1276 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1276 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1277 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1277 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1278 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1278 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1279 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1279 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1280 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1280 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1281 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1281 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1282 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1282 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1283 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1283 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1284 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1284 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1285 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1285 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1286 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1286 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1287 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1287 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1288 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1288 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1289 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1289 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1290 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1290 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1291 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1291 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1292 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1292 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1293 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1293 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1294 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1294 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1295 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1295 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1296 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1296 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1297 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1297 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1298 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1298 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1299 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1299 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1300 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1300 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1301 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1301 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1302 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1302 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1303 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1303 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1304 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1304 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1305 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1305 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1306 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1306 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1307 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1307 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1308 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1308 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1309 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1309 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1310 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1310 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1311 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1311 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1312 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1312 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1313 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1313 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1314 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1314 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1315 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1315 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1316 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1316 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1317 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1317 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1318 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1318 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1319 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1319 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1320 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1320 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1321 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1321 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1322 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1322 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1323 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1323 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1324 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1324 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1325 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1325 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1326 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1326 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1327 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1327 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1328 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1328 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1329 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1329 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1330 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1330 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1331 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1331 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1332 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1332 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1333 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1333 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1334 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1334 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1335 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1335 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1336 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1336 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1337 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1337 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1338 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1338 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1339 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1339 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1340 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1340 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1341 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1341 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1342 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1342 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1343 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1343 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1344 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1344 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1345 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1345 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1346 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1346 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1347 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1347 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1348 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1348 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1349 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1349 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1350 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1350 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1351 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1351 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1352 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1352 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1353 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1353 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1354 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1354 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1355 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1355 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1356 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1356 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1357 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1357 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1358 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1358 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1359 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1359 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1360 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1360 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1361 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1361 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1362 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1362 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1363 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1363 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1364 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1364 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1365 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1365 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1366 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1366 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1367 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1367 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1368 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1368 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1369 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1369 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1370 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1370 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1371 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1371 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1372 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1372 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1373 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1373 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1374 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1374 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1375 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1375 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1376 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1376 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1377 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1377 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1378 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1378 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1379 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1379 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1380 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1380 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1381 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1381 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1382 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1382 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1383 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1383 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1384 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1384 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1385 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1385 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1386 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1386 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1387 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1387 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1388 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1388 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1389 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1389 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1390 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1390 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1391 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1391 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1392 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1392 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1393 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1393 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1394 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1394 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1395 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1395 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1396 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1396 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1397 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1397 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1398 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1398 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1399 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1399 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1400 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1400 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1401 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1401 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1402 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1402 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1403 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1403 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1404 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1404 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1405 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1405 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1406 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1406 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1407 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1407 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1408 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1408 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1409 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1409 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1410 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1410 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1411 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1411 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1412 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1412 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1413 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1413 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1414 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1414 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1415 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1415 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1416 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1416 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1417 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1417 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1418 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1418 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1419 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1419 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1420 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1420 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1421 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1421 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1422 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1422 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1423 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1423 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1424 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1424 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1425 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1425 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1426 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1426 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1427 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1427 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1428 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1428 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1429 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1429 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1430 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1430 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1431 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1431 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1432 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1432 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1433 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1433 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1434 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1434 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1435 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1435 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1436 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1436 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1437 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1437 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1438 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1438 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1439 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1439 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1440 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1440 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1441 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1441 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1442 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1442 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1443 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1443 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1444 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1444 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1445 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1445 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1446 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1446 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1447 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1447 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1448 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1448 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1449 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1449 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1450 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1450 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1451 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1451 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1452 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1452 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1453 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1453 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1454 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1454 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1455 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1455 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1456 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1456 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1457 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1457 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1458 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1458 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1459 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1459 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1460 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1460 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1461 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1461 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1462 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1462 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1463 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1463 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1464 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1464 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1465 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1465 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1466 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1466 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1467 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1467 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1468 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1468 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1469 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1469 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1470 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1470 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1471 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1471 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1472 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1472 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1473 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1473 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1474 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1474 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1475 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1475 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1476 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1476 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1477 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1477 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1478 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1478 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1479 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1479 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1480 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1480 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1481 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1481 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1482 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1482 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1483 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1483 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1484 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1484 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1485 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1485 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1486 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1486 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1487 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1487 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1488 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1488 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1489 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1489 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1490 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1490 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1491 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1491 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1492 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1492 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1493 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1493 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1494 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1494 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1495 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1495 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1496 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1496 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1497 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1497 (0 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1498 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1498 (1 ms) [ RUN ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1499 [ OK ] Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest.TestVectors/1499 (0 ms) [----------] 1500 tests from Pkcs11NistAESKWPTest/Pkcs11AESKeyWrapKwpTest (28 ms total) [----------] 52 tests from EncryptDecrypt/Pkcs11CbcPadTest [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/3 (0 ms) [----------] 52 tests from EncryptDecrypt/Pkcs11CbcPadTest (0 ms total) [----------] 183 tests from WycheproofTestVector/Pkcs11AesCbcWycheproofTest [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/12 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/84 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/154 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/182 (0 ms) [----------] 183 tests from WycheproofTestVector/Pkcs11AesCbcWycheproofTest (3 ms total) [----------] 2 tests from NSSTestVector/Pkcs11ChaCha20Poly1305Test [ RUN ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 [ OK ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 (0 ms) [ RUN ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 [ OK ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 (0 ms) [----------] 2 tests from NSSTestVector/Pkcs11ChaCha20Poly1305Test (0 ms total) [----------] 300 tests from WycheproofTestVector/Pkcs11ChaCha20Poly1305Test [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/19 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/57 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/94 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/130 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/167 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/182 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/183 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/184 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/185 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/186 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/187 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/188 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/189 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/190 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/191 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/192 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/193 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/194 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/195 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/196 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/197 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/198 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/199 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/200 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/201 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/202 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/203 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/204 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/205 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/206 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/207 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/208 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/209 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/210 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/211 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/212 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/213 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/214 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/215 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/216 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/217 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/218 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/219 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/220 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/221 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/222 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/223 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/224 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/225 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/226 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/227 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/228 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/229 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/230 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/231 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/232 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/233 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/234 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/235 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/236 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/237 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/238 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/239 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/240 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/241 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/242 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/243 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/244 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/245 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/246 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/247 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/248 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/249 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/250 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/251 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/252 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/253 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/254 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/255 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/256 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/256 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/257 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/257 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/258 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/258 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/259 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/259 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/260 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/260 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/261 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/261 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/262 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/262 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/263 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/263 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/264 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/264 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/265 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/265 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/266 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/266 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/267 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/267 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/268 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/268 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/269 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/269 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/270 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/270 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/271 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/271 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/272 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/272 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/273 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/273 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/274 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/274 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/275 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/275 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/276 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/276 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/277 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/277 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/278 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/278 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/279 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/279 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/280 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/280 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/281 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/281 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/282 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/282 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/283 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/283 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/284 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/284 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/285 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/285 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/286 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/286 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/287 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/287 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/288 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/288 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/289 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/289 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/290 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/290 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/291 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/291 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/292 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/292 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/293 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/293 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/294 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/294 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/295 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/295 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/296 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/296 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/297 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/297 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/298 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/298 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/299 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/299 (0 ms) [----------] 300 tests from WycheproofTestVector/Pkcs11ChaCha20Poly1305Test (8 ms total) [----------] 3 tests from NSSTestVector/Pkcs11Curve25519Test [ RUN ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/0 [ OK ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/0 (3 ms) [ RUN ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/1 [ OK ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/1 (0 ms) [ RUN ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/2 [ OK ] NSSTestVector/Pkcs11Curve25519Test.TestVectors/2 (0 ms) [----------] 3 tests from NSSTestVector/Pkcs11Curve25519Test (3 ms total) [----------] 518 tests from WycheproofTestVector/Pkcs11Curve25519Test [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/0 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/1 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/2 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/3 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/4 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/5 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/6 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/7 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/8 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/9 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/10 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/11 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/12 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/13 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/14 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/15 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/16 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/17 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/18 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/19 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/20 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/21 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/22 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/23 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/24 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/25 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/26 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/27 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/28 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/29 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/30 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/33 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/34 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/35 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/36 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/37 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/38 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/39 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/40 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/41 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/42 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/43 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/44 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/45 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/46 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/47 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/48 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/49 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/50 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/51 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/52 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/53 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/54 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/55 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/56 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/57 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/58 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/59 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/60 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/61 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/66 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/83 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/84 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/85 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/86 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/87 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/88 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/89 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/90 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/93 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/94 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/95 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/96 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/99 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/100 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/101 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/102 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/103 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/104 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/105 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/106 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/107 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/108 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/109 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/110 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/111 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/112 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/113 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/114 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/115 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/118 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/119 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/120 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/121 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/122 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/123 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/124 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/125 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/126 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/127 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/128 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/129 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/130 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/131 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/132 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/133 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/134 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/135 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/136 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/137 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/138 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/139 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/140 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/141 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/142 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/143 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/144 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/145 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/146 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/147 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/148 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/149 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/150 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/151 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/152 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/154 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/155 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/156 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/157 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/158 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/159 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/160 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/161 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/162 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/163 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/166 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/167 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/168 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/169 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/170 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/171 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/172 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/173 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/174 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/175 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/176 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/177 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/178 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/179 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/180 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/181 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/182 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/183 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/184 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/185 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/186 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/187 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/188 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/189 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/190 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/191 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/192 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/193 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/194 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/195 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/196 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/197 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/198 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/199 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/200 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/201 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/202 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/203 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/204 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/205 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/206 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/207 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/208 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/209 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/210 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/211 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/212 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/213 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/214 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/215 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/216 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/217 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/218 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/219 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/220 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/221 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/222 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/223 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/224 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/225 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/226 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/227 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/228 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/229 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/230 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/231 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/232 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/233 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/234 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/235 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/236 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/237 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/238 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/239 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/240 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/241 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/242 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/243 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/244 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/245 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/246 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/247 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/248 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/249 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/250 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/251 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/252 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/253 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/254 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/255 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/256 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/256 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/257 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/257 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/258 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/258 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/259 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/259 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/260 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/260 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/261 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/261 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/262 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/262 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/263 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/263 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/264 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/264 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/265 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/265 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/266 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/266 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/267 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/267 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/268 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/268 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/269 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/269 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/270 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/270 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/271 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/271 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/272 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/272 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/273 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/273 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/274 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/274 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/275 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/275 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/276 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/276 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/277 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/277 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/278 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/278 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/279 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/279 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/280 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/280 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/281 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/281 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/282 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/282 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/283 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/283 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/284 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/284 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/285 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/285 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/286 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/286 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/287 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/287 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/288 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/288 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/289 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/289 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/290 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/290 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/291 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/291 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/292 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/292 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/293 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/293 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/294 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/294 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/295 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/295 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/296 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/296 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/297 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/297 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/298 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/298 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/299 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/299 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/300 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/300 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/301 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/301 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/302 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/302 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/303 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/303 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/304 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/304 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/305 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/305 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/306 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/306 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/307 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/307 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/308 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/308 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/309 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/309 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/310 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/310 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/311 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/311 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/312 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/312 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/313 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/313 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/314 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/314 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/315 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/315 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/316 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/316 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/317 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/317 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/318 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/318 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/319 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/319 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/320 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/320 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/321 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/321 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/322 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/322 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/323 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/323 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/324 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/324 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/325 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/325 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/326 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/326 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/327 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/327 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/328 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/328 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/329 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/329 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/330 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/330 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/331 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/331 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/332 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/332 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/333 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/333 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/334 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/334 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/335 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/335 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/336 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/336 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/337 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/337 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/338 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/338 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/339 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/339 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/340 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/340 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/341 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/341 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/342 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/342 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/343 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/343 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/344 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/344 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/345 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/345 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/346 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/346 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/347 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/347 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/348 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/348 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/349 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/349 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/350 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/350 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/351 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/351 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/352 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/352 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/353 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/353 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/354 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/354 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/355 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/355 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/356 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/356 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/357 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/357 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/358 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/358 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/359 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/359 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/360 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/360 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/361 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/361 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/362 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/362 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/363 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/363 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/364 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/364 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/365 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/365 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/366 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/366 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/367 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/367 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/368 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/368 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/369 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/369 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/370 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/370 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/371 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/371 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/372 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/372 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/373 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/373 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/374 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/374 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/375 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/375 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/376 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/376 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/377 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/377 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/378 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/378 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/379 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/379 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/380 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/380 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/381 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/381 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/382 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/382 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/383 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/383 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/384 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/384 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/385 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/385 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/386 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/386 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/387 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/387 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/388 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/388 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/389 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/389 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/390 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/390 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/391 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/391 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/392 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/392 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/393 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/393 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/394 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/394 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/395 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/395 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/396 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/396 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/397 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/397 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/398 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/398 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/399 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/399 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/400 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/400 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/401 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/401 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/402 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/402 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/403 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/403 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/404 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/404 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/405 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/405 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/406 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/406 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/407 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/407 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/408 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/408 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/409 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/409 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/410 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/410 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/411 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/411 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/412 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/412 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/413 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/413 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/414 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/414 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/415 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/415 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/416 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/416 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/417 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/417 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/418 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/418 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/419 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/419 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/420 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/420 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/421 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/421 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/422 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/422 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/423 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/423 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/424 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/424 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/425 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/425 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/426 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/426 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/427 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/427 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/428 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/428 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/429 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/429 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/430 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/430 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/431 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/431 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/432 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/432 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/433 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/433 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/434 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/434 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/435 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/435 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/436 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/436 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/437 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/437 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/438 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/438 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/439 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/439 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/440 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/440 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/441 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/441 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/442 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/442 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/443 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/443 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/444 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/444 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/445 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/445 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/446 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/446 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/447 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/447 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/448 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/448 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/449 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/449 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/450 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/450 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/451 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/451 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/452 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/452 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/453 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/453 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/454 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/454 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/455 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/455 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/456 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/456 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/457 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/457 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/458 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/458 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/459 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/459 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/460 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/460 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/461 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/461 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/462 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/462 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/463 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/463 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/464 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/464 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/465 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/465 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/466 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/466 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/467 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/467 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/468 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/468 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/469 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/469 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/470 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/470 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/471 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/471 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/472 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/472 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/473 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/473 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/474 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/474 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/475 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/475 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/476 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/476 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/477 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/477 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/478 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/478 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/479 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/479 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/480 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/480 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/481 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/481 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/482 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/482 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/483 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/483 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/484 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/484 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/485 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/485 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/486 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/486 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/487 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/487 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/488 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/488 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/489 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/489 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/490 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/490 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/491 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/491 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/492 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/492 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/493 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/493 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/494 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/494 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/495 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/495 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/496 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/496 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/497 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/497 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/498 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/498 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/499 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/499 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/500 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/500 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/501 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/501 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/502 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/502 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/503 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/503 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/504 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/504 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/505 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/505 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/506 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/506 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/507 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/507 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/508 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/508 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/509 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/509 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/510 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/510 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/511 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/511 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/512 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/512 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/513 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/513 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/514 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/514 (1 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/515 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/515 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/516 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/516 (2 ms) [ RUN ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/517 [ OK ] WycheproofTestVector/Pkcs11Curve25519Test.TestVectors/517 (1 ms) [----------] 518 tests from WycheproofTestVector/Pkcs11Curve25519Test (805 ms total) [----------] 906 tests from DsaTest/Pkcs11DsaTest [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/0 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/0 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/1 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/1 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/2 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/2 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/3 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/3 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/4 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/4 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/5 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/5 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/6 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/6 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/7 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/7 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/8 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/8 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/9 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/9 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/10 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/10 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/11 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/11 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/12 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/12 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/13 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/13 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/14 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/14 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/15 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/15 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/16 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/16 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/17 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/17 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/18 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/18 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/19 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/19 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/20 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/20 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/21 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/21 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/22 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/22 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/23 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/23 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/24 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/24 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/25 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/25 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/26 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/26 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/27 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/27 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/28 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/28 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/29 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/29 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/30 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/30 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/31 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/31 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/32 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/32 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/33 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/33 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/34 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/34 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/35 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/35 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/36 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/36 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/37 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/37 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/38 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/38 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/39 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/39 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/40 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/40 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/41 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/41 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/42 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/42 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/43 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/43 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/44 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/44 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/45 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/45 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/46 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/46 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/47 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/47 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/48 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/48 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/49 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/49 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/50 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/50 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/51 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/51 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/52 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/52 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/53 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/53 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/54 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/54 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/55 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/55 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/56 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/56 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/57 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/57 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/58 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/58 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/59 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/59 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/60 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/60 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/61 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/61 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/62 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/62 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/63 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/63 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/64 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/64 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/65 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/65 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/66 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/66 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/67 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/67 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/68 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/68 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/69 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/69 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/70 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/70 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/71 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/71 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/72 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/72 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/73 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/73 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/74 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/74 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/75 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/75 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/76 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/76 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/77 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/77 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/78 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/78 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/79 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/79 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/80 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/80 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/81 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/81 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/82 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/82 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/83 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/83 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/84 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/84 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/85 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/85 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/86 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/86 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/87 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/87 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/88 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/88 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/89 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/89 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/90 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/90 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/91 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/91 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/92 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/92 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/93 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/93 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/94 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/94 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/95 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/95 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/96 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/96 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/97 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/97 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/98 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/98 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/99 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/99 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/100 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/100 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/101 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/101 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/102 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/102 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/103 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/103 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/104 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/104 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/105 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/105 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/106 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/106 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/107 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/107 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/108 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/108 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/109 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/109 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/110 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/110 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/111 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/111 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/112 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/112 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/113 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/113 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/114 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/114 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/115 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/115 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/116 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/116 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/117 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/117 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/118 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/118 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/119 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/119 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/120 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/120 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/121 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/121 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/122 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/122 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/123 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/123 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/124 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/124 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/125 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/125 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/126 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/126 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/127 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/127 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/128 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/128 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/129 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/129 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/130 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/130 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/131 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/131 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/132 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/132 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/133 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/133 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/134 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/134 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/135 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/135 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/136 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/136 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/137 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/137 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/138 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/138 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/139 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/139 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/140 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/140 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/141 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/141 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/142 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/142 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/143 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/143 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/144 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/144 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/145 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/145 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/146 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/146 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/147 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/147 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/148 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/148 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/149 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/149 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/150 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/150 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/151 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/151 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/152 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/152 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/153 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/153 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/154 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/154 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/155 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/155 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/156 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/156 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/157 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/157 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/158 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/158 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/159 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/159 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/160 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/160 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/161 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/161 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/162 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/162 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/163 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/163 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/164 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/164 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/165 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/165 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/166 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/166 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/167 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/167 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/168 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/168 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/169 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/169 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/170 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/170 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/171 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/171 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/172 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/172 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/173 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/173 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/174 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/174 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/175 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/175 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/176 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/176 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/177 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/177 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/178 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/178 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/179 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/179 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/180 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/180 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/181 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/181 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/182 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/182 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/183 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/183 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/184 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/184 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/185 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/185 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/186 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/186 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/187 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/187 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/188 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/188 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/189 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/189 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/190 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/190 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/191 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/191 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/192 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/192 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/193 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/193 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/194 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/194 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/195 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/195 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/196 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/196 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/197 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/197 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/198 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/198 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/199 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/199 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/200 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/200 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/201 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/201 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/202 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/202 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/203 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/203 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/204 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/204 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/205 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/205 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/206 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/206 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/207 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/207 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/208 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/208 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/209 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/209 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/210 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/210 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/211 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/211 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/212 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/212 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/213 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/213 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/214 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/214 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/215 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/215 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/216 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/216 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/217 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/217 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/218 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/218 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/219 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/219 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/220 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/220 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/221 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/221 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/222 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/222 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/223 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/223 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/224 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/224 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/225 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/225 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/226 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/226 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/227 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/227 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/228 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/228 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/229 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/229 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/230 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/230 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/231 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/231 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/232 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/232 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/233 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/233 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/234 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/234 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/235 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/235 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/236 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/236 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/237 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/237 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/238 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/238 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/239 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/239 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/240 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/240 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/241 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/241 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/242 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/242 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/243 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/243 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/244 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/244 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/245 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/245 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/246 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/246 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/247 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/247 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/248 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/248 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/249 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/249 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/250 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/250 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/251 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/251 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/252 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/252 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/253 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/253 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/254 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/254 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/255 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/255 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/256 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/256 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/257 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/257 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/258 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/258 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/259 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/259 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/260 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/260 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/261 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/261 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/262 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/262 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/263 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/263 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/264 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/264 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/265 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/265 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/266 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/266 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/267 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/267 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/268 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/268 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/269 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/269 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/270 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/270 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/271 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/271 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/272 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/272 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/273 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/273 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/274 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/274 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/275 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/275 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/276 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/276 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/277 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/277 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/278 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/278 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/279 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/279 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/280 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/280 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/281 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/281 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/282 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/282 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/283 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/283 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/284 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/284 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/285 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/285 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/286 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/286 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/287 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/287 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/288 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/288 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/289 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/289 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/290 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/290 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/291 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/291 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/292 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/292 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/293 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/293 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/294 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/294 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/295 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/295 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/296 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/296 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/297 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/297 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/298 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/298 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/299 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/299 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/300 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/300 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/301 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/301 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/302 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/302 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/303 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/303 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/304 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/304 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/305 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/305 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/306 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/306 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/307 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/307 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/308 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/308 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/309 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/309 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/310 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/310 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/311 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/311 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/312 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/312 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/313 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/313 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/314 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/314 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/315 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/315 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/316 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/316 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/317 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/317 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/318 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/318 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/319 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/319 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/320 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/320 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/321 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/321 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/322 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/322 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/323 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/323 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/324 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/324 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/325 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/325 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/326 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/326 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/327 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/327 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/328 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/328 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/329 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/329 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/330 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/330 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/331 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/331 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/332 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/332 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/333 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/333 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/334 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/334 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/335 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/335 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/336 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/336 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/337 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/337 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/338 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/338 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/339 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/339 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/340 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/340 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/341 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/341 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/342 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/342 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/343 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/343 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/344 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/344 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/345 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/345 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/346 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/346 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/347 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/347 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/348 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/348 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/349 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/349 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/350 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/350 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/351 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/351 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/352 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/352 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/353 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/353 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/354 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/354 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/355 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/355 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/356 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/356 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/357 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/357 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/358 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/358 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/359 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/359 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/360 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/360 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/361 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/361 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/362 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/362 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/363 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/363 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/364 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/364 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/365 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/365 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/366 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/366 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/367 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/367 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/368 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/368 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/369 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/369 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/370 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/370 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/371 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/371 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/372 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/372 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/373 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/373 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/374 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/374 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/375 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/375 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/376 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/376 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/377 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/377 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/378 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/378 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/379 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/379 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/380 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/380 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/381 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/381 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/382 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/382 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/383 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/383 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/384 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/384 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/385 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/385 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/386 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/386 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/387 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/387 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/388 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/388 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/389 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/389 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/390 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/390 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/391 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/391 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/392 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/392 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/393 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/393 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/394 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/394 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/395 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/395 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/396 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/396 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/397 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/397 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/398 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/398 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/399 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/399 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/400 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/400 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/401 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/401 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/402 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/402 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/403 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/403 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/404 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/404 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/405 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/405 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/406 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/406 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/407 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/407 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/408 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/408 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/409 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/409 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/410 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/410 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/411 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/411 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/412 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/412 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/413 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/413 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/414 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/414 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/415 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/415 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/416 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/416 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/417 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/417 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/418 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/418 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/419 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/419 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/420 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/420 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/421 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/421 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/422 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/422 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/423 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/423 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/424 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/424 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/425 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/425 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/426 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/426 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/427 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/427 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/428 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/428 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/429 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/429 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/430 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/430 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/431 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/431 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/432 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/432 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/433 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/433 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/434 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/434 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/435 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/435 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/436 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/436 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/437 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/437 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/438 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/438 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/439 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/439 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/440 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/440 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/441 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/441 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/442 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/442 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/443 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/443 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/444 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/444 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/445 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/445 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/446 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/446 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/447 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/447 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/448 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/448 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/449 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/449 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/450 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/450 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/451 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/451 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/452 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/452 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/453 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/453 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/454 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/454 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/455 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/455 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/456 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/456 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/457 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/457 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/458 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/458 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/459 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/459 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/460 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/460 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/461 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/461 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/462 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/462 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/463 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/463 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/464 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/464 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/465 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/465 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/466 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/466 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/467 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/467 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/468 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/468 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/469 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/469 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/470 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/470 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/471 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/471 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/472 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/472 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/473 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/473 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/474 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/474 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/475 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/475 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/476 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/476 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/477 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/477 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/478 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/478 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/479 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/479 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/480 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/480 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/481 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/481 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/482 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/482 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/483 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/483 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/484 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/484 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/485 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/485 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/486 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/486 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/487 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/487 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/488 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/488 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/489 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/489 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/490 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/490 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/491 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/491 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/492 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/492 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/493 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/493 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/494 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/494 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/495 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/495 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/496 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/496 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/497 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/497 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/498 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/498 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/499 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/499 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/500 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/500 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/501 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/501 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/502 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/502 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/503 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/503 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/504 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/504 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/505 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/505 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/506 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/506 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/507 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/507 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/508 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/508 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/509 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/509 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/510 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/510 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/511 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/511 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/512 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/512 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/513 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/513 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/514 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/514 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/515 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/515 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/516 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/516 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/517 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/517 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/518 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/518 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/519 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/519 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/520 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/520 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/521 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/521 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/522 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/522 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/523 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/523 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/524 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/524 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/525 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/525 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/526 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/526 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/527 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/527 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/528 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/528 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/529 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/529 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/530 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/530 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/531 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/531 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/532 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/532 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/533 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/533 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/534 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/534 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/535 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/535 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/536 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/536 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/537 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/537 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/538 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/538 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/539 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/539 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/540 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/540 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/541 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/541 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/542 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/542 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/543 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/543 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/544 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/544 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/545 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/545 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/546 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/546 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/547 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/547 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/548 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/548 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/549 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/549 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/550 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/550 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/551 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/551 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/552 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/552 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/553 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/553 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/554 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/554 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/555 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/555 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/556 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/556 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/557 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/557 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/558 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/558 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/559 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/559 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/560 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/560 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/561 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/561 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/562 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/562 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/563 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/563 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/564 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/564 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/565 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/565 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/566 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/566 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/567 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/567 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/568 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/568 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/569 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/569 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/570 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/570 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/571 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/571 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/572 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/572 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/573 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/573 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/574 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/574 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/575 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/575 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/576 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/576 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/577 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/577 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/578 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/578 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/579 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/579 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/580 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/580 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/581 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/581 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/582 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/582 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/583 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/583 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/584 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/584 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/585 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/585 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/586 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/586 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/587 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/587 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/588 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/588 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/589 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/589 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/590 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/590 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/591 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/591 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/592 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/592 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/593 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/593 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/594 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/594 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/595 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/595 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/596 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/596 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/597 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/597 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/598 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/598 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/599 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/599 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/600 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/600 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/601 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/601 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/602 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/602 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/603 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/603 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/604 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/604 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/605 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/605 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/606 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/606 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/607 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/607 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/608 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/608 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/609 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/609 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/610 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/610 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/611 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/611 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/612 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/612 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/613 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/613 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/614 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/614 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/615 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/615 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/616 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/616 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/617 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/617 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/618 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/618 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/619 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/619 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/620 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/620 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/621 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/621 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/622 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/622 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/623 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/623 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/624 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/624 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/625 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/625 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/626 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/626 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/627 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/627 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/628 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/628 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/629 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/629 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/630 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/630 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/631 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/631 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/632 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/632 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/633 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/633 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/634 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/634 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/635 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/635 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/636 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/636 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/637 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/637 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/638 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/638 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/639 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/639 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/640 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/640 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/641 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/641 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/642 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/642 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/643 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/643 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/644 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/644 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/645 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/645 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/646 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/646 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/647 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/647 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/648 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/648 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/649 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/649 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/650 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/650 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/651 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/651 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/652 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/652 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/653 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/653 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/654 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/654 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/655 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/655 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/656 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/656 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/657 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/657 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/658 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/658 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/659 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/659 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/660 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/660 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/661 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/661 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/662 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/662 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/663 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/663 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/664 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/664 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/665 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/665 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/666 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/666 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/667 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/667 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/668 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/668 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/669 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/669 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/670 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/670 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/671 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/671 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/672 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/672 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/673 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/673 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/674 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/674 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/675 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/675 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/676 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/676 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/677 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/677 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/678 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/678 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/679 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/679 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/680 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/680 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/681 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/681 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/682 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/682 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/683 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/683 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/684 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/684 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/685 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/685 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/686 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/686 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/687 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/687 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/688 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/688 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/689 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/689 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/690 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/690 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/691 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/691 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/692 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/692 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/693 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/693 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/694 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/694 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/695 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/695 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/696 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/696 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/697 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/697 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/698 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/698 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/699 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/699 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/700 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/700 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/701 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/701 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/702 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/702 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/703 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/703 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/704 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/704 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/705 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/705 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/706 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/706 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/707 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/707 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/708 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/708 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/709 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/709 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/710 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/710 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/711 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/711 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/712 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/712 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/713 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/713 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/714 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/714 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/715 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/715 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/716 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/716 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/717 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/717 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/718 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/718 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/719 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/719 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/720 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/720 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/721 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/721 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/722 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/722 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/723 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/723 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/724 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/724 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/725 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/725 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/726 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/726 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/727 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/727 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/728 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/728 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/729 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/729 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/730 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/730 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/731 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/731 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/732 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/732 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/733 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/733 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/734 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/734 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/735 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/735 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/736 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/736 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/737 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/737 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/738 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/738 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/739 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/739 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/740 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/740 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/741 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/741 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/742 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/742 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/743 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/743 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/744 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/744 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/745 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/745 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/746 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/746 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/747 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/747 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/748 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/748 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/749 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/749 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/750 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/750 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/751 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/751 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/752 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/752 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/753 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/753 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/754 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/754 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/755 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/755 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/756 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/756 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/757 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/757 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/758 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/758 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/759 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/759 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/760 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/760 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/761 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/761 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/762 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/762 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/763 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/763 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/764 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/764 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/765 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/765 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/766 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/766 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/767 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/767 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/768 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/768 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/769 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/769 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/770 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/770 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/771 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/771 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/772 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/772 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/773 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/773 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/774 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/774 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/775 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/775 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/776 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/776 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/777 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/777 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/778 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/778 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/779 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/779 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/780 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/780 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/781 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/781 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/782 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/782 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/783 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/783 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/784 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/784 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/785 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/785 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/786 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/786 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/787 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/787 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/788 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/788 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/789 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/789 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/790 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/790 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/791 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/791 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/792 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/792 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/793 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/793 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/794 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/794 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/795 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/795 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/796 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/796 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/797 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/797 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/798 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/798 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/799 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/799 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/800 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/800 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/801 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/801 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/802 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/802 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/803 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/803 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/804 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/804 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/805 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/805 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/806 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/806 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/807 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/807 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/808 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/808 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/809 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/809 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/810 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/810 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/811 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/811 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/812 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/812 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/813 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/813 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/814 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/814 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/815 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/815 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/816 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/816 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/817 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/817 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/818 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/818 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/819 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/819 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/820 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/820 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/821 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/821 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/822 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/822 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/823 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/823 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/824 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/824 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/825 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/825 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/826 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/826 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/827 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/827 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/828 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/828 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/829 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/829 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/830 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/830 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/831 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/831 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/832 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/832 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/833 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/833 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/834 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/834 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/835 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/835 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/836 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/836 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/837 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/837 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/838 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/838 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/839 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/839 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/840 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/840 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/841 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/841 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/842 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/842 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/843 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/843 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/844 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/844 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/845 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/845 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/846 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/846 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/847 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/847 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/848 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/848 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/849 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/849 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/850 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/850 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/851 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/851 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/852 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/852 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/853 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/853 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/854 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/854 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/855 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/855 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/856 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/856 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/857 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/857 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/858 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/858 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/859 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/859 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/860 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/860 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/861 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/861 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/862 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/862 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/863 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/863 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/864 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/864 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/865 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/865 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/866 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/866 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/867 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/867 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/868 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/868 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/869 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/869 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/870 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/870 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/871 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/871 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/872 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/872 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/873 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/873 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/874 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/874 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/875 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/875 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/876 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/876 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/877 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/877 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/878 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/878 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/879 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/879 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/880 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/880 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/881 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/881 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/882 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/882 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/883 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/883 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/884 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/884 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/885 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/885 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/886 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/886 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/887 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/887 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/888 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/888 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/889 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/889 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/890 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/890 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/891 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/891 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/892 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/892 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/893 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/893 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/894 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/894 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/895 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/895 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/896 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/896 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/897 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/897 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/898 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/898 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/899 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/899 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/900 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/900 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/901 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/901 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/902 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/902 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/903 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/903 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/904 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/904 (3 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/905 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/905 (3 ms) [----------] 906 tests from DsaTest/Pkcs11DsaTest (301 ms total) [----------] 8 tests from EcdsaSignVerify/Pkcs11EcdsaTest [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/0 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/0 (3 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/1 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/1 (2 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/2 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/2 (4 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/3 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/3 (3 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/0 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/0 (5 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/1 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/1 (5 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/2 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/2 (10 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/3 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/3 (7 ms) [----------] 8 tests from EcdsaSignVerify/Pkcs11EcdsaTest (40 ms total) [----------] 387 tests from WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/0 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/0 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/1 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/1 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/2 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/2 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/3 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/3 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/4 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/4 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/5 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/5 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/6 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/6 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/7 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/7 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/8 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/8 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/9 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/9 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/10 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/10 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/11 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/11 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/12 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/12 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/13 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/13 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/14 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/14 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/15 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/15 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/16 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/16 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/17 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/17 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/18 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/18 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/19 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/19 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/20 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/20 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/21 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/21 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/22 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/22 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/23 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/23 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/24 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/24 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/25 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/25 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/26 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/26 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/27 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/27 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/28 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/28 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/29 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/29 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/30 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/30 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/31 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/31 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/32 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/32 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/33 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/33 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/34 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/34 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/35 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/35 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/36 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/36 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/37 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/37 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/38 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/38 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/39 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/39 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/40 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/40 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/41 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/41 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/42 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/42 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/43 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/43 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/44 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/44 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/45 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/45 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/46 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/46 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/47 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/47 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/48 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/48 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/49 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/49 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/50 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/50 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/51 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/51 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/52 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/52 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/53 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/53 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/54 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/54 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/55 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/55 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/56 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/56 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/57 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/57 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/58 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/58 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/59 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/59 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/60 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/60 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/61 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/61 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/62 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/62 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/63 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/63 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/64 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/64 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/65 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/65 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/66 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/66 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/67 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/67 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/68 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/68 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/69 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/69 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/70 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/70 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/71 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/71 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/72 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/72 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/73 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/73 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/74 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/74 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/75 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/75 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/76 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/76 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/77 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/77 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/78 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/78 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/79 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/79 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/80 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/80 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/81 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/81 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/82 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/82 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/83 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/83 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/84 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/84 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/85 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/85 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/86 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/86 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/87 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/87 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/88 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/88 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/89 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/89 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/90 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/90 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/91 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/91 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/92 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/92 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/93 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/93 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/94 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/94 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/95 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/95 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/96 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/96 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/97 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/97 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/98 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/98 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/99 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/99 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/100 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/100 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/101 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/101 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/102 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/102 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/103 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/103 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/104 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/104 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/105 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/105 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/106 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/106 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/107 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/107 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/108 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/108 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/109 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/109 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/110 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/110 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/111 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/111 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/112 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/112 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/113 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/113 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/114 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/114 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/115 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/115 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/116 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/116 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/117 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/117 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/118 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/118 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/119 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/119 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/120 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/120 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/121 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/121 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/122 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/122 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/123 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/123 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/124 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/124 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/125 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/125 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/126 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/126 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/127 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/127 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/128 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/128 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/129 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/129 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/130 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/130 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/131 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/131 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/132 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/132 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/133 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/133 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/134 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/134 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/135 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/135 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/136 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/136 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/137 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/137 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/138 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/138 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/139 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/139 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/140 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/140 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/141 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/141 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/142 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/142 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/143 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/143 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/144 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/144 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/145 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/145 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/146 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/146 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/147 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/147 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/148 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/148 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/149 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/149 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/150 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/150 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/151 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/151 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/152 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/152 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/153 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/153 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/154 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/154 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/155 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/155 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/156 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/156 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/157 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/157 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/158 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/158 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/159 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/159 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/160 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/160 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/161 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/161 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/162 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/162 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/163 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/163 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/164 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/164 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/165 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/165 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/166 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/166 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/167 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/167 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/168 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/168 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/169 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/169 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/170 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/170 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/171 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/171 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/172 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/172 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/173 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/173 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/174 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/174 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/175 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/175 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/176 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/176 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/177 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/177 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/178 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/178 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/179 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/179 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/180 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/180 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/181 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/181 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/182 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/182 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/183 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/183 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/184 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/184 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/185 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/185 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/186 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/186 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/187 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/187 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/188 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/188 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/189 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/189 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/190 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/190 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/191 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/191 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/192 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/192 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/193 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/193 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/194 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/194 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/195 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/195 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/196 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/196 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/197 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/197 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/198 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/198 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/199 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/199 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/200 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/200 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/201 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/201 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/202 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/202 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/203 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/203 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/204 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/204 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/205 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/205 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/206 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/206 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/207 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/207 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/208 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/208 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/209 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/209 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/210 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/210 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/211 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/211 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/212 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/212 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/213 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/213 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/214 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/214 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/215 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/215 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/216 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/216 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/217 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/217 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/218 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/218 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/219 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/219 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/220 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/220 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/221 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/221 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/222 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/222 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/223 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/223 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/224 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/224 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/225 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/225 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/226 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/226 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/227 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/227 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/228 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/228 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/229 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/229 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/230 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/230 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/231 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/231 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/232 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/232 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/233 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/233 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/234 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/234 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/235 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/235 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/236 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/236 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/237 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/237 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/238 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/238 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/239 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/239 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/240 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/240 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/241 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/241 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/242 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/242 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/243 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/243 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/244 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/244 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/245 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/245 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/246 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/246 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/247 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/247 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/248 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/248 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/249 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/249 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/250 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/250 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/251 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/251 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/252 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/252 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/253 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/253 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/254 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/254 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/255 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/255 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/256 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/256 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/257 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/257 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/258 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/258 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/259 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/259 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/260 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/260 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/261 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/261 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/262 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/262 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/263 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/263 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/264 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/264 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/265 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/265 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/266 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/266 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/267 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/267 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/268 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/268 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/269 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/269 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/270 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/270 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/271 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/271 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/272 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/272 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/273 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/273 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/274 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/274 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/275 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/275 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/276 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/276 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/277 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/277 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/278 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/278 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/279 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/279 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/280 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/280 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/281 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/281 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/282 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/282 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/283 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/283 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/284 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/284 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/285 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/285 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/286 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/286 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/287 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/287 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/288 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/288 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/289 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/289 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/290 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/290 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/291 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/291 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/292 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/292 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/293 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/293 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/294 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/294 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/295 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/295 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/296 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/296 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/297 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/297 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/298 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/298 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/299 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/299 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/300 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/300 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/301 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/301 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/302 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/302 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/303 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/303 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/304 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/304 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/305 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/305 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/306 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/306 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/307 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/307 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/308 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/308 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/309 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/309 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/310 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/310 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/311 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/311 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/312 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/312 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/313 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/313 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/314 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/314 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/315 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/315 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/316 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/316 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/317 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/317 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/318 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/318 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/319 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/319 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/320 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/320 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/321 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/321 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/322 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/322 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/323 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/323 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/324 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/324 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/325 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/325 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/326 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/326 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/327 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/327 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/328 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/328 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/329 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/329 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/330 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/330 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/331 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/331 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/332 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/332 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/333 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/333 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/334 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/334 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/335 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/335 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/336 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/336 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/337 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/337 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/338 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/338 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/339 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/339 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/340 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/340 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/341 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/341 (0 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/342 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/342 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/343 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/343 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/344 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/344 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/345 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/345 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/346 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/346 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/347 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/347 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/348 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/348 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/349 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/349 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/350 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/350 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/351 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/351 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/352 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/352 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/353 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/353 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/354 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/354 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/355 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/355 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/356 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/356 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/357 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/357 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/358 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/358 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/359 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/359 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/360 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/360 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/361 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/361 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/362 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/362 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/363 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/363 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/364 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/364 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/365 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/365 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/366 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/366 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/367 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/367 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/368 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/368 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/369 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/369 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/370 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/370 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/371 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/371 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/372 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/372 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/373 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/373 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/374 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/374 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/375 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/375 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/376 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/376 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/377 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/377 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/378 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/378 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/379 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/379 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/380 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/380 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/381 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/381 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/382 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/382 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/383 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/383 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/384 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/384 (2 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/385 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/385 (1 ms) [ RUN ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/386 [ OK ] WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest.Verify/386 (1 ms) [----------] 387 tests from WycheproofP256SignatureSha256Test/Pkcs11EcdsaWycheproofTest (290 ms total) [----------] 408 tests from WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/0 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/0 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/1 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/1 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/2 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/2 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/3 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/3 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/4 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/4 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/5 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/5 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/6 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/6 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/7 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/7 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/8 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/8 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/9 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/9 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/10 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/10 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/11 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/11 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/12 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/12 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/13 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/13 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/14 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/14 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/15 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/15 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/16 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/16 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/17 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/17 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/18 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/18 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/19 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/19 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/20 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/20 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/21 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/21 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/22 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/22 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/23 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/23 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/24 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/24 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/25 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/25 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/26 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/26 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/27 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/27 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/28 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/28 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/29 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/29 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/30 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/30 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/31 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/31 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/32 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/32 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/33 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/33 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/34 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/34 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/35 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/35 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/36 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/36 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/37 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/37 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/38 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/38 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/39 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/39 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/40 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/40 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/41 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/41 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/42 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/42 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/43 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/43 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/44 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/44 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/45 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/45 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/46 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/46 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/47 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/47 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/48 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/48 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/49 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/49 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/50 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/50 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/51 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/51 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/52 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/52 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/53 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/53 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/54 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/54 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/55 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/55 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/56 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/56 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/57 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/57 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/58 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/58 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/59 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/59 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/60 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/60 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/61 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/61 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/62 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/62 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/63 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/63 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/64 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/64 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/65 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/65 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/66 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/66 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/67 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/67 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/68 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/68 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/69 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/69 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/70 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/70 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/71 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/71 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/72 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/72 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/73 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/73 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/74 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/74 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/75 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/75 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/76 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/76 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/77 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/77 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/78 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/78 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/79 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/79 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/80 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/80 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/81 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/81 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/82 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/82 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/83 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/83 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/84 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/84 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/85 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/85 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/86 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/86 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/87 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/87 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/88 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/88 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/89 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/89 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/90 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/90 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/91 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/91 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/92 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/92 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/93 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/93 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/94 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/94 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/95 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/95 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/96 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/96 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/97 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/97 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/98 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/98 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/99 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/99 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/100 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/100 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/101 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/101 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/102 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/102 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/103 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/103 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/104 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/104 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/105 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/105 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/106 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/106 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/107 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/107 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/108 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/108 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/109 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/109 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/110 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/110 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/111 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/111 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/112 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/112 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/113 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/113 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/114 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/114 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/115 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/115 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/116 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/116 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/117 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/117 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/118 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/118 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/119 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/119 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/120 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/120 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/121 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/121 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/122 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/122 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/123 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/123 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/124 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/124 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/125 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/125 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/126 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/126 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/127 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/127 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/128 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/128 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/129 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/129 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/130 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/130 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/131 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/131 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/132 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/132 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/133 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/133 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/134 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/134 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/135 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/135 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/136 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/136 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/137 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/137 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/138 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/138 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/139 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/139 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/140 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/140 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/141 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/141 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/142 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/142 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/143 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/143 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/144 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/144 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/145 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/145 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/146 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/146 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/147 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/147 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/148 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/148 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/149 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/149 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/150 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/150 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/151 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/151 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/152 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/152 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/153 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/153 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/154 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/154 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/155 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/155 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/156 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/156 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/157 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/157 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/158 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/158 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/159 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/159 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/160 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/160 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/161 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/161 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/162 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/162 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/163 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/163 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/164 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/164 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/165 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/165 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/166 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/166 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/167 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/167 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/168 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/168 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/169 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/169 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/170 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/170 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/171 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/171 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/172 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/172 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/173 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/173 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/174 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/174 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/175 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/175 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/176 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/176 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/177 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/177 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/178 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/178 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/179 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/179 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/180 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/180 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/181 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/181 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/182 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/182 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/183 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/183 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/184 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/184 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/185 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/185 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/186 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/186 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/187 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/187 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/188 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/188 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/189 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/189 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/190 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/190 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/191 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/191 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/192 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/192 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/193 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/193 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/194 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/194 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/195 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/195 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/196 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/196 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/197 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/197 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/198 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/198 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/199 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/199 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/200 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/200 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/201 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/201 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/202 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/202 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/203 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/203 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/204 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/204 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/205 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/205 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/206 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/206 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/207 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/207 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/208 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/208 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/209 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/209 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/210 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/210 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/211 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/211 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/212 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/212 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/213 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/213 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/214 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/214 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/215 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/215 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/216 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/216 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/217 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/217 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/218 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/218 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/219 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/219 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/220 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/220 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/221 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/221 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/222 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/222 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/223 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/223 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/224 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/224 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/225 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/225 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/226 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/226 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/227 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/227 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/228 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/228 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/229 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/229 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/230 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/230 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/231 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/231 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/232 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/232 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/233 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/233 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/234 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/234 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/235 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/235 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/236 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/236 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/237 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/237 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/238 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/238 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/239 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/239 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/240 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/240 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/241 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/241 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/242 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/242 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/243 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/243 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/244 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/244 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/245 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/245 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/246 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/246 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/247 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/247 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/248 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/248 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/249 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/249 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/250 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/250 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/251 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/251 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/252 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/252 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/253 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/253 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/254 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/254 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/255 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/255 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/256 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/256 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/257 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/257 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/258 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/258 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/259 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/259 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/260 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/260 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/261 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/261 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/262 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/262 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/263 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/263 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/264 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/264 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/265 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/265 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/266 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/266 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/267 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/267 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/268 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/268 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/269 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/269 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/270 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/270 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/271 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/271 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/272 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/272 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/273 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/273 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/274 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/274 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/275 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/275 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/276 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/276 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/277 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/277 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/278 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/278 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/279 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/279 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/280 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/280 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/281 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/281 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/282 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/282 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/283 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/283 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/284 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/284 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/285 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/285 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/286 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/286 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/287 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/287 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/288 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/288 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/289 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/289 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/290 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/290 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/291 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/291 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/292 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/292 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/293 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/293 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/294 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/294 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/295 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/295 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/296 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/296 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/297 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/297 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/298 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/298 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/299 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/299 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/300 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/300 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/301 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/301 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/302 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/302 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/303 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/303 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/304 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/304 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/305 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/305 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/306 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/306 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/307 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/307 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/308 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/308 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/309 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/309 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/310 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/310 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/311 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/311 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/312 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/312 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/313 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/313 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/314 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/314 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/315 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/315 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/316 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/316 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/317 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/317 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/318 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/318 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/319 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/319 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/320 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/320 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/321 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/321 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/322 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/322 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/323 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/323 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/324 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/324 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/325 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/325 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/326 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/326 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/327 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/327 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/328 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/328 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/329 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/329 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/330 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/330 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/331 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/331 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/332 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/332 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/333 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/333 (1 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/334 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/334 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/335 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/335 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/336 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/336 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/337 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/337 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/338 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/338 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/339 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/339 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/340 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/340 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/341 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/341 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/342 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/342 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/343 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/343 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/344 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/344 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/345 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/345 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/346 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/346 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/347 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/347 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/348 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/348 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/349 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/349 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/350 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/350 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/351 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/351 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/352 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/352 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/353 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/353 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/354 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/354 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/355 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/355 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/356 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/356 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/357 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/357 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/358 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/358 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/359 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/359 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/360 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/360 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/361 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/361 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/362 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/362 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/363 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/363 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/364 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/364 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/365 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/365 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/366 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/366 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/367 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/367 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/368 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/368 (0 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/369 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/369 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/370 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/370 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/371 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/371 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/372 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/372 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/373 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/373 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/374 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/374 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/375 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/375 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/376 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/376 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/377 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/377 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/378 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/378 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/379 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/379 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/380 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/380 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/381 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/381 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/382 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/382 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/383 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/383 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/384 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/384 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/385 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/385 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/386 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/386 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/387 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/387 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/388 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/388 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/389 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/389 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/390 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/390 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/391 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/391 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/392 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/392 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/393 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/393 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/394 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/394 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/395 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/395 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/396 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/396 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/397 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/397 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/398 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/398 (2 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/399 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/399 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/400 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/400 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/401 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/401 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/402 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/402 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/403 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/403 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/404 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/404 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/405 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/405 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/406 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/406 (3 ms) [ RUN ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/407 [ OK ] WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest.Verify/407 (3 ms) [----------] 408 tests from WycheproofP384SignatureSha384Test/Pkcs11EcdsaWycheproofTest (650 ms total) [----------] 447 tests from WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/0 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/0 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/1 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/1 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/2 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/2 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/3 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/3 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/4 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/4 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/5 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/5 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/6 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/6 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/7 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/7 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/8 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/8 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/9 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/9 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/10 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/10 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/11 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/11 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/12 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/12 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/13 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/13 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/14 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/14 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/15 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/15 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/16 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/16 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/17 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/17 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/18 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/18 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/19 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/19 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/20 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/20 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/21 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/21 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/22 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/22 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/23 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/23 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/24 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/24 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/25 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/25 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/26 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/26 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/27 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/27 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/28 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/28 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/29 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/29 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/30 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/30 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/31 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/31 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/32 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/32 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/33 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/33 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/34 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/34 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/35 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/35 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/36 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/36 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/37 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/37 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/38 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/38 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/39 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/39 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/40 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/40 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/41 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/41 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/42 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/42 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/43 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/43 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/44 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/44 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/45 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/45 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/46 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/46 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/47 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/47 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/48 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/48 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/49 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/49 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/50 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/50 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/51 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/51 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/52 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/52 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/53 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/53 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/54 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/54 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/55 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/55 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/56 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/56 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/57 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/57 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/58 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/58 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/59 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/59 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/60 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/60 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/61 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/61 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/62 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/62 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/63 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/63 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/64 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/64 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/65 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/65 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/66 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/66 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/67 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/67 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/68 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/68 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/69 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/69 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/70 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/70 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/71 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/71 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/72 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/72 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/73 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/73 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/74 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/74 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/75 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/75 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/76 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/76 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/77 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/77 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/78 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/78 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/79 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/79 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/80 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/80 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/81 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/81 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/82 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/82 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/83 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/83 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/84 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/84 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/85 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/85 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/86 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/86 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/87 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/87 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/88 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/88 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/89 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/89 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/90 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/90 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/91 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/91 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/92 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/92 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/93 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/93 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/94 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/94 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/95 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/95 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/96 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/96 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/97 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/97 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/98 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/98 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/99 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/99 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/100 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/100 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/101 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/101 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/102 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/102 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/103 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/103 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/104 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/104 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/105 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/105 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/106 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/106 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/107 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/107 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/108 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/108 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/109 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/109 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/110 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/110 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/111 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/111 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/112 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/112 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/113 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/113 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/114 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/114 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/115 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/115 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/116 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/116 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/117 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/117 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/118 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/118 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/119 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/119 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/120 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/120 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/121 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/121 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/122 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/122 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/123 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/123 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/124 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/124 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/125 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/125 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/126 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/126 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/127 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/127 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/128 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/128 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/129 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/129 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/130 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/130 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/131 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/131 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/132 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/132 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/133 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/133 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/134 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/134 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/135 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/135 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/136 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/136 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/137 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/137 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/138 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/138 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/139 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/139 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/140 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/140 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/141 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/141 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/142 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/142 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/143 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/143 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/144 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/144 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/145 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/145 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/146 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/146 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/147 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/147 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/148 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/148 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/149 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/149 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/150 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/150 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/151 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/151 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/152 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/152 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/153 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/153 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/154 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/154 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/155 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/155 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/156 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/156 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/157 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/157 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/158 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/158 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/159 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/159 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/160 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/160 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/161 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/161 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/162 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/162 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/163 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/163 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/164 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/164 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/165 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/165 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/166 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/166 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/167 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/167 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/168 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/168 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/169 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/169 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/170 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/170 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/171 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/171 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/172 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/172 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/173 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/173 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/174 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/174 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/175 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/175 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/176 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/176 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/177 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/177 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/178 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/178 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/179 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/179 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/180 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/180 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/181 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/181 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/182 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/182 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/183 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/183 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/184 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/184 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/185 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/185 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/186 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/186 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/187 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/187 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/188 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/188 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/189 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/189 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/190 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/190 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/191 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/191 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/192 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/192 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/193 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/193 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/194 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/194 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/195 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/195 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/196 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/196 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/197 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/197 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/198 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/198 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/199 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/199 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/200 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/200 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/201 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/201 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/202 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/202 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/203 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/203 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/204 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/204 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/205 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/205 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/206 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/206 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/207 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/207 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/208 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/208 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/209 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/209 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/210 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/210 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/211 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/211 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/212 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/212 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/213 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/213 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/214 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/214 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/215 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/215 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/216 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/216 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/217 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/217 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/218 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/218 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/219 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/219 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/220 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/220 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/221 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/221 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/222 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/222 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/223 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/223 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/224 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/224 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/225 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/225 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/226 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/226 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/227 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/227 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/228 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/228 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/229 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/229 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/230 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/230 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/231 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/231 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/232 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/232 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/233 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/233 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/234 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/234 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/235 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/235 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/236 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/236 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/237 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/237 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/238 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/238 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/239 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/239 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/240 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/240 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/241 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/241 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/242 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/242 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/243 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/243 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/244 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/244 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/245 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/245 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/246 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/246 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/247 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/247 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/248 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/248 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/249 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/249 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/250 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/250 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/251 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/251 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/252 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/252 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/253 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/253 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/254 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/254 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/255 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/255 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/256 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/256 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/257 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/257 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/258 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/258 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/259 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/259 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/260 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/260 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/261 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/261 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/262 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/262 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/263 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/263 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/264 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/264 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/265 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/265 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/266 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/266 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/267 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/267 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/268 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/268 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/269 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/269 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/270 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/270 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/271 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/271 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/272 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/272 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/273 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/273 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/274 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/274 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/275 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/275 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/276 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/276 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/277 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/277 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/278 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/278 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/279 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/279 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/280 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/280 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/281 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/281 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/282 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/282 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/283 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/283 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/284 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/284 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/285 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/285 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/286 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/286 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/287 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/287 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/288 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/288 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/289 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/289 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/290 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/290 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/291 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/291 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/292 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/292 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/293 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/293 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/294 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/294 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/295 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/295 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/296 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/296 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/297 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/297 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/298 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/298 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/299 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/299 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/300 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/300 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/301 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/301 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/302 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/302 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/303 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/303 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/304 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/304 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/305 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/305 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/306 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/306 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/307 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/307 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/308 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/308 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/309 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/309 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/310 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/310 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/311 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/311 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/312 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/312 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/313 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/313 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/314 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/314 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/315 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/315 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/316 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/316 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/317 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/317 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/318 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/318 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/319 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/319 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/320 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/320 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/321 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/321 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/322 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/322 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/323 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/323 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/324 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/324 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/325 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/325 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/326 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/326 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/327 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/327 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/328 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/328 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/329 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/329 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/330 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/330 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/331 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/331 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/332 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/332 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/333 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/333 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/334 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/334 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/335 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/335 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/336 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/336 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/337 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/337 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/338 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/338 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/339 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/339 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/340 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/340 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/341 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/341 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/342 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/342 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/343 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/343 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/344 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/344 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/345 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/345 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/346 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/346 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/347 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/347 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/348 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/348 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/349 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/349 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/350 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/350 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/351 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/351 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/352 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/352 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/353 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/353 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/354 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/354 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/355 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/355 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/356 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/356 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/357 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/357 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/358 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/358 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/359 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/359 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/360 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/360 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/361 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/361 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/362 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/362 (0 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/363 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/363 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/364 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/364 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/365 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/365 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/366 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/366 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/367 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/367 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/368 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/368 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/369 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/369 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/370 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/370 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/371 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/371 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/372 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/372 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/373 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/373 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/374 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/374 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/375 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/375 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/376 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/376 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/377 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/377 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/378 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/378 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/379 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/379 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/380 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/380 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/381 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/381 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/382 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/382 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/383 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/383 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/384 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/384 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/385 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/385 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/386 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/386 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/387 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/387 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/388 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/388 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/389 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/389 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/390 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/390 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/391 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/391 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/392 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/392 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/393 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/393 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/394 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/394 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/395 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/395 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/396 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/396 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/397 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/397 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/398 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/398 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/399 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/399 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/400 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/400 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/401 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/401 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/402 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/402 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/403 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/403 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/404 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/404 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/405 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/405 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/406 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/406 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/407 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/407 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/408 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/408 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/409 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/409 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/410 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/410 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/411 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/411 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/412 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/412 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/413 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/413 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/414 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/414 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/415 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/415 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/416 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/416 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/417 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/417 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/418 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/418 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/419 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/419 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/420 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/420 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/421 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/421 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/422 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/422 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/423 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/423 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/424 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/424 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/425 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/425 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/426 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/426 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/427 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/427 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/428 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/428 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/429 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/429 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/430 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/430 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/431 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/431 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/432 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/432 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/433 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/433 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/434 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/434 (1 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/435 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/435 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/436 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/436 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/437 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/437 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/438 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/438 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/439 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/439 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/440 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/440 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/441 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/441 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/442 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/442 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/443 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/443 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/444 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/444 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/445 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/445 (2 ms) [ RUN ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/446 [ OK ] WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest.Verify/446 (2 ms) [----------] 447 tests from WycheproofP521SignatureSha512Test/Pkcs11EcdsaWycheproofTest (519 ms total) [----------] 460 tests from WycheproofP256EcdhTest/Pkcs11EcdhTest [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/0 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/0 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/1 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/1 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/2 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/2 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/3 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/3 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/4 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/4 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/5 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/5 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/6 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/6 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/7 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/7 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/8 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/8 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/9 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/9 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/10 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/10 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/11 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/11 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/12 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/12 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/13 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/13 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/14 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/14 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/15 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/15 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/16 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/16 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/17 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/17 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/18 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/18 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/19 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/19 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/20 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/20 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/21 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/21 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/22 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/22 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/23 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/23 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/24 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/24 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/25 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/25 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/26 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/26 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/27 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/27 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/28 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/28 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/29 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/29 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/30 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/30 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/31 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/31 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/32 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/32 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/33 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/33 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/34 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/34 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/35 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/35 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/36 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/36 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/37 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/37 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/38 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/38 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/39 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/39 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/40 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/40 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/41 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/41 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/42 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/42 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/43 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/43 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/44 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/44 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/45 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/45 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/46 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/46 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/47 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/47 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/48 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/48 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/49 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/49 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/50 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/50 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/51 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/51 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/52 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/52 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/53 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/53 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/54 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/54 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/55 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/55 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/56 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/56 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/57 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/57 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/58 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/58 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/59 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/59 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/60 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/60 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/61 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/61 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/62 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/62 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/63 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/63 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/64 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/64 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/65 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/65 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/66 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/66 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/67 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/67 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/68 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/68 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/69 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/69 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/70 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/70 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/71 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/71 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/72 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/72 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/73 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/73 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/74 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/74 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/75 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/75 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/76 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/76 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/77 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/77 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/78 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/78 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/79 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/79 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/80 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/80 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/81 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/81 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/82 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/82 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/83 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/83 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/84 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/84 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/85 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/85 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/86 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/86 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/87 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/87 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/88 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/88 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/89 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/89 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/90 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/90 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/91 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/91 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/92 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/92 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/93 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/93 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/94 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/94 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/95 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/95 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/96 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/96 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/97 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/97 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/98 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/98 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/99 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/99 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/100 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/100 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/101 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/101 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/102 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/102 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/103 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/103 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/104 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/104 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/105 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/105 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/106 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/106 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/107 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/107 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/108 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/108 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/109 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/109 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/110 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/110 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/111 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/111 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/112 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/112 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/113 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/113 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/114 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/114 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/115 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/115 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/116 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/116 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/117 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/117 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/118 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/118 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/119 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/119 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/120 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/120 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/121 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/121 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/122 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/122 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/123 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/123 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/124 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/124 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/125 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/125 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/126 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/126 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/127 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/127 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/128 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/128 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/129 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/129 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/130 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/130 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/131 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/131 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/132 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/132 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/133 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/133 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/134 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/134 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/135 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/135 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/136 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/136 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/137 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/137 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/138 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/138 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/139 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/139 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/140 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/140 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/141 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/141 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/142 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/142 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/143 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/143 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/144 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/144 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/145 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/145 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/146 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/146 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/147 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/147 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/148 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/148 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/149 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/149 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/150 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/150 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/151 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/151 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/152 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/152 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/153 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/153 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/154 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/154 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/155 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/155 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/156 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/156 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/157 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/157 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/158 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/158 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/159 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/159 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/160 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/160 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/161 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/161 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/162 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/162 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/163 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/163 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/164 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/164 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/165 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/165 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/166 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/166 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/167 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/167 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/168 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/168 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/169 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/169 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/170 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/170 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/171 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/171 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/172 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/172 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/173 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/173 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/174 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/174 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/175 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/175 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/176 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/176 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/177 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/177 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/178 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/178 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/179 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/179 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/180 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/180 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/181 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/181 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/182 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/182 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/183 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/183 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/184 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/184 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/185 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/185 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/186 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/186 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/187 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/187 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/188 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/188 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/189 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/189 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/190 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/190 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/191 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/191 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/192 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/192 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/193 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/193 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/194 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/194 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/195 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/195 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/196 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/196 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/197 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/197 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/198 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/198 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/199 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/199 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/200 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/200 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/201 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/201 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/202 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/202 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/203 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/203 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/204 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/204 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/205 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/205 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/206 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/206 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/207 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/207 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/208 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/208 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/209 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/209 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/210 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/210 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/211 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/211 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/212 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/212 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/213 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/213 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/214 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/214 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/215 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/215 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/216 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/216 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/217 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/217 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/218 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/218 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/219 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/219 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/220 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/220 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/221 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/221 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/222 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/222 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/223 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/223 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/224 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/224 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/225 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/225 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/226 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/226 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/227 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/227 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/228 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/228 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/229 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/229 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/230 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/230 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/231 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/231 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/232 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/232 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/233 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/233 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/234 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/234 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/235 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/235 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/236 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/236 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/237 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/237 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/238 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/238 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/239 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/239 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/240 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/240 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/241 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/241 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/242 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/242 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/243 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/243 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/244 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/244 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/245 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/245 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/246 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/246 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/247 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/247 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/248 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/248 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/249 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/249 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/250 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/250 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/251 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/251 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/252 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/252 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/253 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/253 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/254 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/254 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/255 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/255 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/256 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/256 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/257 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/257 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/258 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/258 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/259 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/259 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/260 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/260 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/261 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/261 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/262 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/262 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/263 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/263 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/264 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/264 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/265 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/265 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/266 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/266 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/267 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/267 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/268 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/268 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/269 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/269 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/270 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/270 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/271 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/271 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/272 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/272 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/273 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/273 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/274 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/274 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/275 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/275 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/276 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/276 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/277 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/277 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/278 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/278 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/279 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/279 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/280 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/280 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/281 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/281 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/282 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/282 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/283 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/283 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/284 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/284 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/285 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/285 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/286 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/286 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/287 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/287 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/288 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/288 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/289 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/289 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/290 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/290 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/291 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/291 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/292 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/292 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/293 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/293 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/294 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/294 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/295 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/295 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/296 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/296 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/297 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/297 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/298 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/298 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/299 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/299 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/300 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/300 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/301 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/301 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/302 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/302 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/303 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/303 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/304 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/304 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/305 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/305 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/306 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/306 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/307 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/307 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/308 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/308 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/309 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/309 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/310 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/310 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/311 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/311 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/312 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/312 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/313 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/313 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/314 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/314 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/315 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/315 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/316 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/316 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/317 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/317 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/318 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/318 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/319 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/319 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/320 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/320 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/321 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/321 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/322 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/322 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/323 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/323 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/324 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/324 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/325 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/325 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/326 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/326 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/327 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/327 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/328 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/328 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/329 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/329 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/330 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/330 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/331 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/331 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/332 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/332 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/333 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/333 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/334 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/334 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/335 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/335 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/336 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/336 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/337 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/337 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/338 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/338 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/339 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/339 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/340 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/340 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/341 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/341 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/342 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/342 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/343 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/343 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/344 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/344 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/345 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/345 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/346 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/346 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/347 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/347 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/348 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/348 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/349 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/349 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/350 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/350 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/351 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/351 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/352 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/352 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/353 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/353 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/354 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/354 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/355 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/355 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/356 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/356 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/357 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/357 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/358 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/358 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/359 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/359 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/360 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/360 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/361 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/361 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/362 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/362 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/363 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/363 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/364 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/364 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/365 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/365 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/366 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/366 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/367 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/367 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/368 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/368 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/369 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/369 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/370 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/370 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/371 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/371 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/372 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/372 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/373 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/373 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/374 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/374 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/375 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/375 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/376 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/376 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/377 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/377 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/378 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/378 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/379 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/379 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/380 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/380 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/381 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/381 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/382 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/382 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/383 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/383 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/384 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/384 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/385 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/385 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/386 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/386 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/387 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/387 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/388 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/388 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/389 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/389 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/390 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/390 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/391 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/391 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/392 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/392 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/393 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/393 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/394 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/394 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/395 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/395 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/396 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/396 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/397 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/397 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/398 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/398 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/399 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/399 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/400 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/400 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/401 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/401 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/402 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/402 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/403 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/403 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/404 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/404 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/405 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/405 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/406 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/406 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/407 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/407 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/408 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/408 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/409 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/409 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/410 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/410 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/411 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/411 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/412 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/412 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/413 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/413 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/414 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/414 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/415 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/415 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/416 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/416 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/417 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/417 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/418 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/418 (2 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/419 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/419 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/420 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/420 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/421 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/421 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/422 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/422 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/423 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/423 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/424 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/424 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/425 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/425 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/426 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/426 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/427 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/427 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/428 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/428 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/429 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/429 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/430 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/430 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/431 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/431 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/432 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/432 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/433 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/433 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/434 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/434 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/435 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/435 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/436 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/436 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/437 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/437 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/438 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/438 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/439 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/439 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/440 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/440 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/441 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/441 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/442 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/442 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/443 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/443 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/444 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/444 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/445 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/445 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/446 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/446 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/447 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/447 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/448 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/448 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/449 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/449 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/450 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/450 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/451 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/451 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/452 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/452 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/453 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/453 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/454 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/454 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/455 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/455 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/456 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/456 (1 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/457 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/457 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/458 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/458 (0 ms) [ RUN ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/459 [ OK ] WycheproofP256EcdhTest/Pkcs11EcdhTest.TestVectors/459 (0 ms) [----------] 460 tests from WycheproofP256EcdhTest/Pkcs11EcdhTest (245 ms total) [----------] 427 tests from WycheproofP384EcdhTest/Pkcs11EcdhTest [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/0 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/0 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/1 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/1 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/2 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/2 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/3 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/3 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/4 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/4 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/5 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/5 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/6 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/6 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/7 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/7 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/8 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/8 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/9 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/9 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/10 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/10 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/11 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/11 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/12 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/12 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/13 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/13 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/14 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/14 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/15 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/15 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/16 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/16 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/17 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/17 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/18 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/18 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/19 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/19 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/20 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/20 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/21 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/21 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/22 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/22 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/23 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/23 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/24 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/24 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/25 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/25 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/26 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/26 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/27 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/27 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/28 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/28 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/29 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/29 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/30 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/30 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/31 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/31 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/32 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/32 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/33 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/33 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/34 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/34 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/35 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/35 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/36 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/36 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/37 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/37 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/38 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/38 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/39 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/39 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/40 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/40 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/41 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/41 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/42 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/42 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/43 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/43 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/44 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/44 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/45 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/45 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/46 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/46 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/47 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/47 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/48 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/48 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/49 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/49 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/50 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/50 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/51 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/51 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/52 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/52 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/53 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/53 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/54 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/54 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/55 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/55 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/56 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/56 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/57 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/57 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/58 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/58 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/59 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/59 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/60 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/60 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/61 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/61 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/62 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/62 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/63 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/63 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/64 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/64 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/65 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/65 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/66 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/66 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/67 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/67 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/68 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/68 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/69 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/69 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/70 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/70 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/71 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/71 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/72 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/72 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/73 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/73 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/74 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/74 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/75 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/75 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/76 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/76 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/77 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/77 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/78 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/78 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/79 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/79 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/80 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/80 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/81 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/81 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/82 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/82 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/83 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/83 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/84 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/84 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/85 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/85 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/86 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/86 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/87 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/87 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/88 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/88 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/89 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/89 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/90 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/90 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/91 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/91 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/92 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/92 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/93 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/93 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/94 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/94 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/95 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/95 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/96 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/96 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/97 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/97 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/98 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/98 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/99 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/99 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/100 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/100 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/101 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/101 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/102 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/102 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/103 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/103 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/104 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/104 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/105 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/105 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/106 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/106 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/107 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/107 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/108 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/108 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/109 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/109 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/110 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/110 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/111 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/111 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/112 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/112 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/113 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/113 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/114 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/114 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/115 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/115 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/116 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/116 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/117 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/117 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/118 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/118 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/119 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/119 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/120 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/120 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/121 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/121 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/122 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/122 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/123 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/123 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/124 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/124 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/125 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/125 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/126 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/126 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/127 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/127 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/128 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/128 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/129 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/129 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/130 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/130 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/131 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/131 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/132 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/132 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/133 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/133 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/134 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/134 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/135 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/135 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/136 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/136 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/137 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/137 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/138 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/138 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/139 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/139 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/140 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/140 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/141 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/141 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/142 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/142 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/143 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/143 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/144 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/144 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/145 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/145 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/146 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/146 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/147 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/147 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/148 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/148 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/149 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/149 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/150 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/150 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/151 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/151 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/152 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/152 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/153 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/153 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/154 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/154 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/155 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/155 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/156 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/156 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/157 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/157 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/158 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/158 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/159 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/159 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/160 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/160 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/161 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/161 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/162 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/162 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/163 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/163 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/164 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/164 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/165 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/165 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/166 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/166 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/167 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/167 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/168 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/168 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/169 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/169 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/170 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/170 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/171 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/171 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/172 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/172 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/173 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/173 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/174 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/174 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/175 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/175 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/176 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/176 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/177 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/177 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/178 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/178 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/179 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/179 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/180 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/180 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/181 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/181 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/182 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/182 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/183 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/183 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/184 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/184 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/185 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/185 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/186 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/186 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/187 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/187 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/188 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/188 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/189 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/189 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/190 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/190 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/191 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/191 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/192 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/192 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/193 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/193 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/194 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/194 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/195 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/195 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/196 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/196 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/197 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/197 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/198 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/198 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/199 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/199 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/200 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/200 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/201 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/201 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/202 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/202 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/203 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/203 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/204 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/204 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/205 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/205 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/206 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/206 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/207 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/207 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/208 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/208 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/209 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/209 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/210 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/210 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/211 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/211 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/212 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/212 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/213 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/213 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/214 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/214 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/215 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/215 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/216 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/216 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/217 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/217 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/218 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/218 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/219 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/219 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/220 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/220 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/221 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/221 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/222 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/222 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/223 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/223 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/224 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/224 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/225 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/225 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/226 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/226 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/227 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/227 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/228 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/228 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/229 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/229 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/230 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/230 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/231 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/231 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/232 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/232 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/233 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/233 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/234 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/234 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/235 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/235 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/236 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/236 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/237 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/237 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/238 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/238 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/239 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/239 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/240 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/240 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/241 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/241 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/242 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/242 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/243 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/243 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/244 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/244 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/245 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/245 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/246 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/246 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/247 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/247 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/248 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/248 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/249 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/249 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/250 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/250 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/251 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/251 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/252 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/252 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/253 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/253 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/254 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/254 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/255 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/255 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/256 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/256 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/257 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/257 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/258 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/258 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/259 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/259 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/260 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/260 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/261 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/261 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/262 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/262 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/263 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/263 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/264 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/264 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/265 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/265 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/266 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/266 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/267 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/267 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/268 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/268 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/269 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/269 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/270 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/270 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/271 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/271 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/272 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/272 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/273 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/273 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/274 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/274 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/275 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/275 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/276 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/276 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/277 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/277 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/278 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/278 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/279 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/279 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/280 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/280 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/281 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/281 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/282 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/282 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/283 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/283 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/284 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/284 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/285 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/285 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/286 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/286 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/287 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/287 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/288 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/288 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/289 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/289 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/290 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/290 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/291 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/291 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/292 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/292 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/293 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/293 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/294 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/294 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/295 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/295 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/296 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/296 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/297 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/297 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/298 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/298 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/299 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/299 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/300 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/300 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/301 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/301 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/302 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/302 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/303 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/303 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/304 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/304 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/305 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/305 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/306 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/306 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/307 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/307 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/308 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/308 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/309 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/309 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/310 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/310 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/311 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/311 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/312 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/312 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/313 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/313 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/314 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/314 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/315 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/315 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/316 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/316 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/317 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/317 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/318 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/318 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/319 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/319 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/320 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/320 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/321 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/321 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/322 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/322 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/323 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/323 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/324 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/324 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/325 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/325 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/326 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/326 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/327 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/327 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/328 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/328 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/329 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/329 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/330 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/330 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/331 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/331 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/332 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/332 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/333 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/333 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/334 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/334 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/335 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/335 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/336 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/336 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/337 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/337 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/338 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/338 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/339 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/339 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/340 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/340 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/341 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/341 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/342 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/342 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/343 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/343 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/344 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/344 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/345 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/345 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/346 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/346 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/347 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/347 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/348 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/348 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/349 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/349 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/350 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/350 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/351 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/351 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/352 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/352 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/353 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/353 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/354 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/354 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/355 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/355 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/356 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/356 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/357 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/357 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/358 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/358 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/359 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/359 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/360 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/360 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/361 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/361 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/362 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/362 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/363 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/363 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/364 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/364 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/365 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/365 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/366 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/366 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/367 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/367 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/368 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/368 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/369 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/369 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/370 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/370 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/371 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/371 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/372 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/372 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/373 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/373 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/374 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/374 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/375 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/375 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/376 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/376 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/377 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/377 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/378 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/378 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/379 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/379 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/380 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/380 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/381 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/381 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/382 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/382 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/383 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/383 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/384 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/384 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/385 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/385 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/386 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/386 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/387 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/387 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/388 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/388 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/389 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/389 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/390 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/390 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/391 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/391 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/392 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/392 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/393 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/393 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/394 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/394 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/395 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/395 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/396 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/396 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/397 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/397 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/398 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/398 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/399 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/399 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/400 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/400 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/401 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/401 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/402 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/402 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/403 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/403 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/404 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/404 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/405 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/405 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/406 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/406 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/407 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/407 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/408 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/408 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/409 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/409 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/410 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/410 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/411 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/411 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/412 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/412 (1 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/413 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/413 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/414 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/414 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/415 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/415 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/416 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/416 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/417 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/417 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/418 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/418 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/419 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/419 (2 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/420 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/420 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/421 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/421 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/422 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/422 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/423 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/423 (3 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/424 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/424 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/425 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/425 (0 ms) [ RUN ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/426 [ OK ] WycheproofP384EcdhTest/Pkcs11EcdhTest.TestVectors/426 (0 ms) [----------] 427 tests from WycheproofP384EcdhTest/Pkcs11EcdhTest (481 ms total) [----------] 480 tests from WycheproofP521EcdhTest/Pkcs11EcdhTest [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/0 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/0 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/1 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/1 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/2 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/2 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/3 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/3 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/4 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/4 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/5 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/5 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/6 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/6 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/7 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/7 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/8 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/8 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/9 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/9 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/10 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/10 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/11 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/11 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/12 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/12 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/13 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/13 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/14 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/14 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/15 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/15 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/16 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/16 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/17 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/17 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/18 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/18 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/19 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/19 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/20 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/20 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/21 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/21 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/22 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/22 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/23 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/23 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/24 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/24 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/25 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/25 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/26 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/26 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/27 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/27 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/28 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/28 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/29 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/29 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/30 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/30 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/31 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/31 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/32 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/32 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/33 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/33 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/34 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/34 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/35 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/35 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/36 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/36 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/37 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/37 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/38 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/38 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/39 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/39 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/40 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/40 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/41 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/41 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/42 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/42 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/43 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/43 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/44 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/44 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/45 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/45 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/46 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/46 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/47 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/47 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/48 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/48 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/49 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/49 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/50 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/50 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/51 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/51 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/52 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/52 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/53 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/53 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/54 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/54 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/55 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/55 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/56 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/56 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/57 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/57 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/58 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/58 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/59 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/59 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/60 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/60 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/61 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/61 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/62 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/62 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/63 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/63 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/64 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/64 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/65 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/65 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/66 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/66 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/67 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/67 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/68 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/68 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/69 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/69 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/70 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/70 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/71 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/71 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/72 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/72 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/73 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/73 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/74 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/74 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/75 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/75 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/76 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/76 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/77 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/77 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/78 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/78 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/79 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/79 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/80 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/80 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/81 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/81 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/82 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/82 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/83 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/83 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/84 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/84 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/85 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/85 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/86 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/86 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/87 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/87 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/88 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/88 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/89 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/89 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/90 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/90 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/91 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/91 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/92 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/92 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/93 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/93 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/94 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/94 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/95 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/95 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/96 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/96 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/97 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/97 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/98 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/98 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/99 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/99 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/100 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/100 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/101 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/101 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/102 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/102 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/103 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/103 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/104 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/104 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/105 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/105 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/106 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/106 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/107 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/107 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/108 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/108 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/109 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/109 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/110 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/110 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/111 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/111 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/112 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/112 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/113 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/113 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/114 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/114 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/115 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/115 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/116 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/116 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/117 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/117 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/118 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/118 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/119 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/119 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/120 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/120 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/121 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/121 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/122 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/122 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/123 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/123 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/124 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/124 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/125 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/125 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/126 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/126 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/127 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/127 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/128 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/128 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/129 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/129 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/130 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/130 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/131 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/131 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/132 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/132 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/133 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/133 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/134 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/134 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/135 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/135 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/136 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/136 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/137 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/137 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/138 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/138 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/139 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/139 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/140 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/140 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/141 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/141 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/142 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/142 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/143 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/143 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/144 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/144 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/145 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/145 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/146 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/146 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/147 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/147 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/148 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/148 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/149 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/149 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/150 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/150 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/151 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/151 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/152 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/152 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/153 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/153 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/154 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/154 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/155 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/155 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/156 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/156 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/157 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/157 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/158 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/158 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/159 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/159 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/160 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/160 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/161 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/161 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/162 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/162 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/163 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/163 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/164 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/164 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/165 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/165 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/166 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/166 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/167 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/167 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/168 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/168 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/169 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/169 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/170 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/170 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/171 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/171 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/172 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/172 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/173 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/173 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/174 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/174 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/175 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/175 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/176 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/176 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/177 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/177 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/178 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/178 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/179 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/179 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/180 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/180 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/181 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/181 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/182 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/182 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/183 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/183 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/184 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/184 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/185 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/185 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/186 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/186 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/187 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/187 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/188 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/188 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/189 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/189 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/190 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/190 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/191 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/191 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/192 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/192 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/193 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/193 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/194 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/194 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/195 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/195 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/196 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/196 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/197 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/197 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/198 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/198 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/199 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/199 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/200 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/200 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/201 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/201 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/202 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/202 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/203 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/203 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/204 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/204 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/205 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/205 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/206 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/206 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/207 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/207 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/208 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/208 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/209 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/209 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/210 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/210 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/211 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/211 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/212 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/212 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/213 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/213 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/214 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/214 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/215 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/215 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/216 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/216 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/217 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/217 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/218 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/218 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/219 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/219 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/220 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/220 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/221 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/221 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/222 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/222 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/223 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/223 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/224 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/224 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/225 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/225 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/226 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/226 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/227 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/227 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/228 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/228 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/229 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/229 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/230 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/230 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/231 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/231 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/232 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/232 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/233 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/233 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/234 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/234 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/235 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/235 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/236 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/236 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/237 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/237 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/238 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/238 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/239 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/239 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/240 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/240 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/241 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/241 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/242 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/242 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/243 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/243 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/244 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/244 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/245 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/245 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/246 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/246 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/247 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/247 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/248 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/248 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/249 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/249 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/250 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/250 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/251 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/251 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/252 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/252 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/253 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/253 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/254 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/254 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/255 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/255 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/256 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/256 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/257 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/257 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/258 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/258 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/259 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/259 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/260 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/260 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/261 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/261 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/262 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/262 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/263 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/263 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/264 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/264 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/265 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/265 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/266 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/266 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/267 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/267 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/268 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/268 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/269 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/269 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/270 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/270 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/271 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/271 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/272 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/272 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/273 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/273 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/274 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/274 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/275 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/275 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/276 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/276 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/277 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/277 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/278 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/278 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/279 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/279 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/280 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/280 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/281 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/281 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/282 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/282 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/283 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/283 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/284 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/284 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/285 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/285 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/286 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/286 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/287 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/287 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/288 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/288 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/289 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/289 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/290 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/290 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/291 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/291 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/292 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/292 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/293 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/293 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/294 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/294 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/295 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/295 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/296 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/296 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/297 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/297 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/298 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/298 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/299 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/299 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/300 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/300 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/301 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/301 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/302 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/302 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/303 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/303 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/304 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/304 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/305 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/305 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/306 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/306 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/307 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/307 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/308 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/308 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/309 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/309 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/310 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/310 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/311 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/311 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/312 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/312 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/313 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/313 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/314 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/314 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/315 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/315 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/316 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/316 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/317 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/317 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/318 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/318 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/319 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/319 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/320 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/320 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/321 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/321 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/322 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/322 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/323 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/323 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/324 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/324 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/325 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/325 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/326 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/326 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/327 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/327 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/328 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/328 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/329 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/329 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/330 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/330 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/331 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/331 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/332 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/332 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/333 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/333 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/334 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/334 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/335 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/335 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/336 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/336 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/337 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/337 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/338 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/338 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/339 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/339 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/340 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/340 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/341 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/341 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/342 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/342 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/343 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/343 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/344 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/344 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/345 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/345 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/346 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/346 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/347 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/347 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/348 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/348 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/349 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/349 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/350 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/350 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/351 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/351 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/352 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/352 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/353 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/353 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/354 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/354 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/355 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/355 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/356 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/356 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/357 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/357 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/358 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/358 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/359 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/359 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/360 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/360 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/361 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/361 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/362 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/362 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/363 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/363 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/364 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/364 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/365 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/365 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/366 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/366 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/367 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/367 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/368 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/368 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/369 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/369 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/370 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/370 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/371 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/371 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/372 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/372 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/373 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/373 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/374 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/374 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/375 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/375 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/376 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/376 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/377 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/377 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/378 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/378 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/379 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/379 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/380 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/380 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/381 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/381 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/382 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/382 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/383 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/383 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/384 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/384 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/385 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/385 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/386 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/386 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/387 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/387 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/388 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/388 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/389 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/389 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/390 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/390 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/391 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/391 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/392 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/392 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/393 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/393 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/394 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/394 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/395 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/395 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/396 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/396 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/397 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/397 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/398 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/398 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/399 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/399 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/400 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/400 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/401 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/401 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/402 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/402 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/403 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/403 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/404 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/404 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/405 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/405 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/406 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/406 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/407 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/407 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/408 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/408 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/409 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/409 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/410 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/410 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/411 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/411 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/412 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/412 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/413 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/413 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/414 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/414 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/415 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/415 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/416 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/416 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/417 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/417 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/418 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/418 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/419 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/419 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/420 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/420 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/421 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/421 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/422 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/422 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/423 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/423 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/424 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/424 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/425 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/425 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/426 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/426 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/427 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/427 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/428 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/428 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/429 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/429 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/430 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/430 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/431 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/431 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/432 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/432 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/433 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/433 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/434 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/434 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/435 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/435 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/436 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/436 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/437 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/437 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/438 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/438 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/439 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/439 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/440 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/440 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/441 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/441 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/442 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/442 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/443 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/443 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/444 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/444 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/445 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/445 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/446 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/446 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/447 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/447 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/448 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/448 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/449 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/449 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/450 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/450 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/451 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/451 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/452 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/452 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/453 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/453 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/454 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/454 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/455 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/455 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/456 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/456 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/457 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/457 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/458 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/458 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/459 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/459 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/460 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/460 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/461 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/461 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/462 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/462 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/463 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/463 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/464 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/464 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/465 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/465 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/466 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/466 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/467 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/467 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/468 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/468 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/469 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/469 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/470 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/470 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/471 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/471 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/472 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/472 (1 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/473 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/473 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/474 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/474 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/475 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/475 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/476 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/476 (2 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/477 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/477 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/478 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/478 (0 ms) [ RUN ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/479 [ OK ] WycheproofP521EcdhTest/Pkcs11EcdhTest.TestVectors/479 (0 ms) [----------] 480 tests from WycheproofP521EcdhTest/Pkcs11EcdhTest (377 ms total) [----------] 9 tests from EncryptDeriveTests/EncryptDeriveTest [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/0 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/0 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/1 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/1 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/2 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/2 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/3 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/3 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/4 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/4 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/5 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/5 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/6 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/6 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/7 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/7 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/8 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/8 (0 ms) [----------] 9 tests from EncryptDeriveTests/EncryptDeriveTest (0 ms total) [----------] 2 tests from Encrypt3DeriveTests/EncryptDerive3Test [ RUN ] Encrypt3DeriveTests/EncryptDerive3Test.Test/0 [ OK ] Encrypt3DeriveTests/EncryptDerive3Test.Test/0 (0 ms) [ RUN ] Encrypt3DeriveTests/EncryptDerive3Test.Test/1 [ OK ] Encrypt3DeriveTests/EncryptDerive3Test.Test/1 (0 ms) [----------] 2 tests from Encrypt3DeriveTests/EncryptDerive3Test (0 ms total) [----------] 636 tests from HkdfSha1/Pkcs11HkdfTest [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/99 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/120 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/121 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/122 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/123 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/124 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/125 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/144 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/147 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/156 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/204 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/253 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/300 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/318 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/319 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/320 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/321 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/322 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/323 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/346 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/362 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/365 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/405 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/453 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/501 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/516 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/517 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/518 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/519 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/520 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/521 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/547 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/560 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/563 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/570 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/605 (1 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/612 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/612 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/613 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/613 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/614 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/614 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/615 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/615 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/616 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/616 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/617 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/617 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/618 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/618 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/619 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/619 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/620 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/620 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/621 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/621 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/622 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/622 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/623 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/623 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/624 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/624 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/625 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/625 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/626 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/626 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/627 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/627 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/628 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/628 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/629 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/629 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/630 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/630 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/631 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/631 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/632 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/632 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/633 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/633 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/634 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/634 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/635 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/635 (0 ms) [----------] 636 tests from HkdfSha1/Pkcs11HkdfTest (19 ms total) [----------] 630 tests from HkdfSha256/Pkcs11HkdfTest [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/14 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/105 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/120 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/121 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/122 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/123 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/124 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/125 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/138 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/140 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/141 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/143 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/182 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/229 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/274 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/318 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/319 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/320 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/321 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/322 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/323 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/337 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/338 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/340 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/346 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/350 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/396 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/441 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/485 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/516 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/517 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/518 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/519 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/520 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/521 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/528 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/552 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/554 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/556 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/557 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/570 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/603 (1 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/612 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/612 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/613 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/613 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/614 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/614 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/615 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/615 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/616 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/616 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/617 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/617 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/618 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/618 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/619 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/619 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/620 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/620 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/621 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/621 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/622 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/622 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/623 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/623 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/624 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/624 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/625 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/625 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/626 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/626 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/627 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/627 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/628 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/628 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/629 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/629 (0 ms) [----------] 630 tests from HkdfSha256/Pkcs11HkdfTest (24 ms total) [----------] 612 tests from HkdfSha384/Pkcs11HkdfTest [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/17 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/61 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/103 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/120 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/121 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/122 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/123 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/124 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/125 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/154 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/197 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/242 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/284 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/318 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/319 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/320 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/321 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/322 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/323 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/334 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/346 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/420 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/463 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/503 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/516 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/517 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/518 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/519 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/520 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/521 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/570 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/596 (1 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [----------] 612 tests from HkdfSha384/Pkcs11HkdfTest (29 ms total) [----------] 612 tests from HkdfSha512/Pkcs11HkdfTest [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/24 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/112 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/120 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/121 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/122 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/123 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/124 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/125 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/223 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/267 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/310 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/318 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/319 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/320 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/321 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/322 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/323 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/334 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/346 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/376 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/420 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/464 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/506 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/516 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/517 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/518 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/519 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/520 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/521 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/570 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/608 (1 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [----------] 612 tests from HkdfSha512/Pkcs11HkdfTest (31 ms total) [----------] 174 tests from HmacSha256/Pkcs11HmacTest [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/60 (1 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/134 (1 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha256/Pkcs11HmacTest (2 ms total) [----------] 174 tests from HmacSha384/Pkcs11HmacTest [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/95 (1 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/162 (1 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha384/Pkcs11HmacTest (3 ms total) [----------] 174 tests from HmacSha512/Pkcs11HmacTest [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/49 (1 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/113 (1 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha512/Pkcs11HmacTest (2 ms total) [----------] 12 tests from Pk11Hpke/TestVectors [ RUN ] Pk11Hpke/TestVectors.TestVectors/0 [ OK ] Pk11Hpke/TestVectors.TestVectors/0 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/1 [ OK ] Pk11Hpke/TestVectors.TestVectors/1 (1 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/2 [ OK ] Pk11Hpke/TestVectors.TestVectors/2 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/3 [ OK ] Pk11Hpke/TestVectors.TestVectors/3 (1 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/4 [ OK ] Pk11Hpke/TestVectors.TestVectors/4 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/5 [ OK ] Pk11Hpke/TestVectors.TestVectors/5 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/6 [ OK ] Pk11Hpke/TestVectors.TestVectors/6 (1 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/7 [ OK ] Pk11Hpke/TestVectors.TestVectors/7 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/8 [ OK ] Pk11Hpke/TestVectors.TestVectors/8 (1 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/9 [ OK ] Pk11Hpke/TestVectors.TestVectors/9 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/10 [ OK ] Pk11Hpke/TestVectors.TestVectors/10 (2 ms) [ RUN ] Pk11Hpke/TestVectors.TestVectors/11 [ OK ] Pk11Hpke/TestVectors.TestVectors/11 (2 ms) [----------] 12 tests from Pk11Hpke/TestVectors (20 ms total) [----------] 72 tests from Pk11Hpke/ModeParameterizedTest [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/0 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/3 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/6 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/10 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/1 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/4 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/8 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/11 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/3 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/6 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/9 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/10 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/1 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/4 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/7 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/10 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/1 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/4 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/7 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/10 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/0 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/1 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/2 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/2 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/3 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/4 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/5 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/5 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/6 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/7 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/8 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/8 (0 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/9 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/10 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/11 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/11 (0 ms) [----------] 72 tests from Pk11Hpke/ModeParameterizedTest (49 ms total) [----------] 16 tests from IkeSha1/Pkcs11IkeTest [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/10 (1 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha1/Pkcs11IkeTest (1 ms total) [----------] 16 tests from IkeSha256/Pkcs11IkeTest [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha256/Pkcs11IkeTest (0 ms total) [----------] 16 tests from IkeSha384/Pkcs11IkeTest [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha384/Pkcs11IkeTest (0 ms total) [----------] 16 tests from IkeSha512/Pkcs11IkeTest [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/3 (1 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha512/Pkcs11IkeTest (1 ms total) [----------] 16 tests from IkeAESXCBC/Pkcs11IkeTest [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeAESXCBC/Pkcs11IkeTest (0 ms total) [----------] 3 tests from Pk11KeyImportTest/Pk11KeyImportTest [ RUN ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/0 Generate RSA pair [ OK ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/0 (25 ms) [ RUN ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/1 Generate DSA pair [ OK ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/1 (133 ms) [ RUN ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/2 Generate DH pair [ OK ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/2 (288 ms) [----------] 3 tests from Pk11KeyImportTest/Pk11KeyImportTest (446 ms total) [----------] 4 tests from Pk11KeyImportTestEC/Pk11KeyImportTestEC [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/0 Generate EC pair on 208 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/0 (5 ms) [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/1 Generate EC pair on 220 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/1 (9 ms) [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/2 Generate EC pair on 221 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/2 (8 ms) [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/3 Generate EC pair on 355 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/3 (2 ms) [----------] 4 tests from Pk11KeyImportTestEC/Pk11KeyImportTestEC (25 ms total) [----------] 4 tests from Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/0 Generate EC pair on 208 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/0 (3 ms) [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/1 Generate EC pair on 220 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/1 (7 ms) [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/2 Generate EC pair on 221 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/2 (4 ms) [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/3 Generate EC pair on 355 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/3 (0 ms) [----------] 4 tests from Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest (14 ms total) [----------] 89 tests from WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 (0 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 (1 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 (0 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 (1 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/65 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/65 (6 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/66 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/66 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/67 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/67 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/68 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/68 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/69 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/69 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/70 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/70 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/71 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/71 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/72 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/72 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/73 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/73 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/74 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/74 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/75 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/75 (2 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/76 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/76 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/77 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/77 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/78 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/78 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/79 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/79 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/80 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/80 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/81 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/81 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/82 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/82 (5 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/83 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/83 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/84 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/84 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/85 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/85 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/86 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/86 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/87 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/87 (3 ms) [ RUN ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/88 [ OK ] WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/88 (3 ms) [----------] 89 tests from WycheproofRsa2048DecryptTest/RsaDecryptWycheproofTest (342 ms total) [----------] 79 tests from WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 (6 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 (1 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 (1 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 (1 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 (2 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 (13 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 (15 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 (13 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/65 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/65 (14 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/66 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/66 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/67 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/67 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/68 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/68 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/69 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/69 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/70 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/70 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/71 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/71 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/72 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/72 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/73 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/73 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/74 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/74 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/75 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/75 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/76 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/76 (8 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/77 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/77 (7 ms) [ RUN ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/78 [ OK ] WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/78 (8 ms) [----------] 79 tests from WycheproofRsa3072DecryptTest/RsaDecryptWycheproofTest (798 ms total) [----------] 65 tests from WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/0 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/1 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/2 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/3 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/4 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/5 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/6 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/7 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/8 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/9 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/10 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/11 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/12 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/13 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/14 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/15 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/16 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/17 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/18 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/19 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/20 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/21 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/22 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/23 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/24 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/25 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/26 (11 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/27 (15 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/28 (14 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/29 (2 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/30 (2 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/31 (2 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/32 (2 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/33 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/34 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/35 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/36 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/37 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/38 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/39 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/40 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/41 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/42 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/43 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/44 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/45 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/46 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/47 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/48 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/49 (26 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/50 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/51 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/52 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/53 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/54 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/55 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/56 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/57 (26 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/58 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/59 (24 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/60 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/61 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/62 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/63 (25 ms) [ RUN ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 [ OK ] WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest.Pkcs1Decrypt/64 (24 ms) [----------] 65 tests from WycheproofRsa4096DecryptTest/RsaDecryptWycheproofTest (1234 ms total) [----------] 34 tests from WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/0 (6 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/6 (2 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/16 (2 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/26 (0 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/29 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/29 (1 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/30 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/30 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/31 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/31 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/32 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/32 (3 ms) [ RUN ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/33 [ OK ] WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest.OaepDecrypt/33 (3 ms) [----------] 34 tests from WycheproofRsa2048Sha1OaepTest/RsaOaepWycheproofTest (90 ms total) [----------] 29 tests from WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 (5 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 (0 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [----------] 29 tests from WycheproofOaep2048Sha256Sha1Test/RsaOaepWycheproofTest (76 ms total) [----------] 35 tests from WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/0 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/7 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/16 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/26 (0 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/29 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/29 (1 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/30 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/30 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/31 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/31 (5 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/32 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/32 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/33 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/33 (3 ms) [ RUN ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/34 [ OK ] WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest.OaepDecrypt/34 (3 ms) [----------] 35 tests from WycheproofOaep2048Sha256Sha256Test/RsaOaepWycheproofTest (92 ms total) [----------] 29 tests from WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 (6 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 (0 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [----------] 29 tests from WycheproofOaep2048Sha384Sha1Test/RsaOaepWycheproofTest (77 ms total) [----------] 32 tests from WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/0 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/9 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/10 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/21 (2 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/22 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/25 (0 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/26 (1 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/27 (0 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/28 (1 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/29 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/29 (3 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/30 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/30 (5 ms) [ RUN ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/31 [ OK ] WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest.OaepDecrypt/31 (2 ms) [----------] 32 tests from WycheproofOaep2048Sha384Sha384Test/RsaOaepWycheproofTest (86 ms total) [----------] 29 tests from WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/0 (6 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/6 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/9 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/17 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/20 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/22 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/23 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/26 (0 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/27 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest.OaepDecrypt/28 (0 ms) [----------] 29 tests from WycheproofOaep2048Sha512Sha1Test/RsaOaepWycheproofTest (77 ms total) [----------] 31 tests from WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/0 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/0 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/1 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/1 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/2 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/2 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/3 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/3 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/4 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/4 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/5 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/5 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/6 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/6 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/7 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/7 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/8 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/8 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/9 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/9 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/10 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/10 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/11 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/11 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/12 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/12 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/13 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/13 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/14 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/14 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/15 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/15 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/16 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/16 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/17 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/17 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/18 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/18 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/19 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/19 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/20 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/20 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/21 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/21 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/22 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/22 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/23 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/23 (2 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/24 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/24 (3 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/25 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/25 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/26 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/26 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/27 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/27 (0 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/28 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/28 (1 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/29 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/29 (0 ms) [ RUN ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/30 [ OK ] WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest.OaepDecrypt/30 (3 ms) [----------] 31 tests from WycheproofOaep2048Sha512Sha512Test/RsaOaepWycheproofTest (78 ms total) [----------] 241 tests from Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/240 [ OK ] Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest.Verify/240 (0 ms) [----------] 241 tests from Wycheproof2048RsaSignatureSha224Test/Pkcs11RsaPkcs1WycheproofTest (32 ms total) [----------] 240 tests from Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (0 ms) [----------] 240 tests from Wycheproof2048RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest (32 ms total) [----------] 240 tests from Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (1 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [ RUN ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (0 ms) [----------] 240 tests from Wycheproof2048RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest (32 ms total) [----------] 239 tests from Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [----------] 239 tests from Wycheproof3072RsaSignatureSha256Test/Pkcs11RsaPkcs1WycheproofTest (60 ms total) [----------] 239 tests from Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [----------] 239 tests from Wycheproof3072RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest (62 ms total) [----------] 240 tests from Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (1 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [ RUN ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (0 ms) [----------] 240 tests from Wycheproof3072RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest (63 ms total) [----------] 239 tests from Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (1 ms) [----------] 239 tests from Wycheproof4096RsaSignatureSha384Test/Pkcs11RsaPkcs1WycheproofTest (98 ms total) [----------] 239 tests from Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (1 ms) [ RUN ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [----------] 239 tests from Wycheproof4096RsaSignatureSha512Test/Pkcs11RsaPkcs1WycheproofTest (100 ms total) [----------] 377 tests from WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/0 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/0 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/1 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/1 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/2 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/2 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/3 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/3 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/4 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/4 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/5 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/5 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/6 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/6 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/7 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/7 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/8 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/8 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/9 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/9 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/10 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/10 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/11 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/11 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/12 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/12 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/13 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/13 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/14 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/14 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/15 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/15 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/16 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/16 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/17 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/17 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/18 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/18 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/19 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/19 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/20 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/20 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/21 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/21 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/22 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/22 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/23 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/23 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/24 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/24 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/25 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/25 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/26 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/26 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/27 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/27 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/28 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/28 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/29 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/29 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/30 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/30 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/31 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/31 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/32 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/32 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/33 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/33 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/34 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/34 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/35 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/35 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/36 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/36 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/37 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/37 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/38 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/38 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/39 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/39 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/40 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/40 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/41 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/41 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/42 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/42 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/43 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/43 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/44 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/44 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/45 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/45 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/46 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/46 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/47 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/47 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/48 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/48 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/49 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/49 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/50 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/50 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/51 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/51 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/52 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/52 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/53 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/53 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/54 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/54 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/55 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/55 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/56 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/56 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/57 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/57 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/58 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/58 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/59 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/59 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/60 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/60 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/61 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/61 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/62 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/62 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/63 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/63 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/64 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/64 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/65 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/65 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/66 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/66 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/67 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/67 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/68 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/68 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/69 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/69 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/70 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/70 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/71 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/71 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/72 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/72 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/73 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/73 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/74 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/74 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/75 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/75 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/76 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/76 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/77 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/77 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/78 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/78 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/79 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/79 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/80 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/80 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/81 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/81 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/82 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/82 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/83 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/83 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/84 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/84 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/85 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/85 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/86 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/86 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/87 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/87 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/88 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/88 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/89 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/89 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/90 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/90 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/91 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/91 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/92 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/92 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/93 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/93 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/94 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/94 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/95 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/95 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/96 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/96 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/97 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/97 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/98 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/98 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/99 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/99 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/100 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/100 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/101 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/101 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/102 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/102 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/103 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/103 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/104 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/104 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/105 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/105 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/106 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/106 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/107 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/107 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/108 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/108 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/109 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/109 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/110 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/110 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/111 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/111 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/112 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/112 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/113 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/113 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/114 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/114 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/115 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/115 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/116 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/116 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/117 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/117 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/118 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/118 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/119 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/119 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/120 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/120 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/121 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/121 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/122 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/122 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/123 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/123 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/124 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/124 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/125 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/125 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/126 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/126 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/127 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/127 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/128 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/128 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/129 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/129 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/130 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/130 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/131 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/131 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/132 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/132 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/133 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/133 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/134 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/134 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/135 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/135 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/136 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/136 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/137 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/137 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/138 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/138 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/139 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/139 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/140 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/140 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/141 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/141 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/142 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/142 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/143 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/143 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/144 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/144 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/145 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/145 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/146 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/146 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/147 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/147 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/148 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/148 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/149 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/149 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/150 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/150 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/151 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/151 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/152 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/152 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/153 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/153 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/154 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/154 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/155 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/155 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/156 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/156 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/157 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/157 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/158 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/158 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/159 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/159 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/160 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/160 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/161 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/161 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/162 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/162 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/163 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/163 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/164 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/164 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/165 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/165 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/166 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/166 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/167 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/167 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/168 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/168 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/169 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/169 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/170 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/170 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/171 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/171 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/172 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/172 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/173 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/173 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/174 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/174 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/175 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/175 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/176 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/176 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/177 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/177 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/178 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/178 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/179 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/179 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/180 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/180 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/181 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/181 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/182 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/182 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/183 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/183 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/184 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/184 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/185 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/185 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/186 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/186 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/187 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/187 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/188 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/188 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/189 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/189 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/190 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/190 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/191 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/191 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/192 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/192 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/193 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/193 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/194 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/194 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/195 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/195 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/196 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/196 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/197 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/197 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/198 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/198 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/199 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/199 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/200 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/200 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/201 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/201 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/202 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/202 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/203 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/203 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/204 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/204 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/205 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/205 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/206 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/206 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/207 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/207 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/208 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/208 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/209 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/209 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/210 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/210 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/211 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/211 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/212 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/212 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/213 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/213 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/214 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/214 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/215 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/215 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/216 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/216 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/217 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/217 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/218 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/218 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/219 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/219 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/220 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/220 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/221 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/221 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/222 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/222 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/223 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/223 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/224 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/224 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/225 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/225 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/226 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/226 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/227 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/227 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/228 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/228 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/229 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/229 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/230 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/230 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/231 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/231 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/232 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/232 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/233 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/233 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/234 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/234 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/235 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/235 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/236 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/236 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/237 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/237 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/238 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/238 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/239 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/239 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/240 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/240 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/241 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/241 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/242 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/242 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/243 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/243 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/244 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/244 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/245 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/245 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/246 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/246 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/247 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/247 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/248 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/248 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/249 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/249 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/250 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/250 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/251 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/251 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/252 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/252 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/253 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/253 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/254 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/254 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/255 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/255 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/256 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/256 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/257 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/257 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/258 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/258 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/259 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/259 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/260 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/260 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/261 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/261 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/262 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/262 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/263 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/263 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/264 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/264 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/265 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/265 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/266 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/266 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/267 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/267 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/268 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/268 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/269 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/269 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/270 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/270 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/271 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/271 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/272 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/272 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/273 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/273 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/274 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/274 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/275 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/275 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/276 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/276 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/277 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/277 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/278 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/278 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/279 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/279 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/280 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/280 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/281 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/281 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/282 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/282 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/283 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/283 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/284 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/284 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/285 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/285 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/286 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/286 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/287 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/287 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/288 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/288 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/289 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/289 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/290 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/290 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/291 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/291 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/292 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/292 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/293 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/293 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/294 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/294 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/295 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/295 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/296 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/296 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/297 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/297 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/298 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/298 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/299 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/299 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/300 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/300 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/301 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/301 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/302 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/302 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/303 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/303 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/304 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/304 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/305 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/305 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/306 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/306 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/307 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/307 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/308 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/308 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/309 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/309 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/310 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/310 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/311 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/311 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/312 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/312 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/313 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/313 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/314 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/314 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/315 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/315 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/316 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/316 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/317 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/317 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/318 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/318 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/319 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/319 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/320 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/320 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/321 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/321 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/322 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/322 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/323 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/323 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/324 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/324 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/325 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/325 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/326 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/326 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/327 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/327 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/328 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/328 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/329 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/329 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/330 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/330 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/331 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/331 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/332 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/332 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/333 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/333 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/334 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/334 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/335 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/335 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/336 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/336 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/337 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/337 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/338 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/338 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/339 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/339 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/340 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/340 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/341 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/341 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/342 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/342 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/343 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/343 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/344 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/344 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/345 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/345 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/346 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/346 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/347 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/347 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/348 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/348 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/349 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/349 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/350 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/350 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/351 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/351 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/352 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/352 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/353 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/353 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/354 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/354 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/355 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/355 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/356 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/356 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/357 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/357 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/358 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/358 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/359 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/359 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/360 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/360 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/361 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/361 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/362 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/362 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/363 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/363 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/364 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/364 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/365 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/365 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/366 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/366 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/367 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/367 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/368 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/368 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/369 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/369 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/370 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/370 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/371 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/371 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/372 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/372 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/373 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/373 (1 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/374 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/374 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/375 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/375 (0 ms) [ RUN ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/376 [ OK ] WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest.Verify/376 (0 ms) [----------] 377 tests from WycheproofRsaSignatureTest/Pkcs11RsaPkcs1WycheproofTest (57 ms total) [----------] 20 tests from RsaPssSignVerify/Pkcs11RsaPssVectorTest [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/0 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/0 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/1 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/1 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/2 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/2 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/3 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/3 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/4 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/4 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/5 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/5 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/6 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/6 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/7 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/7 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/8 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/8 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/9 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/9 (1 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/0 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/0 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/1 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/1 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/2 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/2 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/3 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/3 (3 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/4 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/4 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/5 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/5 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/6 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/6 (3 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/7 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/7 (2 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/8 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/8 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/9 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/9 (8 ms) [----------] 20 tests from RsaPssSignVerify/Pkcs11RsaPssVectorTest (32 ms total) [----------] 82 tests from Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/2 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/9 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/10 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/25 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/31 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/33 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/40 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/46 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/48 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/55 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/63 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/71 (1 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [----------] 82 tests from Wycheproof2048RsaPssSha120Test/Pkcs11RsaPssTestWycheproof (10 ms total) [----------] 103 tests from Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 (1 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 (0 ms) [ RUN ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 (0 ms) [----------] 103 tests from Wycheproof2048RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof (13 ms total) [----------] 100 tests from Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/0 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/1 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/9 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/15 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/16 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/22 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/30 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/31 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/37 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/38 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/45 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/46 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/52 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/55 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/60 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/67 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/74 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/75 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/82 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/83 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/85 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/87 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/88 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/89 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/90 (1 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/92 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/94 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof.Verify/99 (0 ms) [----------] 100 tests from Wycheproof2048RsaPssSha2560Test/Pkcs11RsaPssTestWycheproof (13 ms total) [----------] 103 tests from Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 (1 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 (0 ms) [ RUN ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 (0 ms) [----------] 103 tests from Wycheproof3072RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof (25 ms total) [----------] 103 tests from Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/0 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/1 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/2 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/4 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/6 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/9 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/11 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/13 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/15 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/16 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/18 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/20 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/22 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/25 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/27 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/29 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/31 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/34 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/36 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/38 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/40 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/41 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/43 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/45 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/46 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/47 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/48 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/49 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/52 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/54 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/55 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/56 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/58 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/61 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/63 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/65 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/67 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/70 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/72 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/74 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/76 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/79 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/81 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/82 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/83 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/85 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/86 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/87 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/88 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/89 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/90 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/92 (1 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/94 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/99 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/101 (0 ms) [ RUN ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof.Verify/102 (0 ms) [----------] 103 tests from Wycheproof4096RsaPssSha25632Test/Pkcs11RsaPssTestWycheproof (43 ms total) [----------] 171 tests from Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/0 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/1 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/2 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/4 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/7 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/9 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/11 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/14 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/15 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/16 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/18 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/19 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/21 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/23 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/25 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/26 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/28 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/30 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/31 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/32 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/33 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/34 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/37 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/38 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/39 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/41 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/44 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/46 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/48 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/51 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/53 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/55 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/58 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/60 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/62 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/63 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/67 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/69 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/70 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/71 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/74 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/76 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/77 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/78 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/81 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/82 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/83 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/85 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/87 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/88 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/89 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/90 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/92 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/94 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/95 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/97 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/99 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/101 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/102 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/103 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/103 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/104 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/104 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/105 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/105 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/106 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/106 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/107 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/107 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/108 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/108 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/109 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/109 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/110 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/110 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/111 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/111 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/112 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/112 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/113 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/113 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/114 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/114 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/115 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/115 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/116 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/116 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/117 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/117 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/118 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/118 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/119 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/119 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/120 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/120 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/121 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/121 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/122 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/122 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/123 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/123 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/124 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/124 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/125 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/125 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/126 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/126 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/127 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/127 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/128 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/128 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/129 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/129 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/130 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/130 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/131 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/131 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/132 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/132 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/133 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/133 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/134 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/134 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/135 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/135 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/136 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/136 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/137 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/137 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/138 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/138 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/139 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/139 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/140 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/140 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/141 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/141 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/142 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/142 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/143 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/143 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/144 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/144 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/145 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/145 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/146 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/146 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/147 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/147 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/148 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/148 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/149 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/149 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/150 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/150 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/151 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/151 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/152 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/152 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/153 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/153 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/154 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/154 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/155 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/155 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/156 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/156 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/157 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/157 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/158 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/158 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/159 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/159 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/160 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/160 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/161 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/161 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/162 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/162 (1 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/163 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/163 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/164 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/164 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/165 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/165 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/166 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/166 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/167 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/167 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/168 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/168 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/169 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/169 (0 ms) [ RUN ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/170 [ OK ] Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof.Verify/170 (1 ms) [----------] 171 tests from Wycheproof4096RsaPssSha51232Test/Pkcs11RsaPssTestWycheproof (72 ms total) [----------] 150 tests from WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/0 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/0 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/1 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/1 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/2 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/2 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/3 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/3 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/4 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/4 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/5 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/5 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/6 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/6 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/7 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/7 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/8 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/8 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/9 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/9 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/10 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/10 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/11 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/11 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/12 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/12 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/13 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/13 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/14 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/14 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/15 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/15 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/16 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/16 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/17 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/17 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/18 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/18 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/19 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/19 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/20 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/20 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/21 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/21 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/22 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/22 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/23 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/23 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/24 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/24 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/25 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/25 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/26 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/26 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/27 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/27 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/28 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/28 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/29 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/29 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/30 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/30 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/31 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/31 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/32 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/32 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/33 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/33 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/34 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/34 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/35 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/35 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/36 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/36 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/37 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/37 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/38 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/38 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/39 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/39 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/40 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/40 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/41 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/41 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/42 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/42 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/43 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/43 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/44 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/44 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/45 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/45 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/46 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/46 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/47 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/47 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/48 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/48 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/49 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/49 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/50 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/50 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/51 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/51 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/52 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/52 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/53 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/53 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/54 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/54 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/55 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/55 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/56 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/56 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/57 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/57 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/58 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/58 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/59 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/59 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/60 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/60 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/61 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/61 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/62 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/62 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/63 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/63 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/64 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/64 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/65 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/65 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/66 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/66 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/67 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/67 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/68 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/68 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/69 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/69 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/70 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/70 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/71 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/71 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/72 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/72 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/73 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/73 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/74 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/74 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/75 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/75 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/76 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/76 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/77 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/77 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/78 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/78 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/79 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/79 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/80 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/80 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/81 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/81 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/82 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/82 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/83 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/83 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/84 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/84 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/85 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/85 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/86 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/86 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/87 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/87 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/88 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/88 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/89 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/89 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/90 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/90 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/91 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/91 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/92 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/92 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/93 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/93 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/94 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/94 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/95 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/95 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/96 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/96 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/97 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/97 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/98 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/98 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/99 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/99 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/100 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/100 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/101 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/101 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/102 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/102 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/103 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/103 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/104 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/104 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/105 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/105 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/106 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/106 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/107 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/107 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/108 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/108 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/109 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/109 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/110 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/110 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/111 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/111 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/112 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/112 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/113 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/113 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/114 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/114 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/115 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/115 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/116 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/116 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/117 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/117 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/118 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/118 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/119 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/119 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/120 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/120 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/121 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/121 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/122 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/122 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/123 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/123 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/124 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/124 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/125 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/125 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/126 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/126 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/127 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/127 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/128 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/128 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/129 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/129 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/130 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/130 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/131 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/131 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/132 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/132 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/133 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/133 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/134 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/134 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/135 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/135 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/136 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/136 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/137 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/137 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/138 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/138 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/139 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/139 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/140 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/140 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/141 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/141 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/142 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/142 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/143 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/143 (1 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/144 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/144 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/145 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/145 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/146 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/146 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/147 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/147 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/148 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/148 (0 ms) [ RUN ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/149 [ OK ] WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof.Verify/149 (0 ms) [----------] 150 tests from WycheproofRsaPssMiscTest/Pkcs11RsaPssTestWycheproof (20 ms total) [----------] Global test environment tear-down [==========] 13692 tests from 89 test suites ran. (8581 ms total) [ PASSED ] 13692 tests. gtests.sh: #10: pk11_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/pk11_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: util_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/util_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/util_gtest -n dummy -s CN=dummy -t ,, -x -m 6 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #11: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/util_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing util_gtest [==========] Running 1960 tests from 13 test suites. [----------] Global test environment set-up. [----------] 4 tests from B64EncodeDecodeTest [ RUN ] B64EncodeDecodeTest.DecEncTest [ OK ] B64EncodeDecodeTest.DecEncTest (0 ms) [ RUN ] B64EncodeDecodeTest.EncDecTest [ OK ] B64EncodeDecodeTest.EncDecTest (0 ms) [ RUN ] B64EncodeDecodeTest.FakeDecTest [ OK ] B64EncodeDecodeTest.FakeDecTest (0 ms) [ RUN ] B64EncodeDecodeTest.FakeEncDecTest [ OK ] B64EncodeDecodeTest.FakeEncDecTest (0 ms) [----------] 4 tests from B64EncodeDecodeTest (0 ms total) [----------] 4 tests from MemcmpZeroTest [ RUN ] MemcmpZeroTest.TestMemcmpZeroTrue [ OK ] MemcmpZeroTest.TestMemcmpZeroTrue (0 ms) [ RUN ] MemcmpZeroTest.TestMemcmpZeroFalse5 [ OK ] MemcmpZeroTest.TestMemcmpZeroFalse5 (0 ms) [ RUN ] MemcmpZeroTest.TestMemcmpZeroFalse37 [ OK ] MemcmpZeroTest.TestMemcmpZeroFalse37 (0 ms) [ RUN ] MemcmpZeroTest.TestMemcmpZeroFalse0 [ OK ] MemcmpZeroTest.TestMemcmpZeroFalse0 (0 ms) [----------] 4 tests from MemcmpZeroTest (0 ms total) [----------] 6 tests from PK11URITest [ RUN ] PK11URITest.CreateTest [ OK ] PK11URITest.CreateTest (0 ms) [ RUN ] PK11URITest.CreateRetrieveTest [ OK ] PK11URITest.CreateRetrieveTest (0 ms) [ RUN ] PK11URITest.CreateFormatTest [ OK ] PK11URITest.CreateFormatTest (0 ms) [ RUN ] PK11URITest.ParseTest [ OK ] PK11URITest.ParseTest (0 ms) [ RUN ] PK11URITest.ParseRetrieveTest [ OK ] PK11URITest.ParseRetrieveTest (0 ms) [ RUN ] PK11URITest.ParseFormatTest [ OK ] PK11URITest.ParseFormatTest (0 ms) [----------] 6 tests from PK11URITest (0 ms total) [----------] 4 tests from Utf8Zeroes [ RUN ] Utf8Zeroes.From32To8 [ OK ] Utf8Zeroes.From32To8 (0 ms) [ RUN ] Utf8Zeroes.From16To8 [ OK ] Utf8Zeroes.From16To8 (0 ms) [ RUN ] Utf8Zeroes.From8To32 [ OK ] Utf8Zeroes.From8To32 (0 ms) [ RUN ] Utf8Zeroes.From8To16 [ OK ] Utf8Zeroes.From8To16 (0 ms) [----------] 4 tests from Utf8Zeroes (0 ms total) [----------] 14 tests from AllAligned/AlignedMallocTest [ RUN ] AllAligned/AlignedMallocTest.TestNew/0 [ OK ] AllAligned/AlignedMallocTest.TestNew/0 (1 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/1 [ OK ] AllAligned/AlignedMallocTest.TestNew/1 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/2 [ OK ] AllAligned/AlignedMallocTest.TestNew/2 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/3 [ OK ] AllAligned/AlignedMallocTest.TestNew/3 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/4 [ OK ] AllAligned/AlignedMallocTest.TestNew/4 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/5 [ OK ] AllAligned/AlignedMallocTest.TestNew/5 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/6 [ OK ] AllAligned/AlignedMallocTest.TestNew/6 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/0 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/0 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/1 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/1 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/2 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/2 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/3 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/3 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/4 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/4 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/5 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/5 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/6 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/6 (0 ms) [----------] 14 tests from AllAligned/AlignedMallocTest (1 ms total) [----------] 10 tests from AllAlignedBadSize/AlignedMallocTestBadSize [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/0 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/0 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/1 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/1 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/2 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/2 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/3 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/3 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/4 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/4 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/0 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/0 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/1 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/1 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/2 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/2 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/3 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/3 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/4 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/4 (0 ms) [----------] 10 tests from AllAlignedBadSize/AlignedMallocTestBadSize (0 ms total) [----------] 678 tests from Ucs4TestCases/Ucs4Test [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/0 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/0 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/1 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/1 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/2 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/2 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/3 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/3 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/4 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/4 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/5 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/5 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/6 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/6 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/7 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/7 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/8 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/8 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/9 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/9 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/10 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/10 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/11 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/11 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/12 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/12 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/13 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/13 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/14 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/14 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/15 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/15 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/16 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/16 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/17 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/17 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/18 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/18 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/19 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/19 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/20 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/20 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/21 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/21 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/22 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/22 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/23 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/23 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/24 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/24 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/25 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/25 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/26 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/26 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/27 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/27 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/28 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/28 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/29 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/29 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/30 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/30 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/31 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/31 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/32 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/32 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/33 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/33 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/34 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/34 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/35 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/35 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/36 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/36 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/37 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/37 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/38 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/38 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/39 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/39 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/40 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/40 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/41 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/41 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/42 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/42 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/43 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/43 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/44 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/44 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/45 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/45 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/46 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/46 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/47 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/47 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/48 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/48 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/49 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/49 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/50 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/50 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/51 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/51 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/52 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/52 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/53 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/53 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/54 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/54 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/55 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/55 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/56 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/56 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/57 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/57 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/58 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/58 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/59 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/59 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/60 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/60 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/61 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/61 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/62 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/62 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/63 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/63 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/64 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/64 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/65 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/65 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/66 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/66 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/67 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/67 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/68 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/68 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/69 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/69 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/70 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/70 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/71 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/71 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/72 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/72 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/73 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/73 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/74 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/74 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/75 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/75 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/76 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/76 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/77 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/77 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/78 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/78 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/79 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/79 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/80 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/80 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/81 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/81 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/82 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/82 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/83 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/83 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/84 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/84 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/85 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/85 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/86 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/86 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/87 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/87 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/88 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/88 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/89 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/89 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/90 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/90 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/91 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/91 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/92 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/92 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/93 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/93 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/94 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/94 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/95 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/95 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/96 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/96 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/97 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/97 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/98 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/98 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/99 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/99 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/100 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/100 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/101 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/101 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/102 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/102 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/103 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/103 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/104 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/104 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/105 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/105 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/106 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/106 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/107 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/107 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/108 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/108 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/109 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/109 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/110 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/110 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/111 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/111 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/112 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/112 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/113 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/113 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/114 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/114 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/115 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/115 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/116 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/116 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/117 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/117 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/118 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/118 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/119 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/119 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/120 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/120 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/121 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/121 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/122 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/122 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/123 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/123 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/124 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/124 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/125 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/125 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/126 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/126 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/127 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/127 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/128 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/128 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/129 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/129 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/130 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/130 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/131 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/131 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/132 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/132 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/133 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/133 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/134 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/134 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/135 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/135 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/136 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/136 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/137 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/137 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/138 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/138 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/139 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/139 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/140 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/140 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/141 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/141 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/142 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/142 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/143 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/143 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/144 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/144 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/145 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/145 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/146 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/146 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/147 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/147 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/148 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/148 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/149 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/149 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/150 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/150 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/151 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/151 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/152 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/152 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/153 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/153 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/154 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/154 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/155 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/155 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/156 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/156 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/157 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/157 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/158 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/158 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/159 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/159 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/160 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/160 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/161 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/161 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/162 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/162 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/163 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/163 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/164 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/164 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/165 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/165 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/166 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/166 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/167 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/167 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/168 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/168 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/169 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/169 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/170 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/170 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/171 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/171 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/172 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/172 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/173 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/173 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/174 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/174 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/175 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/175 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/176 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/176 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/177 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/177 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/178 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/178 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/179 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/179 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/180 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/180 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/181 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/181 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/182 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/182 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/183 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/183 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/184 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/184 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/185 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/185 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/186 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/186 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/187 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/187 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/188 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/188 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/189 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/189 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/190 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/190 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/191 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/191 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/192 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/192 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/193 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/193 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/194 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/194 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/195 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/195 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/196 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/196 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/197 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/197 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/198 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/198 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/199 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/199 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/200 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/200 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/201 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/201 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/202 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/202 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/203 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/203 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/204 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/204 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/205 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/205 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/206 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/206 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/207 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/207 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/208 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/208 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/209 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/209 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/210 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/210 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/211 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/211 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/212 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/212 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/213 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/213 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/214 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/214 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/215 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/215 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/216 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/216 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/217 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/217 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/218 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/218 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/219 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/219 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/220 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/220 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/221 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/221 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/222 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/222 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/223 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/223 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/224 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/224 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/225 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/225 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/0 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/0 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/1 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/1 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/2 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/2 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/3 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/3 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/4 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/4 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/5 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/5 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/6 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/6 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/7 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/7 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/8 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/8 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/9 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/9 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/10 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/10 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/11 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/11 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/12 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/12 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/13 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/13 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/14 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/14 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/15 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/15 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/16 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/16 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/17 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/17 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/18 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/18 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/19 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/19 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/20 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/20 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/21 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/21 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/22 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/22 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/23 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/23 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/24 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/24 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/25 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/25 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/26 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/26 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/27 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/27 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/28 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/28 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/29 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/29 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/30 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/30 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/31 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/31 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/32 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/32 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/33 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/33 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/34 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/34 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/35 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/35 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/36 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/36 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/37 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/37 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/38 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/38 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/39 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/39 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/40 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/40 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/41 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/41 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/42 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/42 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/43 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/43 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/44 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/44 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/45 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/45 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/46 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/46 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/47 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/47 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/48 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/48 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/49 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/49 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/50 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/50 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/51 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/51 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/52 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/52 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/53 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/53 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/54 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/54 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/55 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/55 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/56 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/56 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/57 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/57 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/58 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/58 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/59 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/59 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/60 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/60 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/61 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/61 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/62 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/62 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/63 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/63 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/64 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/64 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/65 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/65 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/66 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/66 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/67 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/67 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/68 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/68 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/69 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/69 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/70 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/70 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/71 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/71 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/72 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/72 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/73 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/73 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/74 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/74 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/75 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/75 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/76 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/76 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/77 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/77 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/78 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/78 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/79 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/79 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/80 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/80 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/81 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/81 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/82 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/82 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/83 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/83 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/84 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/84 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/85 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/85 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/86 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/86 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/87 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/87 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/88 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/88 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/89 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/89 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/90 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/90 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/91 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/91 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/92 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/92 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/93 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/93 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/94 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/94 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/95 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/95 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/96 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/96 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/97 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/97 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/98 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/98 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/99 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/99 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/100 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/100 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/101 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/101 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/102 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/102 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/103 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/103 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/104 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/104 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/105 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/105 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/106 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/106 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/107 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/107 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/108 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/108 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/109 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/109 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/110 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/110 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/111 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/111 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/112 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/112 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/113 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/113 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/114 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/114 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/115 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/115 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/116 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/116 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/117 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/117 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/118 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/118 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/119 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/119 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/120 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/120 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/121 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/121 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/122 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/122 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/123 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/123 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/124 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/124 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/125 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/125 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/126 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/126 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/127 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/127 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/128 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/128 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/129 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/129 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/130 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/130 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/131 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/131 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/132 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/132 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/133 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/133 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/134 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/134 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/135 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/135 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/136 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/136 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/137 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/137 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/138 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/138 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/139 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/139 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/140 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/140 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/141 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/141 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/142 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/142 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/143 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/143 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/144 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/144 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/145 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/145 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/146 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/146 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/147 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/147 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/148 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/148 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/149 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/149 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/150 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/150 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/151 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/151 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/152 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/152 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/153 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/153 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/154 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/154 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/155 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/155 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/156 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/156 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/157 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/157 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/158 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/158 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/159 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/159 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/160 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/160 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/161 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/161 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/162 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/162 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/163 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/163 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/164 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/164 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/165 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/165 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/166 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/166 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/167 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/167 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/168 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/168 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/169 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/169 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/170 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/170 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/171 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/171 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/172 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/172 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/173 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/173 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/174 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/174 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/175 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/175 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/176 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/176 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/177 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/177 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/178 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/178 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/179 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/179 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/180 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/180 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/181 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/181 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/182 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/182 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/183 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/183 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/184 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/184 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/185 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/185 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/186 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/186 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/187 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/187 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/188 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/188 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/189 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/189 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/190 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/190 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/191 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/191 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/192 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/192 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/193 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/193 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/194 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/194 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/195 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/195 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/196 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/196 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/197 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/197 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/198 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/198 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/199 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/199 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/200 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/200 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/201 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/201 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/202 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/202 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/203 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/203 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/204 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/204 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/205 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/205 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/206 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/206 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/207 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/207 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/208 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/208 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/209 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/209 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/210 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/210 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/211 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/211 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/212 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/212 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/213 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/213 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/214 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/214 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/215 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/215 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/216 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/216 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/217 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/217 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/218 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/218 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/219 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/219 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/220 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/220 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/221 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/221 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/222 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/222 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/223 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/223 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/224 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/224 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/225 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/225 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/0 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/0 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/1 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/1 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/2 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/2 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/3 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/3 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/4 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/4 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/5 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/5 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/6 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/6 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/7 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/7 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/8 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/8 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/9 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/9 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/10 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/10 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/11 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/11 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/12 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/12 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/13 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/13 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/14 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/14 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/15 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/15 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/16 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/16 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/17 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/17 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/18 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/18 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/19 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/19 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/20 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/20 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/21 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/21 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/22 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/22 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/23 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/23 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/24 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/24 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/25 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/25 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/26 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/26 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/27 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/27 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/28 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/28 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/29 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/29 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/30 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/30 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/31 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/31 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/32 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/32 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/33 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/33 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/34 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/34 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/35 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/35 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/36 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/36 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/37 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/37 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/38 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/38 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/39 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/39 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/40 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/40 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/41 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/41 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/42 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/42 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/43 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/43 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/44 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/44 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/45 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/45 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/46 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/46 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/47 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/47 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/48 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/48 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/49 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/49 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/50 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/50 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/51 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/51 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/52 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/52 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/53 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/53 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/54 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/54 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/55 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/55 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/56 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/56 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/57 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/57 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/58 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/58 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/59 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/59 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/60 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/60 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/61 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/61 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/62 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/62 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/63 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/63 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/64 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/64 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/65 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/65 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/66 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/66 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/67 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/67 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/68 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/68 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/69 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/69 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/70 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/70 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/71 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/71 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/72 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/72 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/73 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/73 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/74 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/74 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/75 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/75 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/76 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/76 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/77 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/77 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/78 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/78 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/79 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/79 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/80 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/80 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/81 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/81 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/82 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/82 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/83 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/83 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/84 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/84 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/85 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/85 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/86 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/86 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/87 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/87 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/88 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/88 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/89 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/89 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/90 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/90 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/91 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/91 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/92 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/92 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/93 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/93 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/94 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/94 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/95 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/95 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/96 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/96 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/97 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/97 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/98 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/98 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/99 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/99 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/100 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/100 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/101 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/101 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/102 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/102 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/103 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/103 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/104 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/104 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/105 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/105 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/106 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/106 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/107 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/107 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/108 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/108 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/109 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/109 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/110 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/110 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/111 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/111 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/112 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/112 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/113 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/113 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/114 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/114 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/115 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/115 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/116 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/116 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/117 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/117 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/118 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/118 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/119 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/119 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/120 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/120 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/121 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/121 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/122 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/122 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/123 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/123 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/124 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/124 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/125 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/125 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/126 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/126 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/127 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/127 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/128 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/128 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/129 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/129 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/130 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/130 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/131 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/131 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/132 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/132 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/133 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/133 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/134 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/134 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/135 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/135 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/136 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/136 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/137 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/137 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/138 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/138 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/139 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/139 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/140 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/140 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/141 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/141 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/142 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/142 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/143 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/143 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/144 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/144 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/145 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/145 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/146 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/146 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/147 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/147 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/148 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/148 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/149 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/149 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/150 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/150 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/151 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/151 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/152 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/152 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/153 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/153 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/154 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/154 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/155 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/155 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/156 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/156 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/157 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/157 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/158 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/158 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/159 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/159 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/160 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/160 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/161 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/161 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/162 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/162 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/163 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/163 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/164 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/164 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/165 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/165 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/166 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/166 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/167 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/167 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/168 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/168 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/169 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/169 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/170 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/170 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/171 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/171 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/172 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/172 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/173 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/173 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/174 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/174 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/175 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/175 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/176 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/176 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/177 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/177 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/178 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/178 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/179 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/179 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/180 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/180 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/181 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/181 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/182 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/182 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/183 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/183 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/184 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/184 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/185 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/185 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/186 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/186 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/187 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/187 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/188 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/188 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/189 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/189 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/190 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/190 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/191 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/191 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/192 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/192 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/193 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/193 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/194 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/194 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/195 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/195 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/196 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/196 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/197 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/197 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/198 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/198 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/199 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/199 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/200 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/200 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/201 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/201 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/202 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/202 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/203 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/203 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/204 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/204 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/205 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/205 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/206 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/206 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/207 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/207 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/208 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/208 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/209 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/209 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/210 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/210 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/211 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/211 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/212 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/212 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/213 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/213 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/214 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/214 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/215 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/215 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/216 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/216 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/217 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/217 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/218 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/218 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/219 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/219 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/220 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/220 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/221 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/221 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/222 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/222 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/223 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/223 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/224 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/224 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/225 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/225 (0 ms) [----------] 678 tests from Ucs4TestCases/Ucs4Test (1 ms total) [----------] 66 tests from Iso88591TestCases/Ucs2Test [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/0 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/0 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/1 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/1 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/2 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/2 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/3 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/3 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/4 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/4 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/5 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/5 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/6 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/6 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/7 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/7 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/8 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/8 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/9 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/9 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/10 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/10 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/11 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/11 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/12 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/12 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/13 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/13 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/14 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/14 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/15 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/15 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/16 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/16 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/17 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/17 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/18 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/18 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/19 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/19 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/20 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/20 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/21 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/21 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/0 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/0 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/1 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/1 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/2 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/2 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/3 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/3 (1 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/4 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/4 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/5 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/5 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/6 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/6 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/7 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/7 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/8 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/8 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/9 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/9 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/10 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/10 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/11 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/11 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/12 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/12 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/13 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/13 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/14 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/14 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/15 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/15 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/16 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/16 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/17 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/17 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/18 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/18 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/19 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/19 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/20 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/20 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/21 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/21 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/0 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/0 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/1 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/1 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/2 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/2 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/3 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/3 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/4 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/4 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/5 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/5 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/6 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/6 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/7 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/7 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/8 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/8 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/9 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/9 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/10 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/10 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/11 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/11 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/12 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/12 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/13 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/13 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/14 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/14 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/15 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/15 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/16 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/16 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/17 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/17 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/18 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/18 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/19 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/19 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/20 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/20 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/21 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/21 (0 ms) [----------] 66 tests from Iso88591TestCases/Ucs2Test (1 ms total) [----------] 327 tests from Ucs2TestCases/Ucs2Test [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/0 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/0 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/1 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/1 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/2 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/2 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/3 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/3 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/4 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/4 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/5 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/5 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/6 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/6 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/7 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/7 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/8 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/8 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/9 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/9 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/10 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/10 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/11 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/11 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/12 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/12 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/13 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/13 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/14 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/14 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/15 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/15 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/16 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/16 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/17 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/17 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/18 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/18 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/19 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/19 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/20 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/20 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/21 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/21 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/22 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/22 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/23 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/23 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/24 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/24 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/25 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/25 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/26 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/26 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/27 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/27 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/28 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/28 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/29 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/29 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/30 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/30 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/31 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/31 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/32 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/32 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/33 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/33 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/34 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/34 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/35 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/35 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/36 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/36 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/37 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/37 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/38 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/38 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/39 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/39 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/40 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/40 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/41 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/41 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/42 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/42 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/43 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/43 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/44 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/44 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/45 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/45 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/46 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/46 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/47 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/47 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/48 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/48 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/49 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/49 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/50 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/50 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/51 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/51 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/52 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/52 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/53 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/53 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/54 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/54 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/55 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/55 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/56 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/56 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/57 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/57 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/58 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/58 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/59 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/59 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/60 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/60 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/61 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/61 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/62 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/62 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/63 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/63 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/64 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/64 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/65 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/65 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/66 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/66 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/67 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/67 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/68 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/68 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/69 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/69 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/70 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/70 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/71 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/71 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/72 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/72 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/73 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/73 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/74 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/74 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/75 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/75 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/76 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/76 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/77 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/77 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/78 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/78 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/79 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/79 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/80 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/80 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/81 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/81 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/82 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/82 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/83 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/83 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/84 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/84 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/85 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/85 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/86 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/86 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/87 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/87 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/88 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/88 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/89 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/89 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/90 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/90 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/91 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/91 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/92 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/92 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/93 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/93 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/94 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/94 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/95 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/95 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/96 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/96 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/97 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/97 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/98 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/98 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/99 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/99 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/100 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/100 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/101 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/101 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/102 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/102 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/103 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/103 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/104 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/104 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/105 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/105 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/106 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/106 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/107 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/107 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/108 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/108 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/0 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/0 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/1 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/1 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/2 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/2 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/3 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/3 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/4 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/4 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/5 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/5 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/6 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/6 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/7 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/7 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/8 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/8 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/9 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/9 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/10 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/10 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/11 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/11 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/12 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/12 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/13 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/13 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/14 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/14 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/15 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/15 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/16 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/16 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/17 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/17 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/18 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/18 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/19 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/19 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/20 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/20 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/21 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/21 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/22 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/22 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/23 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/23 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/24 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/24 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/25 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/25 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/26 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/26 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/27 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/27 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/28 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/28 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/29 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/29 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/30 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/30 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/31 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/31 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/32 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/32 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/33 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/33 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/34 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/34 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/35 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/35 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/36 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/36 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/37 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/37 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/38 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/38 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/39 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/39 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/40 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/40 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/41 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/41 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/42 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/42 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/43 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/43 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/44 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/44 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/45 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/45 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/46 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/46 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/47 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/47 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/48 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/48 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/49 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/49 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/50 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/50 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/51 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/51 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/52 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/52 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/53 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/53 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/54 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/54 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/55 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/55 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/56 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/56 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/57 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/57 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/58 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/58 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/59 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/59 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/60 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/60 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/61 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/61 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/62 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/62 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/63 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/63 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/64 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/64 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/65 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/65 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/66 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/66 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/67 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/67 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/68 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/68 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/69 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/69 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/70 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/70 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/71 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/71 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/72 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/72 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/73 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/73 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/74 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/74 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/75 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/75 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/76 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/76 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/77 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/77 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/78 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/78 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/79 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/79 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/80 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/80 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/81 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/81 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/82 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/82 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/83 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/83 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/84 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/84 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/85 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/85 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/86 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/86 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/87 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/87 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/88 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/88 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/89 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/89 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/90 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/90 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/91 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/91 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/92 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/92 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/93 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/93 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/94 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/94 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/95 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/95 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/96 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/96 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/97 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/97 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/98 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/98 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/99 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/99 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/100 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/100 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/101 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/101 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/102 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/102 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/103 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/103 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/104 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/104 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/105 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/105 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/106 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/106 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/107 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/107 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/108 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/108 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/0 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/0 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/1 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/1 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/2 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/2 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/3 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/3 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/4 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/4 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/5 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/5 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/6 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/6 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/7 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/7 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/8 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/8 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/9 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/9 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/10 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/10 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/11 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/11 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/12 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/12 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/13 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/13 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/14 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/14 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/15 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/15 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/16 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/16 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/17 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/17 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/18 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/18 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/19 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/19 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/20 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/20 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/21 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/21 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/22 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/22 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/23 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/23 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/24 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/24 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/25 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/25 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/26 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/26 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/27 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/27 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/28 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/28 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/29 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/29 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/30 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/30 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/31 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/31 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/32 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/32 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/33 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/33 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/34 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/34 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/35 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/35 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/36 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/36 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/37 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/37 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/38 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/38 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/39 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/39 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/40 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/40 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/41 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/41 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/42 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/42 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/43 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/43 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/44 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/44 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/45 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/45 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/46 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/46 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/47 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/47 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/48 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/48 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/49 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/49 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/50 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/50 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/51 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/51 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/52 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/52 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/53 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/53 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/54 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/54 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/55 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/55 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/56 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/56 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/57 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/57 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/58 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/58 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/59 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/59 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/60 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/60 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/61 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/61 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/62 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/62 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/63 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/63 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/64 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/64 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/65 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/65 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/66 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/66 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/67 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/67 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/68 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/68 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/69 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/69 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/70 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/70 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/71 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/71 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/72 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/72 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/73 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/73 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/74 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/74 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/75 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/75 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/76 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/76 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/77 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/77 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/78 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/78 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/79 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/79 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/80 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/80 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/81 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/81 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/82 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/82 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/83 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/83 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/84 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/84 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/85 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/85 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/86 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/86 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/87 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/87 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/88 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/88 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/89 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/89 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/90 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/90 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/91 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/91 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/92 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/92 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/93 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/93 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/94 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/94 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/95 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/95 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/96 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/96 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/97 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/97 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/98 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/98 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/99 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/99 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/100 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/100 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/101 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/101 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/102 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/102 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/103 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/103 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/104 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/104 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/105 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/105 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/106 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/106 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/107 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/107 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/108 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/108 (0 ms) [----------] 327 tests from Ucs2TestCases/Ucs2Test (0 ms total) [----------] 738 tests from Utf16TestCases/Utf16Test [ RUN ] Utf16TestCases/Utf16Test.From16To32/0 [ OK ] Utf16TestCases/Utf16Test.From16To32/0 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/1 [ OK ] Utf16TestCases/Utf16Test.From16To32/1 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/2 [ OK ] Utf16TestCases/Utf16Test.From16To32/2 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/3 [ OK ] Utf16TestCases/Utf16Test.From16To32/3 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/4 [ OK ] Utf16TestCases/Utf16Test.From16To32/4 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/5 [ OK ] Utf16TestCases/Utf16Test.From16To32/5 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/6 [ OK ] Utf16TestCases/Utf16Test.From16To32/6 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/7 [ OK ] Utf16TestCases/Utf16Test.From16To32/7 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/8 [ OK ] Utf16TestCases/Utf16Test.From16To32/8 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/9 [ OK ] Utf16TestCases/Utf16Test.From16To32/9 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/10 [ OK ] Utf16TestCases/Utf16Test.From16To32/10 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/11 [ OK ] Utf16TestCases/Utf16Test.From16To32/11 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/12 [ OK ] Utf16TestCases/Utf16Test.From16To32/12 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/13 [ OK ] Utf16TestCases/Utf16Test.From16To32/13 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/14 [ OK ] Utf16TestCases/Utf16Test.From16To32/14 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/15 [ OK ] Utf16TestCases/Utf16Test.From16To32/15 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/16 [ OK ] Utf16TestCases/Utf16Test.From16To32/16 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/17 [ OK ] Utf16TestCases/Utf16Test.From16To32/17 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/18 [ OK ] Utf16TestCases/Utf16Test.From16To32/18 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/19 [ OK ] Utf16TestCases/Utf16Test.From16To32/19 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/20 [ OK ] Utf16TestCases/Utf16Test.From16To32/20 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/21 [ OK ] Utf16TestCases/Utf16Test.From16To32/21 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/22 [ OK ] Utf16TestCases/Utf16Test.From16To32/22 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/23 [ OK ] Utf16TestCases/Utf16Test.From16To32/23 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/24 [ OK ] Utf16TestCases/Utf16Test.From16To32/24 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/25 [ OK ] Utf16TestCases/Utf16Test.From16To32/25 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/26 [ OK ] Utf16TestCases/Utf16Test.From16To32/26 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/27 [ OK ] Utf16TestCases/Utf16Test.From16To32/27 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/28 [ OK ] Utf16TestCases/Utf16Test.From16To32/28 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/29 [ OK ] Utf16TestCases/Utf16Test.From16To32/29 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/30 [ OK ] Utf16TestCases/Utf16Test.From16To32/30 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/31 [ OK ] Utf16TestCases/Utf16Test.From16To32/31 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/32 [ OK ] Utf16TestCases/Utf16Test.From16To32/32 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/33 [ OK ] Utf16TestCases/Utf16Test.From16To32/33 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/34 [ OK ] Utf16TestCases/Utf16Test.From16To32/34 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/35 [ OK ] Utf16TestCases/Utf16Test.From16To32/35 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/36 [ OK ] Utf16TestCases/Utf16Test.From16To32/36 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/37 [ OK ] Utf16TestCases/Utf16Test.From16To32/37 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/38 [ OK ] Utf16TestCases/Utf16Test.From16To32/38 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/39 [ OK ] Utf16TestCases/Utf16Test.From16To32/39 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/40 [ OK ] Utf16TestCases/Utf16Test.From16To32/40 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/41 [ OK ] Utf16TestCases/Utf16Test.From16To32/41 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/42 [ OK ] Utf16TestCases/Utf16Test.From16To32/42 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/43 [ OK ] Utf16TestCases/Utf16Test.From16To32/43 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/44 [ OK ] Utf16TestCases/Utf16Test.From16To32/44 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/45 [ OK ] Utf16TestCases/Utf16Test.From16To32/45 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/46 [ OK ] Utf16TestCases/Utf16Test.From16To32/46 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/47 [ OK ] Utf16TestCases/Utf16Test.From16To32/47 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/48 [ OK ] Utf16TestCases/Utf16Test.From16To32/48 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/49 [ OK ] Utf16TestCases/Utf16Test.From16To32/49 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/50 [ OK ] Utf16TestCases/Utf16Test.From16To32/50 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/51 [ OK ] Utf16TestCases/Utf16Test.From16To32/51 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/52 [ OK ] Utf16TestCases/Utf16Test.From16To32/52 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/53 [ OK ] Utf16TestCases/Utf16Test.From16To32/53 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/54 [ OK ] Utf16TestCases/Utf16Test.From16To32/54 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/55 [ OK ] Utf16TestCases/Utf16Test.From16To32/55 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/56 [ OK ] Utf16TestCases/Utf16Test.From16To32/56 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/57 [ OK ] Utf16TestCases/Utf16Test.From16To32/57 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/58 [ OK ] Utf16TestCases/Utf16Test.From16To32/58 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/59 [ OK ] Utf16TestCases/Utf16Test.From16To32/59 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/60 [ OK ] Utf16TestCases/Utf16Test.From16To32/60 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/61 [ OK ] Utf16TestCases/Utf16Test.From16To32/61 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/62 [ OK ] Utf16TestCases/Utf16Test.From16To32/62 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/63 [ OK ] Utf16TestCases/Utf16Test.From16To32/63 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/64 [ OK ] Utf16TestCases/Utf16Test.From16To32/64 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/65 [ OK ] Utf16TestCases/Utf16Test.From16To32/65 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/66 [ OK ] Utf16TestCases/Utf16Test.From16To32/66 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/67 [ OK ] Utf16TestCases/Utf16Test.From16To32/67 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/68 [ OK ] Utf16TestCases/Utf16Test.From16To32/68 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/69 [ OK ] Utf16TestCases/Utf16Test.From16To32/69 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/70 [ OK ] Utf16TestCases/Utf16Test.From16To32/70 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/71 [ OK ] Utf16TestCases/Utf16Test.From16To32/71 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/72 [ OK ] Utf16TestCases/Utf16Test.From16To32/72 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/73 [ OK ] Utf16TestCases/Utf16Test.From16To32/73 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/74 [ OK ] Utf16TestCases/Utf16Test.From16To32/74 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/75 [ OK ] Utf16TestCases/Utf16Test.From16To32/75 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/76 [ OK ] Utf16TestCases/Utf16Test.From16To32/76 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/77 [ OK ] Utf16TestCases/Utf16Test.From16To32/77 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/78 [ OK ] Utf16TestCases/Utf16Test.From16To32/78 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/79 [ OK ] Utf16TestCases/Utf16Test.From16To32/79 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/80 [ OK ] Utf16TestCases/Utf16Test.From16To32/80 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/81 [ OK ] Utf16TestCases/Utf16Test.From16To32/81 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/82 [ OK ] Utf16TestCases/Utf16Test.From16To32/82 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/83 [ OK ] Utf16TestCases/Utf16Test.From16To32/83 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/84 [ OK ] Utf16TestCases/Utf16Test.From16To32/84 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/85 [ OK ] Utf16TestCases/Utf16Test.From16To32/85 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/86 [ OK ] Utf16TestCases/Utf16Test.From16To32/86 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/87 [ OK ] Utf16TestCases/Utf16Test.From16To32/87 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/88 [ OK ] Utf16TestCases/Utf16Test.From16To32/88 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/89 [ OK ] Utf16TestCases/Utf16Test.From16To32/89 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/90 [ OK ] Utf16TestCases/Utf16Test.From16To32/90 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/91 [ OK ] Utf16TestCases/Utf16Test.From16To32/91 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/92 [ OK ] Utf16TestCases/Utf16Test.From16To32/92 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/93 [ OK ] Utf16TestCases/Utf16Test.From16To32/93 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/94 [ OK ] Utf16TestCases/Utf16Test.From16To32/94 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/95 [ OK ] Utf16TestCases/Utf16Test.From16To32/95 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/96 [ OK ] Utf16TestCases/Utf16Test.From16To32/96 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/97 [ OK ] Utf16TestCases/Utf16Test.From16To32/97 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/98 [ OK ] Utf16TestCases/Utf16Test.From16To32/98 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/99 [ OK ] Utf16TestCases/Utf16Test.From16To32/99 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/100 [ OK ] Utf16TestCases/Utf16Test.From16To32/100 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/101 [ OK ] Utf16TestCases/Utf16Test.From16To32/101 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/102 [ OK ] Utf16TestCases/Utf16Test.From16To32/102 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/103 [ OK ] Utf16TestCases/Utf16Test.From16To32/103 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/104 [ OK ] Utf16TestCases/Utf16Test.From16To32/104 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/105 [ OK ] Utf16TestCases/Utf16Test.From16To32/105 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/106 [ OK ] Utf16TestCases/Utf16Test.From16To32/106 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/107 [ OK ] Utf16TestCases/Utf16Test.From16To32/107 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/108 [ OK ] Utf16TestCases/Utf16Test.From16To32/108 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/109 [ OK ] Utf16TestCases/Utf16Test.From16To32/109 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/110 [ OK ] Utf16TestCases/Utf16Test.From16To32/110 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/111 [ OK ] Utf16TestCases/Utf16Test.From16To32/111 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/112 [ OK ] Utf16TestCases/Utf16Test.From16To32/112 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/113 [ OK ] Utf16TestCases/Utf16Test.From16To32/113 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/114 [ OK ] Utf16TestCases/Utf16Test.From16To32/114 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/115 [ OK ] Utf16TestCases/Utf16Test.From16To32/115 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/116 [ OK ] Utf16TestCases/Utf16Test.From16To32/116 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/117 [ OK ] Utf16TestCases/Utf16Test.From16To32/117 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/118 [ OK ] Utf16TestCases/Utf16Test.From16To32/118 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/119 [ OK ] Utf16TestCases/Utf16Test.From16To32/119 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/120 [ OK ] Utf16TestCases/Utf16Test.From16To32/120 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/121 [ OK ] Utf16TestCases/Utf16Test.From16To32/121 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/122 [ OK ] Utf16TestCases/Utf16Test.From16To32/122 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/123 [ OK ] Utf16TestCases/Utf16Test.From16To32/123 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/124 [ OK ] Utf16TestCases/Utf16Test.From16To32/124 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/125 [ OK ] Utf16TestCases/Utf16Test.From16To32/125 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/126 [ OK ] Utf16TestCases/Utf16Test.From16To32/126 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/127 [ OK ] Utf16TestCases/Utf16Test.From16To32/127 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/128 [ OK ] Utf16TestCases/Utf16Test.From16To32/128 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/129 [ OK ] Utf16TestCases/Utf16Test.From16To32/129 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/130 [ OK ] Utf16TestCases/Utf16Test.From16To32/130 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/131 [ OK ] Utf16TestCases/Utf16Test.From16To32/131 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/132 [ OK ] Utf16TestCases/Utf16Test.From16To32/132 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/133 [ OK ] Utf16TestCases/Utf16Test.From16To32/133 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/134 [ OK ] Utf16TestCases/Utf16Test.From16To32/134 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/135 [ OK ] Utf16TestCases/Utf16Test.From16To32/135 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/136 [ OK ] Utf16TestCases/Utf16Test.From16To32/136 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/137 [ OK ] Utf16TestCases/Utf16Test.From16To32/137 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/138 [ OK ] Utf16TestCases/Utf16Test.From16To32/138 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/139 [ OK ] Utf16TestCases/Utf16Test.From16To32/139 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/140 [ OK ] Utf16TestCases/Utf16Test.From16To32/140 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/141 [ OK ] Utf16TestCases/Utf16Test.From16To32/141 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/142 [ OK ] Utf16TestCases/Utf16Test.From16To32/142 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/143 [ OK ] Utf16TestCases/Utf16Test.From16To32/143 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/144 [ OK ] Utf16TestCases/Utf16Test.From16To32/144 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/145 [ OK ] Utf16TestCases/Utf16Test.From16To32/145 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/146 [ OK ] Utf16TestCases/Utf16Test.From16To32/146 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/147 [ OK ] Utf16TestCases/Utf16Test.From16To32/147 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/148 [ OK ] Utf16TestCases/Utf16Test.From16To32/148 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/149 [ OK ] Utf16TestCases/Utf16Test.From16To32/149 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/150 [ OK ] Utf16TestCases/Utf16Test.From16To32/150 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/151 [ OK ] Utf16TestCases/Utf16Test.From16To32/151 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/152 [ OK ] Utf16TestCases/Utf16Test.From16To32/152 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/153 [ OK ] Utf16TestCases/Utf16Test.From16To32/153 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/154 [ OK ] Utf16TestCases/Utf16Test.From16To32/154 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/155 [ OK ] Utf16TestCases/Utf16Test.From16To32/155 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/156 [ OK ] Utf16TestCases/Utf16Test.From16To32/156 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/157 [ OK ] Utf16TestCases/Utf16Test.From16To32/157 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/158 [ OK ] Utf16TestCases/Utf16Test.From16To32/158 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/159 [ OK ] Utf16TestCases/Utf16Test.From16To32/159 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/160 [ OK ] Utf16TestCases/Utf16Test.From16To32/160 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/161 [ OK ] Utf16TestCases/Utf16Test.From16To32/161 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/162 [ OK ] Utf16TestCases/Utf16Test.From16To32/162 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/163 [ OK ] Utf16TestCases/Utf16Test.From16To32/163 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/164 [ OK ] Utf16TestCases/Utf16Test.From16To32/164 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/165 [ OK ] Utf16TestCases/Utf16Test.From16To32/165 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/166 [ OK ] Utf16TestCases/Utf16Test.From16To32/166 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/167 [ OK ] Utf16TestCases/Utf16Test.From16To32/167 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/168 [ OK ] Utf16TestCases/Utf16Test.From16To32/168 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/169 [ OK ] Utf16TestCases/Utf16Test.From16To32/169 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/170 [ OK ] Utf16TestCases/Utf16Test.From16To32/170 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/171 [ OK ] Utf16TestCases/Utf16Test.From16To32/171 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/172 [ OK ] Utf16TestCases/Utf16Test.From16To32/172 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/173 [ OK ] Utf16TestCases/Utf16Test.From16To32/173 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/174 [ OK ] Utf16TestCases/Utf16Test.From16To32/174 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/175 [ OK ] Utf16TestCases/Utf16Test.From16To32/175 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/176 [ OK ] Utf16TestCases/Utf16Test.From16To32/176 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/177 [ OK ] Utf16TestCases/Utf16Test.From16To32/177 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/178 [ OK ] Utf16TestCases/Utf16Test.From16To32/178 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/179 [ OK ] Utf16TestCases/Utf16Test.From16To32/179 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/180 [ OK ] Utf16TestCases/Utf16Test.From16To32/180 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/181 [ OK ] Utf16TestCases/Utf16Test.From16To32/181 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/182 [ OK ] Utf16TestCases/Utf16Test.From16To32/182 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/183 [ OK ] Utf16TestCases/Utf16Test.From16To32/183 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/184 [ OK ] Utf16TestCases/Utf16Test.From16To32/184 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/185 [ OK ] Utf16TestCases/Utf16Test.From16To32/185 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/186 [ OK ] Utf16TestCases/Utf16Test.From16To32/186 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/187 [ OK ] Utf16TestCases/Utf16Test.From16To32/187 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/188 [ OK ] Utf16TestCases/Utf16Test.From16To32/188 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/189 [ OK ] Utf16TestCases/Utf16Test.From16To32/189 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/190 [ OK ] Utf16TestCases/Utf16Test.From16To32/190 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/191 [ OK ] Utf16TestCases/Utf16Test.From16To32/191 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/192 [ OK ] Utf16TestCases/Utf16Test.From16To32/192 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/193 [ OK ] Utf16TestCases/Utf16Test.From16To32/193 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/194 [ OK ] Utf16TestCases/Utf16Test.From16To32/194 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/195 [ OK ] Utf16TestCases/Utf16Test.From16To32/195 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/196 [ OK ] Utf16TestCases/Utf16Test.From16To32/196 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/197 [ OK ] Utf16TestCases/Utf16Test.From16To32/197 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/198 [ OK ] Utf16TestCases/Utf16Test.From16To32/198 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/199 [ OK ] Utf16TestCases/Utf16Test.From16To32/199 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/200 [ OK ] Utf16TestCases/Utf16Test.From16To32/200 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/201 [ OK ] Utf16TestCases/Utf16Test.From16To32/201 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/202 [ OK ] Utf16TestCases/Utf16Test.From16To32/202 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/203 [ OK ] Utf16TestCases/Utf16Test.From16To32/203 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/204 [ OK ] Utf16TestCases/Utf16Test.From16To32/204 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/205 [ OK ] Utf16TestCases/Utf16Test.From16To32/205 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/206 [ OK ] Utf16TestCases/Utf16Test.From16To32/206 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/207 [ OK ] Utf16TestCases/Utf16Test.From16To32/207 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/208 [ OK ] Utf16TestCases/Utf16Test.From16To32/208 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/209 [ OK ] Utf16TestCases/Utf16Test.From16To32/209 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/210 [ OK ] Utf16TestCases/Utf16Test.From16To32/210 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/211 [ OK ] Utf16TestCases/Utf16Test.From16To32/211 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/212 [ OK ] Utf16TestCases/Utf16Test.From16To32/212 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/213 [ OK ] Utf16TestCases/Utf16Test.From16To32/213 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/214 [ OK ] Utf16TestCases/Utf16Test.From16To32/214 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/215 [ OK ] Utf16TestCases/Utf16Test.From16To32/215 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/216 [ OK ] Utf16TestCases/Utf16Test.From16To32/216 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/217 [ OK ] Utf16TestCases/Utf16Test.From16To32/217 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/218 [ OK ] Utf16TestCases/Utf16Test.From16To32/218 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/219 [ OK ] Utf16TestCases/Utf16Test.From16To32/219 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/220 [ OK ] Utf16TestCases/Utf16Test.From16To32/220 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/221 [ OK ] Utf16TestCases/Utf16Test.From16To32/221 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/222 [ OK ] Utf16TestCases/Utf16Test.From16To32/222 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/223 [ OK ] Utf16TestCases/Utf16Test.From16To32/223 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/224 [ OK ] Utf16TestCases/Utf16Test.From16To32/224 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/225 [ OK ] Utf16TestCases/Utf16Test.From16To32/225 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/226 [ OK ] Utf16TestCases/Utf16Test.From16To32/226 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/227 [ OK ] Utf16TestCases/Utf16Test.From16To32/227 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/228 [ OK ] Utf16TestCases/Utf16Test.From16To32/228 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/229 [ OK ] Utf16TestCases/Utf16Test.From16To32/229 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/230 [ OK ] Utf16TestCases/Utf16Test.From16To32/230 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/231 [ OK ] Utf16TestCases/Utf16Test.From16To32/231 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/232 [ OK ] Utf16TestCases/Utf16Test.From16To32/232 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/233 [ OK ] Utf16TestCases/Utf16Test.From16To32/233 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/234 [ OK ] Utf16TestCases/Utf16Test.From16To32/234 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/235 [ OK ] Utf16TestCases/Utf16Test.From16To32/235 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/236 [ OK ] Utf16TestCases/Utf16Test.From16To32/236 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/237 [ OK ] Utf16TestCases/Utf16Test.From16To32/237 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/238 [ OK ] Utf16TestCases/Utf16Test.From16To32/238 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/239 [ OK ] Utf16TestCases/Utf16Test.From16To32/239 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/240 [ OK ] Utf16TestCases/Utf16Test.From16To32/240 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/241 [ OK ] Utf16TestCases/Utf16Test.From16To32/241 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/242 [ OK ] Utf16TestCases/Utf16Test.From16To32/242 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/243 [ OK ] Utf16TestCases/Utf16Test.From16To32/243 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/244 [ OK ] Utf16TestCases/Utf16Test.From16To32/244 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/245 [ OK ] Utf16TestCases/Utf16Test.From16To32/245 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/0 [ OK ] Utf16TestCases/Utf16Test.From32To16/0 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/1 [ OK ] Utf16TestCases/Utf16Test.From32To16/1 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/2 [ OK ] Utf16TestCases/Utf16Test.From32To16/2 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/3 [ OK ] Utf16TestCases/Utf16Test.From32To16/3 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/4 [ OK ] Utf16TestCases/Utf16Test.From32To16/4 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/5 [ OK ] Utf16TestCases/Utf16Test.From32To16/5 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/6 [ OK ] Utf16TestCases/Utf16Test.From32To16/6 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/7 [ OK ] Utf16TestCases/Utf16Test.From32To16/7 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/8 [ OK ] Utf16TestCases/Utf16Test.From32To16/8 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/9 [ OK ] Utf16TestCases/Utf16Test.From32To16/9 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/10 [ OK ] Utf16TestCases/Utf16Test.From32To16/10 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/11 [ OK ] Utf16TestCases/Utf16Test.From32To16/11 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/12 [ OK ] Utf16TestCases/Utf16Test.From32To16/12 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/13 [ OK ] Utf16TestCases/Utf16Test.From32To16/13 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/14 [ OK ] Utf16TestCases/Utf16Test.From32To16/14 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/15 [ OK ] Utf16TestCases/Utf16Test.From32To16/15 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/16 [ OK ] Utf16TestCases/Utf16Test.From32To16/16 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/17 [ OK ] Utf16TestCases/Utf16Test.From32To16/17 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/18 [ OK ] Utf16TestCases/Utf16Test.From32To16/18 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/19 [ OK ] Utf16TestCases/Utf16Test.From32To16/19 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/20 [ OK ] Utf16TestCases/Utf16Test.From32To16/20 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/21 [ OK ] Utf16TestCases/Utf16Test.From32To16/21 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/22 [ OK ] Utf16TestCases/Utf16Test.From32To16/22 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/23 [ OK ] Utf16TestCases/Utf16Test.From32To16/23 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/24 [ OK ] Utf16TestCases/Utf16Test.From32To16/24 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/25 [ OK ] Utf16TestCases/Utf16Test.From32To16/25 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/26 [ OK ] Utf16TestCases/Utf16Test.From32To16/26 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/27 [ OK ] Utf16TestCases/Utf16Test.From32To16/27 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/28 [ OK ] Utf16TestCases/Utf16Test.From32To16/28 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/29 [ OK ] Utf16TestCases/Utf16Test.From32To16/29 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/30 [ OK ] Utf16TestCases/Utf16Test.From32To16/30 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/31 [ OK ] Utf16TestCases/Utf16Test.From32To16/31 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/32 [ OK ] Utf16TestCases/Utf16Test.From32To16/32 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/33 [ OK ] Utf16TestCases/Utf16Test.From32To16/33 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/34 [ OK ] Utf16TestCases/Utf16Test.From32To16/34 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/35 [ OK ] Utf16TestCases/Utf16Test.From32To16/35 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/36 [ OK ] Utf16TestCases/Utf16Test.From32To16/36 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/37 [ OK ] Utf16TestCases/Utf16Test.From32To16/37 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/38 [ OK ] Utf16TestCases/Utf16Test.From32To16/38 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/39 [ OK ] Utf16TestCases/Utf16Test.From32To16/39 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/40 [ OK ] Utf16TestCases/Utf16Test.From32To16/40 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/41 [ OK ] Utf16TestCases/Utf16Test.From32To16/41 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/42 [ OK ] Utf16TestCases/Utf16Test.From32To16/42 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/43 [ OK ] Utf16TestCases/Utf16Test.From32To16/43 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/44 [ OK ] Utf16TestCases/Utf16Test.From32To16/44 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/45 [ OK ] Utf16TestCases/Utf16Test.From32To16/45 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/46 [ OK ] Utf16TestCases/Utf16Test.From32To16/46 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/47 [ OK ] Utf16TestCases/Utf16Test.From32To16/47 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/48 [ OK ] Utf16TestCases/Utf16Test.From32To16/48 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/49 [ OK ] Utf16TestCases/Utf16Test.From32To16/49 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/50 [ OK ] Utf16TestCases/Utf16Test.From32To16/50 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/51 [ OK ] Utf16TestCases/Utf16Test.From32To16/51 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/52 [ OK ] Utf16TestCases/Utf16Test.From32To16/52 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/53 [ OK ] Utf16TestCases/Utf16Test.From32To16/53 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/54 [ OK ] Utf16TestCases/Utf16Test.From32To16/54 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/55 [ OK ] Utf16TestCases/Utf16Test.From32To16/55 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/56 [ OK ] Utf16TestCases/Utf16Test.From32To16/56 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/57 [ OK ] Utf16TestCases/Utf16Test.From32To16/57 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/58 [ OK ] Utf16TestCases/Utf16Test.From32To16/58 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/59 [ OK ] Utf16TestCases/Utf16Test.From32To16/59 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/60 [ OK ] Utf16TestCases/Utf16Test.From32To16/60 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/61 [ OK ] Utf16TestCases/Utf16Test.From32To16/61 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/62 [ OK ] Utf16TestCases/Utf16Test.From32To16/62 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/63 [ OK ] Utf16TestCases/Utf16Test.From32To16/63 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/64 [ OK ] Utf16TestCases/Utf16Test.From32To16/64 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/65 [ OK ] Utf16TestCases/Utf16Test.From32To16/65 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/66 [ OK ] Utf16TestCases/Utf16Test.From32To16/66 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/67 [ OK ] Utf16TestCases/Utf16Test.From32To16/67 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/68 [ OK ] Utf16TestCases/Utf16Test.From32To16/68 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/69 [ OK ] Utf16TestCases/Utf16Test.From32To16/69 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/70 [ OK ] Utf16TestCases/Utf16Test.From32To16/70 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/71 [ OK ] Utf16TestCases/Utf16Test.From32To16/71 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/72 [ OK ] Utf16TestCases/Utf16Test.From32To16/72 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/73 [ OK ] Utf16TestCases/Utf16Test.From32To16/73 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/74 [ OK ] Utf16TestCases/Utf16Test.From32To16/74 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/75 [ OK ] Utf16TestCases/Utf16Test.From32To16/75 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/76 [ OK ] Utf16TestCases/Utf16Test.From32To16/76 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/77 [ OK ] Utf16TestCases/Utf16Test.From32To16/77 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/78 [ OK ] Utf16TestCases/Utf16Test.From32To16/78 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/79 [ OK ] Utf16TestCases/Utf16Test.From32To16/79 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/80 [ OK ] Utf16TestCases/Utf16Test.From32To16/80 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/81 [ OK ] Utf16TestCases/Utf16Test.From32To16/81 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/82 [ OK ] Utf16TestCases/Utf16Test.From32To16/82 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/83 [ OK ] Utf16TestCases/Utf16Test.From32To16/83 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/84 [ OK ] Utf16TestCases/Utf16Test.From32To16/84 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/85 [ OK ] Utf16TestCases/Utf16Test.From32To16/85 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/86 [ OK ] Utf16TestCases/Utf16Test.From32To16/86 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/87 [ OK ] Utf16TestCases/Utf16Test.From32To16/87 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/88 [ OK ] Utf16TestCases/Utf16Test.From32To16/88 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/89 [ OK ] Utf16TestCases/Utf16Test.From32To16/89 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/90 [ OK ] Utf16TestCases/Utf16Test.From32To16/90 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/91 [ OK ] Utf16TestCases/Utf16Test.From32To16/91 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/92 [ OK ] Utf16TestCases/Utf16Test.From32To16/92 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/93 [ OK ] Utf16TestCases/Utf16Test.From32To16/93 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/94 [ OK ] Utf16TestCases/Utf16Test.From32To16/94 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/95 [ OK ] Utf16TestCases/Utf16Test.From32To16/95 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/96 [ OK ] Utf16TestCases/Utf16Test.From32To16/96 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/97 [ OK ] Utf16TestCases/Utf16Test.From32To16/97 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/98 [ OK ] Utf16TestCases/Utf16Test.From32To16/98 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/99 [ OK ] Utf16TestCases/Utf16Test.From32To16/99 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/100 [ OK ] Utf16TestCases/Utf16Test.From32To16/100 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/101 [ OK ] Utf16TestCases/Utf16Test.From32To16/101 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/102 [ OK ] Utf16TestCases/Utf16Test.From32To16/102 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/103 [ OK ] Utf16TestCases/Utf16Test.From32To16/103 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/104 [ OK ] Utf16TestCases/Utf16Test.From32To16/104 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/105 [ OK ] Utf16TestCases/Utf16Test.From32To16/105 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/106 [ OK ] Utf16TestCases/Utf16Test.From32To16/106 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/107 [ OK ] Utf16TestCases/Utf16Test.From32To16/107 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/108 [ OK ] Utf16TestCases/Utf16Test.From32To16/108 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/109 [ OK ] Utf16TestCases/Utf16Test.From32To16/109 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/110 [ OK ] Utf16TestCases/Utf16Test.From32To16/110 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/111 [ OK ] Utf16TestCases/Utf16Test.From32To16/111 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/112 [ OK ] Utf16TestCases/Utf16Test.From32To16/112 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/113 [ OK ] Utf16TestCases/Utf16Test.From32To16/113 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/114 [ OK ] Utf16TestCases/Utf16Test.From32To16/114 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/115 [ OK ] Utf16TestCases/Utf16Test.From32To16/115 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/116 [ OK ] Utf16TestCases/Utf16Test.From32To16/116 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/117 [ OK ] Utf16TestCases/Utf16Test.From32To16/117 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/118 [ OK ] Utf16TestCases/Utf16Test.From32To16/118 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/119 [ OK ] Utf16TestCases/Utf16Test.From32To16/119 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/120 [ OK ] Utf16TestCases/Utf16Test.From32To16/120 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/121 [ OK ] Utf16TestCases/Utf16Test.From32To16/121 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/122 [ OK ] Utf16TestCases/Utf16Test.From32To16/122 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/123 [ OK ] Utf16TestCases/Utf16Test.From32To16/123 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/124 [ OK ] Utf16TestCases/Utf16Test.From32To16/124 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/125 [ OK ] Utf16TestCases/Utf16Test.From32To16/125 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/126 [ OK ] Utf16TestCases/Utf16Test.From32To16/126 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/127 [ OK ] Utf16TestCases/Utf16Test.From32To16/127 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/128 [ OK ] Utf16TestCases/Utf16Test.From32To16/128 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/129 [ OK ] Utf16TestCases/Utf16Test.From32To16/129 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/130 [ OK ] Utf16TestCases/Utf16Test.From32To16/130 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/131 [ OK ] Utf16TestCases/Utf16Test.From32To16/131 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/132 [ OK ] Utf16TestCases/Utf16Test.From32To16/132 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/133 [ OK ] Utf16TestCases/Utf16Test.From32To16/133 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/134 [ OK ] Utf16TestCases/Utf16Test.From32To16/134 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/135 [ OK ] Utf16TestCases/Utf16Test.From32To16/135 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/136 [ OK ] Utf16TestCases/Utf16Test.From32To16/136 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/137 [ OK ] Utf16TestCases/Utf16Test.From32To16/137 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/138 [ OK ] Utf16TestCases/Utf16Test.From32To16/138 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/139 [ OK ] Utf16TestCases/Utf16Test.From32To16/139 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/140 [ OK ] Utf16TestCases/Utf16Test.From32To16/140 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/141 [ OK ] Utf16TestCases/Utf16Test.From32To16/141 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/142 [ OK ] Utf16TestCases/Utf16Test.From32To16/142 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/143 [ OK ] Utf16TestCases/Utf16Test.From32To16/143 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/144 [ OK ] Utf16TestCases/Utf16Test.From32To16/144 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/145 [ OK ] Utf16TestCases/Utf16Test.From32To16/145 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/146 [ OK ] Utf16TestCases/Utf16Test.From32To16/146 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/147 [ OK ] Utf16TestCases/Utf16Test.From32To16/147 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/148 [ OK ] Utf16TestCases/Utf16Test.From32To16/148 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/149 [ OK ] Utf16TestCases/Utf16Test.From32To16/149 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/150 [ OK ] Utf16TestCases/Utf16Test.From32To16/150 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/151 [ OK ] Utf16TestCases/Utf16Test.From32To16/151 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/152 [ OK ] Utf16TestCases/Utf16Test.From32To16/152 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/153 [ OK ] Utf16TestCases/Utf16Test.From32To16/153 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/154 [ OK ] Utf16TestCases/Utf16Test.From32To16/154 (1 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/155 [ OK ] Utf16TestCases/Utf16Test.From32To16/155 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/156 [ OK ] Utf16TestCases/Utf16Test.From32To16/156 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/157 [ OK ] Utf16TestCases/Utf16Test.From32To16/157 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/158 [ OK ] Utf16TestCases/Utf16Test.From32To16/158 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/159 [ OK ] Utf16TestCases/Utf16Test.From32To16/159 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/160 [ OK ] Utf16TestCases/Utf16Test.From32To16/160 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/161 [ OK ] Utf16TestCases/Utf16Test.From32To16/161 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/162 [ OK ] Utf16TestCases/Utf16Test.From32To16/162 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/163 [ OK ] Utf16TestCases/Utf16Test.From32To16/163 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/164 [ OK ] Utf16TestCases/Utf16Test.From32To16/164 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/165 [ OK ] Utf16TestCases/Utf16Test.From32To16/165 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/166 [ OK ] Utf16TestCases/Utf16Test.From32To16/166 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/167 [ OK ] Utf16TestCases/Utf16Test.From32To16/167 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/168 [ OK ] Utf16TestCases/Utf16Test.From32To16/168 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/169 [ OK ] Utf16TestCases/Utf16Test.From32To16/169 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/170 [ OK ] Utf16TestCases/Utf16Test.From32To16/170 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/171 [ OK ] Utf16TestCases/Utf16Test.From32To16/171 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/172 [ OK ] Utf16TestCases/Utf16Test.From32To16/172 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/173 [ OK ] Utf16TestCases/Utf16Test.From32To16/173 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/174 [ OK ] Utf16TestCases/Utf16Test.From32To16/174 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/175 [ OK ] Utf16TestCases/Utf16Test.From32To16/175 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/176 [ OK ] Utf16TestCases/Utf16Test.From32To16/176 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/177 [ OK ] Utf16TestCases/Utf16Test.From32To16/177 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/178 [ OK ] Utf16TestCases/Utf16Test.From32To16/178 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/179 [ OK ] Utf16TestCases/Utf16Test.From32To16/179 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/180 [ OK ] Utf16TestCases/Utf16Test.From32To16/180 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/181 [ OK ] Utf16TestCases/Utf16Test.From32To16/181 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/182 [ OK ] Utf16TestCases/Utf16Test.From32To16/182 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/183 [ OK ] Utf16TestCases/Utf16Test.From32To16/183 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/184 [ OK ] Utf16TestCases/Utf16Test.From32To16/184 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/185 [ OK ] Utf16TestCases/Utf16Test.From32To16/185 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/186 [ OK ] Utf16TestCases/Utf16Test.From32To16/186 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/187 [ OK ] Utf16TestCases/Utf16Test.From32To16/187 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/188 [ OK ] Utf16TestCases/Utf16Test.From32To16/188 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/189 [ OK ] Utf16TestCases/Utf16Test.From32To16/189 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/190 [ OK ] Utf16TestCases/Utf16Test.From32To16/190 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/191 [ OK ] Utf16TestCases/Utf16Test.From32To16/191 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/192 [ OK ] Utf16TestCases/Utf16Test.From32To16/192 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/193 [ OK ] Utf16TestCases/Utf16Test.From32To16/193 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/194 [ OK ] Utf16TestCases/Utf16Test.From32To16/194 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/195 [ OK ] Utf16TestCases/Utf16Test.From32To16/195 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/196 [ OK ] Utf16TestCases/Utf16Test.From32To16/196 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/197 [ OK ] Utf16TestCases/Utf16Test.From32To16/197 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/198 [ OK ] Utf16TestCases/Utf16Test.From32To16/198 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/199 [ OK ] Utf16TestCases/Utf16Test.From32To16/199 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/200 [ OK ] Utf16TestCases/Utf16Test.From32To16/200 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/201 [ OK ] Utf16TestCases/Utf16Test.From32To16/201 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/202 [ OK ] Utf16TestCases/Utf16Test.From32To16/202 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/203 [ OK ] Utf16TestCases/Utf16Test.From32To16/203 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/204 [ OK ] Utf16TestCases/Utf16Test.From32To16/204 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/205 [ OK ] Utf16TestCases/Utf16Test.From32To16/205 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/206 [ OK ] Utf16TestCases/Utf16Test.From32To16/206 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/207 [ OK ] Utf16TestCases/Utf16Test.From32To16/207 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/208 [ OK ] Utf16TestCases/Utf16Test.From32To16/208 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/209 [ OK ] Utf16TestCases/Utf16Test.From32To16/209 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/210 [ OK ] Utf16TestCases/Utf16Test.From32To16/210 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/211 [ OK ] Utf16TestCases/Utf16Test.From32To16/211 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/212 [ OK ] Utf16TestCases/Utf16Test.From32To16/212 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/213 [ OK ] Utf16TestCases/Utf16Test.From32To16/213 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/214 [ OK ] Utf16TestCases/Utf16Test.From32To16/214 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/215 [ OK ] Utf16TestCases/Utf16Test.From32To16/215 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/216 [ OK ] Utf16TestCases/Utf16Test.From32To16/216 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/217 [ OK ] Utf16TestCases/Utf16Test.From32To16/217 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/218 [ OK ] Utf16TestCases/Utf16Test.From32To16/218 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/219 [ OK ] Utf16TestCases/Utf16Test.From32To16/219 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/220 [ OK ] Utf16TestCases/Utf16Test.From32To16/220 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/221 [ OK ] Utf16TestCases/Utf16Test.From32To16/221 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/222 [ OK ] Utf16TestCases/Utf16Test.From32To16/222 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/223 [ OK ] Utf16TestCases/Utf16Test.From32To16/223 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/224 [ OK ] Utf16TestCases/Utf16Test.From32To16/224 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/225 [ OK ] Utf16TestCases/Utf16Test.From32To16/225 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/226 [ OK ] Utf16TestCases/Utf16Test.From32To16/226 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/227 [ OK ] Utf16TestCases/Utf16Test.From32To16/227 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/228 [ OK ] Utf16TestCases/Utf16Test.From32To16/228 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/229 [ OK ] Utf16TestCases/Utf16Test.From32To16/229 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/230 [ OK ] Utf16TestCases/Utf16Test.From32To16/230 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/231 [ OK ] Utf16TestCases/Utf16Test.From32To16/231 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/232 [ OK ] Utf16TestCases/Utf16Test.From32To16/232 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/233 [ OK ] Utf16TestCases/Utf16Test.From32To16/233 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/234 [ OK ] Utf16TestCases/Utf16Test.From32To16/234 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/235 [ OK ] Utf16TestCases/Utf16Test.From32To16/235 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/236 [ OK ] Utf16TestCases/Utf16Test.From32To16/236 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/237 [ OK ] Utf16TestCases/Utf16Test.From32To16/237 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/238 [ OK ] Utf16TestCases/Utf16Test.From32To16/238 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/239 [ OK ] Utf16TestCases/Utf16Test.From32To16/239 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/240 [ OK ] Utf16TestCases/Utf16Test.From32To16/240 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/241 [ OK ] Utf16TestCases/Utf16Test.From32To16/241 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/242 [ OK ] Utf16TestCases/Utf16Test.From32To16/242 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/243 [ OK ] Utf16TestCases/Utf16Test.From32To16/243 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/244 [ OK ] Utf16TestCases/Utf16Test.From32To16/244 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/245 [ OK ] Utf16TestCases/Utf16Test.From32To16/245 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/0 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/0 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/1 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/1 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/2 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/2 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/3 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/3 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/4 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/4 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/5 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/5 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/6 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/6 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/7 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/7 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/8 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/8 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/9 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/9 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/10 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/10 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/11 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/11 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/12 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/12 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/13 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/13 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/14 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/14 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/15 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/15 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/16 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/16 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/17 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/17 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/18 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/18 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/19 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/19 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/20 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/20 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/21 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/21 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/22 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/22 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/23 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/23 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/24 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/24 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/25 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/25 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/26 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/26 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/27 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/27 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/28 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/28 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/29 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/29 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/30 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/30 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/31 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/31 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/32 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/32 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/33 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/33 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/34 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/34 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/35 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/35 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/36 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/36 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/37 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/37 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/38 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/38 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/39 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/39 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/40 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/40 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/41 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/41 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/42 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/42 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/43 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/43 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/44 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/44 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/45 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/45 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/46 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/46 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/47 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/47 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/48 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/48 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/49 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/49 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/50 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/50 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/51 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/51 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/52 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/52 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/53 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/53 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/54 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/54 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/55 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/55 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/56 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/56 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/57 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/57 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/58 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/58 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/59 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/59 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/60 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/60 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/61 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/61 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/62 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/62 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/63 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/63 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/64 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/64 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/65 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/65 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/66 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/66 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/67 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/67 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/68 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/68 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/69 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/69 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/70 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/70 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/71 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/71 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/72 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/72 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/73 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/73 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/74 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/74 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/75 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/75 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/76 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/76 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/77 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/77 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/78 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/78 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/79 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/79 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/80 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/80 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/81 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/81 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/82 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/82 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/83 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/83 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/84 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/84 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/85 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/85 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/86 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/86 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/87 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/87 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/88 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/88 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/89 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/89 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/90 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/90 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/91 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/91 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/92 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/92 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/93 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/93 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/94 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/94 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/95 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/95 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/96 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/96 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/97 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/97 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/98 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/98 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/99 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/99 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/100 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/100 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/101 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/101 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/102 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/102 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/103 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/103 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/104 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/104 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/105 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/105 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/106 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/106 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/107 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/107 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/108 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/108 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/109 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/109 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/110 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/110 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/111 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/111 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/112 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/112 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/113 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/113 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/114 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/114 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/115 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/115 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/116 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/116 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/117 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/117 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/118 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/118 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/119 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/119 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/120 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/120 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/121 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/121 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/122 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/122 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/123 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/123 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/124 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/124 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/125 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/125 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/126 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/126 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/127 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/127 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/128 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/128 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/129 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/129 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/130 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/130 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/131 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/131 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/132 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/132 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/133 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/133 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/134 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/134 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/135 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/135 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/136 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/136 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/137 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/137 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/138 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/138 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/139 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/139 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/140 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/140 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/141 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/141 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/142 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/142 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/143 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/143 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/144 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/144 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/145 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/145 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/146 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/146 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/147 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/147 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/148 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/148 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/149 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/149 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/150 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/150 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/151 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/151 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/152 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/152 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/153 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/153 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/154 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/154 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/155 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/155 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/156 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/156 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/157 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/157 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/158 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/158 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/159 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/159 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/160 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/160 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/161 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/161 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/162 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/162 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/163 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/163 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/164 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/164 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/165 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/165 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/166 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/166 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/167 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/167 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/168 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/168 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/169 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/169 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/170 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/170 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/171 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/171 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/172 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/172 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/173 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/173 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/174 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/174 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/175 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/175 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/176 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/176 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/177 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/177 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/178 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/178 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/179 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/179 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/180 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/180 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/181 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/181 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/182 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/182 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/183 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/183 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/184 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/184 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/185 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/185 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/186 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/186 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/187 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/187 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/188 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/188 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/189 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/189 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/190 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/190 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/191 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/191 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/192 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/192 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/193 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/193 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/194 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/194 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/195 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/195 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/196 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/196 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/197 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/197 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/198 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/198 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/199 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/199 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/200 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/200 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/201 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/201 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/202 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/202 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/203 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/203 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/204 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/204 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/205 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/205 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/206 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/206 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/207 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/207 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/208 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/208 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/209 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/209 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/210 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/210 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/211 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/211 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/212 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/212 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/213 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/213 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/214 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/214 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/215 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/215 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/216 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/216 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/217 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/217 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/218 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/218 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/219 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/219 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/220 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/220 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/221 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/221 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/222 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/222 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/223 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/223 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/224 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/224 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/225 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/225 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/226 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/226 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/227 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/227 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/228 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/228 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/229 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/229 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/230 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/230 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/231 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/231 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/232 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/232 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/233 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/233 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/234 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/234 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/235 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/235 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/236 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/236 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/237 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/237 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/238 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/238 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/239 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/239 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/240 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/240 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/241 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/241 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/242 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/242 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/243 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/243 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/244 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/244 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/245 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/245 (0 ms) [----------] 738 tests from Utf16TestCases/Utf16Test (2 ms total) [----------] 78 tests from BadUtf8TestCases/BadUtf8Test [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38 (1 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38 (0 ms) [----------] 78 tests from BadUtf8TestCases/BadUtf8Test (1 ms total) [----------] 9 tests from BadUtf16TestCases/BadUtf16Test [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/7 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/7 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/8 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/8 (0 ms) [----------] 9 tests from BadUtf16TestCases/BadUtf16Test (0 ms total) [----------] 22 tests from Iso88591TestCases/Iso88591Test [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/0 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/0 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/1 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/1 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/2 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/2 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/3 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/3 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/4 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/4 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/5 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/5 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/6 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/6 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/7 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/7 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/8 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/8 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/9 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/9 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/10 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/10 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/11 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/11 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/12 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/12 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/13 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/13 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/14 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/14 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/15 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/15 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/16 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/16 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/17 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/17 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/18 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/18 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/19 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/19 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/20 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/20 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/21 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/21 (0 ms) [----------] 22 tests from Iso88591TestCases/Iso88591Test (0 ms total) [----------] Global test environment tear-down [==========] 1960 tests from 13 test suites ran. (6 ms total) [ PASSED ] 1960 tests. YOU HAVE 3 DISABLED TESTS gtests.sh: #12: util_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/util_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: freebl_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/freebl_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/freebl_gtest -n dummy -s CN=dummy -t ,, -x -m 7 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #13: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/freebl_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing freebl_gtest [==========] Running 68 tests from 6 test suites. [----------] Global test environment set-up. [----------] 14 tests from MPITest [ RUN ] MPITest.MpiCmp01Test [ OK ] MPITest.MpiCmp01Test (0 ms) [ RUN ] MPITest.MpiCmp10Test [ OK ] MPITest.MpiCmp10Test (0 ms) [ RUN ] MPITest.MpiCmp00Test [ OK ] MPITest.MpiCmp00Test (0 ms) [ RUN ] MPITest.MpiCmp11Test [ OK ] MPITest.MpiCmp11Test (0 ms) [ RUN ] MPITest.MpiDiv32ErrorTest [ OK ] MPITest.MpiDiv32ErrorTest (0 ms) [ RUN ] MPITest.MpiCmpUnalignedTest [ OK ] MPITest.MpiCmpUnalignedTest (0 ms) [ RUN ] MPITest.MpiSetUlong [ OK ] MPITest.MpiSetUlong (0 ms) [ RUN ] MPITest.MpiSetInt [ OK ] MPITest.MpiSetInt (0 ms) [ RUN ] MPITest.MpiFixlenOctetsZero value: [1] 00 output: [1] 00 value: [1] 00 output: [2] 0000 value: [1] 00 output: [8] 0000000000000000 value: [1] 00 output: [9] 000000000000000000 [ OK ] MPITest.MpiFixlenOctetsZero (0 ms) [ RUN ] MPITest.MpiRadixSizeNeg [ OK ] MPITest.MpiRadixSizeNeg (1 ms) [ RUN ] MPITest.MpiFixlenOctetsVarlen value: [1] a4 output: [1] a4 value: [1] a4 output: [2] 00a4 value: [1] a4 output: [9] 0000000000000000a4 value: [2] a4a4 output: [2] a4a4 value: [2] a4a4 output: [3] 00a4a4 value: [2] a4a4 output: [10] 0000000000000000a4a4 value: [3] a4a4a4 output: [3] a4a4a4 value: [3] a4a4a4 output: [4] 00a4a4a4 value: [3] a4a4a4 output: [11] 0000000000000000a4a4a4 value: [4] a4a4a4a4 output: [4] a4a4a4a4 value: [4] a4a4a4a4 output: [5] 00a4a4a4a4 value: [4] a4a4a4a4 output: [12] 0000000000000000a4a4a4a4 value: [5] a4a4a4a4a4 output: [5] a4a4a4a4a4 value: [5] a4a4a4a4a4 output: [6] 00a4a4a4a4a4 value: [5] a4a4a4a4a4 output: [13] 0000000000000000a4a4a4a4a4 value: [6] a4a4a4a4a4a4 output: [6] a4a4a4a4a4a4 value: [6] a4a4a4a4a4a4 output: [7] 00a4a4a4a4a4a4 value: [6] a4a4a4a4a4a4 output: [14] 0000000000000000a4a4a4a4a4a4 value: [7] a4a4a4a4a4a4a4 output: [7] a4a4a4a4a4a4a4 value: [7] a4a4a4a4a4a4a4 output: [8] 00a4a4a4a4a4a4a4 value: [7] a4a4a4a4a4a4a4 output: [15] 0000000000000000a4a4a4a4a4a4a4 value: [8] a4a4a4a4a4a4a4a4 output: [8] a4a4a4a4a4a4a4a4 value: [8] a4a4a4a4a4a4a4a4 output: [9] 00a4a4a4a4a4a4a4a4 value: [8] a4a4a4a4a4a4a4a4 output: [16] 0000000000000000a4a4a4a4a4a4a4a4 value: [9] a4a4a4a4a4a4a4a4a4 output: [9] a4a4a4a4a4a4a4a4a4 value: [9] a4a4a4a4a4a4a4a4a4 output: [10] 00a4a4a4a4a4a4a4a4a4 value: [9] a4a4a4a4a4a4a4a4a4 output: [17] 0000000000000000a4a4a4a4a4a4a4a4a4 value: [10] a4a4a4a4a4a4a4a4a4a4 output: [10] a4a4a4a4a4a4a4a4a4a4 value: [10] a4a4a4a4a4a4a4a4a4a4 output: [11] 00a4a4a4a4a4a4a4a4a4a4 value: [10] a4a4a4a4a4a4a4a4a4a4 output: [18] 0000000000000000a4a4a4a4a4a4a4a4a4a4 value: [11] a4a4a4a4a4a4a4a4a4a4a4 output: [11] a4a4a4a4a4a4a4a4a4a4a4 value: [11] a4a4a4a4a4a4a4a4a4a4a4 output: [12] 00a4a4a4a4a4a4a4a4a4a4a4 value: [11] a4a4a4a4a4a4a4a4a4a4a4 output: [19] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4 value: [12] a4a4a4a4a4a4a4a4a4a4a4a4 output: [12] a4a4a4a4a4a4a4a4a4a4a4a4 value: [12] a4a4a4a4a4a4a4a4a4a4a4a4 output: [13] 00a4a4a4a4a4a4a4a4a4a4a4a4 value: [12] a4a4a4a4a4a4a4a4a4a4a4a4 output: [20] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4 value: [13] a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [13] a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [13] a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [14] 00a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [13] a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [21] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [14] a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [14] a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [14] a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [15] 00a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [14] a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [22] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [15] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [15] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [15] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [16] 00a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [15] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [23] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [16] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [16] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [16] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [17] 00a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 value: [16] a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 output: [24] 0000000000000000a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4a4 [ OK ] MPITest.MpiFixlenOctetsVarlen (0 ms) [ RUN ] MPITest.MpiFixlenOctetsTooSmall ref: [1] 03 ref: [2] 0303 ref: [3] 030303 ref: [4] 03030303 ref: [5] 0303030303 ref: [6] 030303030303 ref: [7] 03030303030303 ref: [8] 0303030303030303 ref: [9] 030303030303030303 ref: [10] 03030303030303030303 ref: [11] 0303030303030303030303 ref: [12] 030303030303030303030303 ref: [13] 03030303030303030303030303 ref: [14] 0303030303030303030303030303 ref: [15] 030303030303030303030303030303 ref: [16] 03030303030303030303030303030303 [ OK ] MPITest.MpiFixlenOctetsTooSmall (0 ms) [ RUN ] MPITest.MpiSqrMulClamp [ OK ] MPITest.MpiSqrMulClamp (0 ms) [ RUN ] MPITest.MpiInvModLoop [ OK ] MPITest.MpiInvModLoop (1 ms) [----------] 14 tests from MPITest (2 ms total) [----------] 3 tests from DHTest [ RUN ] DHTest.DhGenParamSuccessTest16 [ OK ] DHTest.DhGenParamSuccessTest16 (34 ms) [ RUN ] DHTest.DhGenParamSuccessTest224 [ OK ] DHTest.DhGenParamSuccessTest224 (2056 ms) [ RUN ] DHTest.DhGenParamSuccessTest256 [ OK ] DHTest.DhGenParamSuccessTest256 (4594 ms) [----------] 3 tests from DHTest (6684 ms total) [----------] 2 tests from ECLTest [ RUN ] ECLTest.TestECDH_DeriveP256 [ OK ] ECLTest.TestECDH_DeriveP256 (0 ms) [ RUN ] ECLTest.TestECDH_DeriveP521 derived secret: 01BC33425E72A12779EACB2EDCC5B63D1281F7E86DBC7BF99A7ABD0CFE367DE4666D6EDBB8525BFFE5222F0702C3096DEC0884CE572F5A15C423FDF44D01DD99C61D [ OK ] ECLTest.TestECDH_DeriveP521 (2 ms) [----------] 2 tests from ECLTest (2 ms total) [----------] 6 tests from RSATest [ RUN ] RSATest.expOneTest [ OK ] RSATest.expOneTest (0 ms) [ RUN ] RSATest.expTwoTest [ OK ] RSATest.expTwoTest (0 ms) [ RUN ] RSATest.expFourTest [ OK ] RSATest.expFourTest (0 ms) [ RUN ] RSATest.WrongKeysizeTest [ OK ] RSATest.WrongKeysizeTest (0 ms) [ RUN ] RSATest.expThreeTest [ OK ] RSATest.expThreeTest (93 ms) [ RUN ] RSATest.DecryptBlockTestErrors [ OK ] RSATest.DecryptBlockTestErrors (76 ms) [----------] 6 tests from RSATest (169 ms total) [----------] 5 tests from CmacAesTest [ RUN ] CmacAesTest.CreateInvalidSize [ OK ] CmacAesTest.CreateInvalidSize (0 ms) [ RUN ] CmacAesTest.CreateRightSize [ OK ] CmacAesTest.CreateRightSize (0 ms) [ RUN ] CmacAesTest.AesNistAligned [ OK ] CmacAesTest.AesNistAligned (0 ms) [ RUN ] CmacAesTest.AesNistUnaligned [ OK ] CmacAesTest.AesNistUnaligned (0 ms) [ RUN ] CmacAesTest.AesNistTruncated [ OK ] CmacAesTest.AesNistTruncated (0 ms) [----------] 5 tests from CmacAesTest (0 ms total) [----------] 38 tests from NISTTestVector/GHashTest [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/0 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/0 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/1 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/1 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/2 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/2 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/3 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/3 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/4 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/4 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/5 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/5 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/6 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/6 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/7 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/7 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/8 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/8 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/9 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/9 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/10 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/10 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/11 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/11 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/12 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/12 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/13 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/13 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/14 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/14 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/15 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/15 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/16 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/16 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/17 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/17 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_X86_HW/18 [ OK ] NISTTestVector/GHashTest.KAT_X86_HW/18 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/0 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/0 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/1 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/1 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/2 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/2 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/3 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/3 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/4 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/4 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/5 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/5 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/6 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/6 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/7 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/7 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/8 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/8 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/9 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/9 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/10 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/10 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/11 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/11 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/12 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/12 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/13 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/13 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/14 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/14 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/15 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/15 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/16 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/16 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/17 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/17 (0 ms) [ RUN ] NISTTestVector/GHashTest.KAT_Sftw/18 [ OK ] NISTTestVector/GHashTest.KAT_Sftw/18 (0 ms) [----------] 38 tests from NISTTestVector/GHashTest (0 ms total) [----------] Global test environment tear-down [==========] 68 tests from 6 test suites ran. (6857 ms total) [ PASSED ] 68 tests. YOU HAVE 1 DISABLED TEST gtests.sh: #14: freebl_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/freebl_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: softoken_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/softoken_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/softoken_gtest -n dummy -s CN=dummy -t ,, -x -m 8 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #15: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/softoken_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing softoken_gtest [==========] Running 76 tests from 6 test suites. [----------] Global test environment set-up. [----------] 14 tests from SoftokenTest [ RUN ] SoftokenTest.CheckDefaultPbkdf2Iterations [ OK ] SoftokenTest.CheckDefaultPbkdf2Iterations (18 ms) [ RUN ] SoftokenTest.ResetSoftokenEmptyPassword [ OK ] SoftokenTest.ResetSoftokenEmptyPassword (5 ms) [ RUN ] SoftokenTest.ResetSoftokenNonEmptyPassword [ OK ] SoftokenTest.ResetSoftokenNonEmptyPassword (32 ms) [ RUN ] SoftokenTest.GetInvalidAttribute [ OK ] SoftokenTest.GetInvalidAttribute (100 ms) [ RUN ] SoftokenTest.GetValidAttributes [ OK ] SoftokenTest.GetValidAttributes (114 ms) [ RUN ] SoftokenTest.GetOnlyInvalidAttributes [ OK ] SoftokenTest.GetOnlyInvalidAttributes (99 ms) [ RUN ] SoftokenTest.GetAttributesInvalidInterspersed1 [ OK ] SoftokenTest.GetAttributesInvalidInterspersed1 (114 ms) [ RUN ] SoftokenTest.GetAttributesInvalidInterspersed2 [ OK ] SoftokenTest.GetAttributesInvalidInterspersed2 (114 ms) [ RUN ] SoftokenTest.GetAttributesInvalidInterspersed3 [ OK ] SoftokenTest.GetAttributesInvalidInterspersed3 (113 ms) [ RUN ] SoftokenTest.CreateObjectNonEmptyPassword [ OK ] SoftokenTest.CreateObjectNonEmptyPassword (17 ms) [ RUN ] SoftokenTest.CreateObjectChangePassword [ OK ] SoftokenTest.CreateObjectChangePassword (18 ms) [ RUN ] SoftokenTest.CreateObjectChangeToBigPassword [ OK ] SoftokenTest.CreateObjectChangeToBigPassword (17 ms) [ RUN ] SoftokenTest.CreateObjectChangeToEmptyPassword [ OK ] SoftokenTest.CreateObjectChangeToEmptyPassword (19 ms) [ RUN ] SoftokenTest.CreateObjectReadBreakLine [ OK ] SoftokenTest.CreateObjectReadBreakLine (7 ms) [----------] 14 tests from SoftokenTest (787 ms total) [----------] 1 test from SoftokenNonAsciiTest [ RUN ] SoftokenNonAsciiTest.NonAsciiPathWorking [ OK ] SoftokenNonAsciiTest.NonAsciiPathWorking (4 ms) [----------] 1 test from SoftokenNonAsciiTest (4 ms total) [----------] 1 test from SoftokenNoDBTest [ RUN ] SoftokenNoDBTest.NeedUserInitNoDB [ OK ] SoftokenNoDBTest.NeedUserInitNoDB (1 ms) [----------] 1 test from SoftokenNoDBTest (1 ms total) [----------] 3 tests from SoftokenBuiltinsTest [ RUN ] SoftokenBuiltinsTest.CheckNoDistrustFields [ OK ] SoftokenBuiltinsTest.CheckNoDistrustFields (3 ms) [ RUN ] SoftokenBuiltinsTest.CheckOkDistrustFields [ OK ] SoftokenBuiltinsTest.CheckOkDistrustFields (3 ms) [ RUN ] SoftokenBuiltinsTest.CheckInvalidDistrustFields [ OK ] SoftokenBuiltinsTest.CheckInvalidDistrustFields (4 ms) [----------] 3 tests from SoftokenBuiltinsTest (10 ms total) [----------] 3 tests from SoftokenPasswordChangeTests/SoftokenPasswordChangeTest [ RUN ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/0 [ OK ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/0 (226 ms) [ RUN ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/1 [ OK ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/1 (254 ms) [ RUN ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/2 [ OK ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/2 (473 ms) [----------] 3 tests from SoftokenPasswordChangeTests/SoftokenPasswordChangeTest (953 ms total) [----------] 54 tests from DhValidateCases/SoftokenDhValidate [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/0 Test: IKE 1536 param_type: IKE_APPROVED, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/0 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/1 Test: IKE 2048 param_type: IKE_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/1 (5 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/2 Test: TLS 3048 param_type: TLS_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/2 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/3 Test: IKE 3072 param_type: IKE_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/3 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/4 Test: TLS 3072 param_type: TLS_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/4 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/5 Test: IKE 4096 param_type: IKE_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/5 (11 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/6 Test: TLS 4096 param_type: TLS_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/6 (11 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/7 Test: IKE 6144 param_type: IKE_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/7 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/8 Test: TLS 6144 param_type: TLS_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/8 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/9 Test: IKE 8192 param_type: IKE_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/9 (52 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/10 Test: TLS 8192 param_type: TLS_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/10 (53 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/11 Test: IKE 1536 with subprime param_type: IKE_APPROVED, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [192] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/11 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/12 Test: IKE 2048 with subprime param_type: IKE_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [256] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/12 (5 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/13 Test: TLS 2048 with subprime param_type: TLS_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [256] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/13 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/14 Test: IKE 3072 with subprime param_type: IKE_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [384] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/14 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/15 Test: TLS 3072 with subprime param_type: TLS_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [384] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/15 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/16 Test: IKE 4096 with subprime param_type: IKE_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [512] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/16 (11 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/17 Test: TLS 4096 with subprime param_type: TLS_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [512] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/17 (11 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/18 Test: IKE 6144 with subprime param_type: IKE_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [768] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/18 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/19 Test: TLS 6144 with subprime param_type: TLS_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [768] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/19 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/20 Test: IKE 8192 with subprime param_type: IKE_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [1024] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/20 (53 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/21 Test: TLS 8192 with subprime param_type: TLS_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [1024] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/21 (52 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/22 Test: Safe Prime 1536 param_type: SAFE_PRIME, key_class: CLASS_1536 p: [192] f76731c8456ad9ea530b21c74afa8166765ceab7f511326dd34c7aac39171a87... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/22 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/23 Test: Safe Prime 2048 param_type: SAFE_PRIME, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 03 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/23 (4 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/24 Test: Safe Prime 3072 param_type: SAFE_PRIME, key_class: CLASS_3072 p: [384] 8766dff7ec496a9a7c9628ae6738abfafe5c467befe918a676b2e50ebeb8f280... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/24 (8 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/25 Test: Safe Prime 4096 param_type: SAFE_PRIME, key_class: CLASS_4096 p: [512] 8bdfc1a3e4bd1cb1f4b151d38ace3d335880a31c7c0dbd8ebdb3e79ed4de06fc... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/25 (11 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/26 Test: Safe Prime 6144 param_type: SAFE_PRIME, key_class: CLASS_6144 p: [768] b90fc1414ade1a1c80a0d6398110f309cac0608c5e8c1721a01850d66013fc38... g: [1] 03 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/26 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/27 Test: Safe Prime 8192 param_type: SAFE_PRIME, key_class: CLASS_8192 p: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... g: [1] 03 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/27 (52 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/28 Test: Safe Prime 1536 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_1536 p: [192] f76731c8456ad9ea530b21c74afa8166765ceab7f511326dd34c7aac39171a87... g: [1] 02 q: [192] 7bb398e422b56cf5298590e3a57d40b33b2e755bfa889936e9a63d561c8b8d43... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/28 (326 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/29 Test: Safe Prime 2048 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 02 q: [256] 70d1b724b4838e2fda0a9aa34ca968277fa72658f0acf69738f9c00a2a687e41... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/29 (626 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/30 Test: Safe Prime 3072 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_3072 p: [384] 8766dff7ec496a9a7c9628ae6738abfafe5c467befe918a676b2e50ebeb8f280... g: [1] 02 q: [384] 43b36ffbf624b54d3e4b1457339c55fd7f2e233df7f48c533b5972875f5c7940... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/30 (1989 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/31 Test: Weak Prime 1024 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/31 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/32 Test: Weak Prime 2048 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/32 (5 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/33 Test: Weak Prime 3072 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/33 (7 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/34 Test: Weak Prime 4096 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_4096 p: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... g: [512] 55a19d92163d9cfad77c71ea29539bdc8ea6bb06d5005d6c8e5d44b9134b2092... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/34 (12 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/35 Test: Weak Prime 6144 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_6144 p: [768] a22496b62168d57e2c604dc881599c1c70ec2428b652360987aac15be5a63e88... g: [768] 34c2b21fd94eb6fd6c0147b950f1be071cdd67a2f17c0de59b7c9e0ed9f881a1... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/35 (22 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/36 Test: Weak Prime 8192 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_8192 p: [1024] 93df6d37dc2aa4ab5ddc734212188f394773f53ebc6e0d2a685d534f228ca8a8... g: [1024] 784d5da1ce9d68ae473181088c24386ac8c7f41ca1cb5d65046e0dbe551d25c2... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/36 (52 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/37 Test: Weak Prime 1024 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [20] ef0c1760d1918fea4dbe0ab237cc6bba97982d4b pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/37 (60 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/38 Test: Weak Prime 2048 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [32] cd9dbf88e5c00316ec9cb46e54d2bfdc0592cd0587c99c911954b6d71ee10a93 pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/38 (319 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/39 Test: Weak Prime 3072 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/39 (1014 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/40 Test: Weak Prime 1024 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [128] 724104a535df4da888d03a12ffa80e056b685e699244baba59eb35fa63afb576... pub_key: [0] PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/40 (58 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/41 Test: Weak Prime 2048 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [256] 5a8441b5111cef817f39b5fd86a756a587fed913f3e91aea41f95e14ffa87bb5... pub_key: [0] PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/41 (315 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/42 Test: Weak Prime 3072 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [384] 4a1963a3a8d181cdf928ae34d7829e3b3151762d666fc07996e752d2cf16d5af... pub_key: [0] PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/42 (1009 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/43 Test: Pubkey = 0 IKE 1536 param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [1] 00 PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/43 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/44 Test: PubKey = 1 TLS 2048 param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [1] 01 PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/44 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/45 Test: Pubkey == -1 IKE 1536 param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/45 (3 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/46 Test: Pubkey = -1 SAFE 2048 WITH SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 02 q: [256] 70d1b724b4838e2fda0a9aa34ca968277fa72658f0acf69738f9c00a2a687e41... pub_key: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/46 (625 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/47 Test: Pubkey = -1 WEAK 3072 KNOWN SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/47 (1012 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/48 Test: Pubkey = -1 WEAK 4096 UNKNOWN SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_4096 p: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... g: [512] 55a19d92163d9cfad77c71ea29539bdc8ea6bb06d5005d6c8e5d44b9134b2092... q: [0] pub_key: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/48 (9 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/49 Test: Pubkey = -1 TLS 6144 WITH SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [768] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/49 (15 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/50 Test: Pubkey = -1 SAFE 8192 param_type: BAD_PUB_KEY, key_class: CLASS_8192 p: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... g: [1] 02 q: [0] pub_key: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/50 (35 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/51 Test: Pubkey small subgroup Weak 1024 prime param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [20] ef0c1760d1918fea4dbe0ab237cc6bba97982d4b pub_key: [1] 03 PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/51 (60 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/52 Test: Pubkey small subgroup Weak 2048 prime param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [32] cd9dbf88e5c00316ec9cb46e54d2bfdc0592cd0587c99c911954b6d71ee10a93 pub_key: [1] 03 PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/52 (319 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/53 Test: Pubkey small subgroup Weak 3072 prime param_type: BAD_PUB_KEY, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [1] 03 PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/53 (1012 ms) [----------] 54 tests from DhValidateCases/SoftokenDhValidate (9412 ms total) [----------] Global test environment tear-down [==========] 76 tests from 6 test suites ran. (11167 ms total) [ PASSED ] 76 tests. gtests.sh: #16: softoken_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/softoken_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: sysinit_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/sysinit_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/sysinit_gtest -n dummy -s CN=dummy -t ,, -x -m 9 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #17: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/sysinit_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing sysinit_gtest [==========] Running 4 tests from 3 test suites. [----------] Global test environment set-up. [----------] 2 tests from Sysinit [ RUN ] Sysinit.LegacyPath [ OK ] Sysinit.LegacyPath (0 ms) [ RUN ] Sysinit.XdgDefaultPath [ OK ] Sysinit.XdgDefaultPath (0 ms) [----------] 2 tests from Sysinit (0 ms total) [----------] 1 test from SysinitSetXdgUserDataHome [ RUN ] SysinitSetXdgUserDataHome.XdgSetPath [ OK ] SysinitSetXdgUserDataHome.XdgSetPath (0 ms) [----------] 1 test from SysinitSetXdgUserDataHome (0 ms total) [----------] 1 test from SysinitSetTrashXdgUserDataHome [ RUN ] SysinitSetTrashXdgUserDataHome.XdgSetToTrashPath [ OK ] SysinitSetTrashXdgUserDataHome.XdgSetToTrashPath (0 ms) [----------] 1 test from SysinitSetTrashXdgUserDataHome (0 ms total) [----------] Global test environment tear-down [==========] 4 tests from 3 test suites ran. (0 ms total) [ PASSED ] 4 tests. gtests.sh: #18: sysinit_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/sysinit_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: blake2b_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/blake2b_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/blake2b_gtest -n dummy -s CN=dummy -t ,, -x -m 10 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #19: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/blake2b_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing blake2b_gtest [==========] Running 523 tests from 3 test suites. [----------] Global test environment set-up. [----------] 11 tests from Blake2BTests [ RUN ] Blake2BTests.ContextTest [ OK ] Blake2BTests.ContextTest (0 ms) [ RUN ] Blake2BTests.ContextTest2 [ OK ] Blake2BTests.ContextTest2 (0 ms) [ RUN ] Blake2BTests.NullContextTest [ OK ] Blake2BTests.NullContextTest (0 ms) [ RUN ] Blake2BTests.CloneTest [ OK ] Blake2BTests.CloneTest (0 ms) [ RUN ] Blake2BTests.NullTest [ OK ] Blake2BTests.NullTest (0 ms) [ RUN ] Blake2BTests.HashTest [ OK ] Blake2BTests.HashTest (0 ms) [ RUN ] Blake2BTests.LongHashTest [ OK ] Blake2BTests.LongHashTest (0 ms) [ RUN ] Blake2BTests.TruncatedHashTest [ OK ] Blake2BTests.TruncatedHashTest (0 ms) [ RUN ] Blake2BTests.TruncatedHashTest2 [ OK ] Blake2BTests.TruncatedHashTest2 (0 ms) [ RUN ] Blake2BTests.OverlongKeyTest [ OK ] Blake2BTests.OverlongKeyTest (0 ms) [ RUN ] Blake2BTests.EmptyKeyTest [ OK ] Blake2BTests.EmptyKeyTest (0 ms) [----------] 11 tests from Blake2BTests (0 ms total) [----------] 256 tests from UnkeyedKAT/Blake2BKATUnkeyed [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/0 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/0 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/1 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/1 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/2 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/2 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/3 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/3 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/4 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/4 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/5 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/5 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/6 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/6 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/7 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/7 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/8 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/8 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/9 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/9 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/10 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/10 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/11 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/11 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/12 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/12 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/13 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/13 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/14 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/14 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/15 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/15 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/16 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/16 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/17 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/17 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/18 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/18 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/19 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/19 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/20 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/20 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/21 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/21 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/22 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/22 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/23 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/23 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/24 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/24 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/25 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/25 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/26 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/26 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/27 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/27 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/28 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/28 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/29 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/29 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/30 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/30 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/31 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/31 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/32 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/32 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/33 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/33 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/34 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/34 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/35 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/35 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/36 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/36 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/37 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/37 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/38 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/38 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/39 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/39 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/40 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/40 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/41 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/41 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/42 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/42 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/43 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/43 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/44 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/44 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/45 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/45 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/46 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/46 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/47 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/47 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/48 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/48 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/49 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/49 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/50 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/50 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/51 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/51 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/52 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/52 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/53 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/53 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/54 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/54 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/55 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/55 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/56 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/56 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/57 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/57 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/58 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/58 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/59 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/59 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/60 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/60 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/61 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/61 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/62 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/62 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/63 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/63 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/64 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/64 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/65 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/65 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/66 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/66 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/67 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/67 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/68 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/68 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/69 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/69 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/70 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/70 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/71 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/71 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/72 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/72 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/73 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/73 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/74 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/74 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/75 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/75 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/76 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/76 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/77 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/77 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/78 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/78 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/79 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/79 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/80 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/80 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/81 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/81 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/82 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/82 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/83 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/83 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/84 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/84 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/85 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/85 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/86 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/86 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/87 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/87 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/88 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/88 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/89 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/89 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/90 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/90 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/91 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/91 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/92 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/92 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/93 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/93 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/94 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/94 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/95 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/95 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/96 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/96 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/97 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/97 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/98 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/98 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/99 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/99 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/100 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/100 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/101 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/101 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/102 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/102 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/103 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/103 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/104 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/104 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/105 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/105 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/106 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/106 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/107 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/107 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/108 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/108 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/109 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/109 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/110 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/110 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/111 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/111 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/112 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/112 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/113 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/113 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/114 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/114 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/115 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/115 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/116 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/116 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/117 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/117 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/118 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/118 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/119 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/119 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/120 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/120 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/121 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/121 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/122 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/122 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/123 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/123 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/124 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/124 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/125 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/125 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/126 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/126 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/127 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/127 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/128 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/128 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/129 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/129 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/130 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/130 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/131 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/131 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/132 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/132 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/133 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/133 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/134 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/134 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/135 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/135 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/136 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/136 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/137 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/137 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/138 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/138 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/139 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/139 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/140 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/140 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/141 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/141 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/142 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/142 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/143 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/143 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/144 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/144 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/145 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/145 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/146 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/146 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/147 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/147 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/148 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/148 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/149 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/149 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/150 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/150 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/151 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/151 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/152 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/152 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/153 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/153 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/154 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/154 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/155 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/155 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/156 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/156 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/157 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/157 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/158 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/158 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/159 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/159 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/160 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/160 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/161 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/161 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/162 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/162 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/163 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/163 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/164 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/164 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/165 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/165 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/166 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/166 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/167 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/167 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/168 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/168 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/169 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/169 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/170 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/170 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/171 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/171 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/172 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/172 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/173 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/173 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/174 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/174 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/175 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/175 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/176 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/176 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/177 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/177 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/178 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/178 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/179 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/179 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/180 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/180 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/181 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/181 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/182 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/182 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/183 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/183 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/184 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/184 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/185 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/185 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/186 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/186 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/187 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/187 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/188 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/188 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/189 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/189 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/190 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/190 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/191 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/191 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/192 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/192 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/193 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/193 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/194 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/194 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/195 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/195 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/196 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/196 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/197 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/197 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/198 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/198 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/199 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/199 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/200 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/200 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/201 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/201 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/202 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/202 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/203 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/203 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/204 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/204 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/205 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/205 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/206 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/206 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/207 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/207 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/208 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/208 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/209 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/209 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/210 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/210 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/211 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/211 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/212 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/212 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/213 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/213 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/214 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/214 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/215 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/215 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/216 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/216 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/217 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/217 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/218 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/218 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/219 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/219 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/220 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/220 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/221 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/221 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/222 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/222 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/223 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/223 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/224 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/224 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/225 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/225 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/226 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/226 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/227 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/227 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/228 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/228 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/229 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/229 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/230 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/230 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/231 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/231 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/232 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/232 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/233 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/233 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/234 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/234 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/235 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/235 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/236 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/236 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/237 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/237 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/238 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/238 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/239 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/239 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/240 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/240 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/241 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/241 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/242 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/242 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/243 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/243 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/244 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/244 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/245 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/245 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/246 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/246 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/247 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/247 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/248 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/248 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/249 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/249 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/250 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/250 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/251 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/251 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/252 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/252 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/253 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/253 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/254 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/254 (0 ms) [ RUN ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/255 [ OK ] UnkeyedKAT/Blake2BKATUnkeyed.Unkeyed/255 (0 ms) [----------] 256 tests from UnkeyedKAT/Blake2BKATUnkeyed (0 ms total) [----------] 256 tests from KeyedKAT/Blake2BKATKeyed [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/0 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/0 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/1 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/1 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/2 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/2 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/3 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/3 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/4 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/4 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/5 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/5 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/6 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/6 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/7 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/7 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/8 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/8 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/9 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/9 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/10 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/10 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/11 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/11 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/12 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/12 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/13 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/13 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/14 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/14 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/15 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/15 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/16 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/16 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/17 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/17 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/18 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/18 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/19 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/19 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/20 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/20 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/21 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/21 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/22 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/22 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/23 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/23 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/24 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/24 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/25 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/25 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/26 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/26 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/27 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/27 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/28 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/28 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/29 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/29 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/30 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/30 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/31 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/31 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/32 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/32 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/33 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/33 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/34 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/34 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/35 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/35 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/36 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/36 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/37 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/37 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/38 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/38 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/39 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/39 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/40 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/40 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/41 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/41 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/42 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/42 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/43 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/43 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/44 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/44 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/45 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/45 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/46 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/46 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/47 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/47 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/48 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/48 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/49 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/49 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/50 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/50 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/51 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/51 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/52 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/52 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/53 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/53 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/54 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/54 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/55 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/55 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/56 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/56 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/57 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/57 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/58 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/58 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/59 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/59 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/60 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/60 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/61 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/61 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/62 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/62 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/63 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/63 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/64 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/64 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/65 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/65 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/66 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/66 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/67 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/67 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/68 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/68 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/69 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/69 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/70 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/70 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/71 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/71 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/72 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/72 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/73 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/73 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/74 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/74 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/75 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/75 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/76 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/76 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/77 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/77 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/78 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/78 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/79 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/79 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/80 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/80 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/81 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/81 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/82 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/82 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/83 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/83 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/84 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/84 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/85 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/85 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/86 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/86 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/87 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/87 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/88 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/88 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/89 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/89 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/90 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/90 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/91 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/91 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/92 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/92 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/93 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/93 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/94 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/94 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/95 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/95 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/96 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/96 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/97 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/97 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/98 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/98 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/99 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/99 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/100 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/100 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/101 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/101 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/102 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/102 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/103 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/103 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/104 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/104 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/105 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/105 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/106 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/106 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/107 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/107 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/108 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/108 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/109 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/109 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/110 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/110 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/111 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/111 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/112 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/112 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/113 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/113 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/114 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/114 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/115 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/115 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/116 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/116 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/117 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/117 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/118 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/118 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/119 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/119 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/120 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/120 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/121 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/121 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/122 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/122 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/123 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/123 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/124 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/124 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/125 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/125 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/126 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/126 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/127 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/127 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/128 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/128 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/129 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/129 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/130 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/130 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/131 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/131 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/132 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/132 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/133 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/133 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/134 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/134 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/135 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/135 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/136 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/136 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/137 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/137 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/138 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/138 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/139 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/139 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/140 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/140 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/141 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/141 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/142 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/142 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/143 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/143 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/144 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/144 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/145 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/145 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/146 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/146 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/147 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/147 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/148 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/148 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/149 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/149 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/150 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/150 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/151 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/151 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/152 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/152 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/153 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/153 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/154 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/154 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/155 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/155 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/156 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/156 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/157 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/157 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/158 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/158 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/159 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/159 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/160 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/160 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/161 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/161 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/162 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/162 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/163 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/163 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/164 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/164 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/165 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/165 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/166 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/166 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/167 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/167 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/168 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/168 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/169 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/169 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/170 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/170 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/171 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/171 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/172 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/172 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/173 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/173 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/174 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/174 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/175 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/175 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/176 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/176 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/177 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/177 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/178 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/178 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/179 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/179 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/180 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/180 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/181 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/181 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/182 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/182 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/183 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/183 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/184 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/184 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/185 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/185 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/186 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/186 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/187 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/187 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/188 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/188 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/189 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/189 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/190 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/190 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/191 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/191 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/192 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/192 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/193 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/193 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/194 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/194 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/195 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/195 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/196 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/196 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/197 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/197 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/198 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/198 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/199 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/199 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/200 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/200 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/201 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/201 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/202 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/202 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/203 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/203 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/204 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/204 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/205 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/205 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/206 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/206 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/207 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/207 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/208 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/208 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/209 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/209 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/210 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/210 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/211 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/211 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/212 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/212 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/213 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/213 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/214 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/214 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/215 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/215 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/216 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/216 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/217 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/217 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/218 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/218 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/219 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/219 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/220 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/220 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/221 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/221 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/222 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/222 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/223 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/223 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/224 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/224 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/225 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/225 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/226 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/226 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/227 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/227 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/228 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/228 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/229 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/229 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/230 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/230 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/231 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/231 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/232 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/232 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/233 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/233 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/234 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/234 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/235 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/235 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/236 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/236 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/237 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/237 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/238 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/238 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/239 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/239 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/240 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/240 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/241 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/241 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/242 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/242 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/243 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/243 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/244 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/244 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/245 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/245 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/246 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/246 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/247 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/247 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/248 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/248 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/249 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/249 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/250 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/250 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/251 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/251 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/252 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/252 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/253 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/253 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/254 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/254 (0 ms) [ RUN ] KeyedKAT/Blake2BKATKeyed.Keyed/255 [ OK ] KeyedKAT/Blake2BKATKeyed.Keyed/255 (0 ms) [----------] 256 tests from KeyedKAT/Blake2BKATKeyed (0 ms total) [----------] Global test environment tear-down [==========] 523 tests from 3 test suites ran. (1 ms total) [ PASSED ] 523 tests. gtests.sh: #20: blake2b_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/blake2b_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: smime_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/smime_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/smime_gtest -n dummy -s CN=dummy -t ,, -x -m 11 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #21: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/smime_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing smime_gtest [==========] Running 5 tests from 1 test suite. [----------] Global test environment set-up. [----------] 5 tests from SMimeTest [ RUN ] SMimeTest.InvalidDER [ OK ] SMimeTest.InvalidDER (0 ms) [ RUN ] SMimeTest.IsSignedValid [ OK ] SMimeTest.IsSignedValid (0 ms) [ RUN ] SMimeTest.TruncatedCmsSignature [ OK ] SMimeTest.TruncatedCmsSignature (0 ms) [ RUN ] SMimeTest.SlightlyTruncatedCmsSignature [ OK ] SMimeTest.SlightlyTruncatedCmsSignature (0 ms) [ RUN ] SMimeTest.IsSignedNull [ OK ] SMimeTest.IsSignedNull (0 ms) [----------] 5 tests from SMimeTest (0 ms total) [----------] Global test environment tear-down [==========] 5 tests from 1 test suite ran. (0 ms total) [ PASSED ] 5 tests. gtests.sh: #22: smime_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/smime_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests gtests.sh: mozpkix_gtest =============================== /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/mozpkix_gtest --empty-password /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/mozpkix_gtest -n dummy -s CN=dummy -t ,, -x -m 12 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #23: create certificate: dummy p256 sign - PASSED ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/mozpkix_gtest ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests executing mozpkix_gtest [==========] Running 1636 tests from 43 test suites. [----------] Global test environment set-up. [----------] 8 tests from pkixbuild [ RUN ] pkixbuild.MaxAcceptableCertChainLength [ OK ] pkixbuild.MaxAcceptableCertChainLength (4 ms) [ RUN ] pkixbuild.BeyondMaxAcceptableCertChainLength [ OK ] pkixbuild.BeyondMaxAcceptableCertChainLength (6 ms) [ RUN ] pkixbuild.NoRevocationCheckingForExpiredCert [ OK ] pkixbuild.NoRevocationCheckingForExpiredCert (6 ms) [ RUN ] pkixbuild.CertificateTransparencyExtension [ OK ] pkixbuild.CertificateTransparencyExtension (7 ms) [ RUN ] pkixbuild.BadEmbeddedSCTWithMultiplePaths [ OK ] pkixbuild.BadEmbeddedSCTWithMultiplePaths (15 ms) [ RUN ] pkixbuild.RevokedEndEntityWithMultiplePaths [ OK ] pkixbuild.RevokedEndEntityWithMultiplePaths (15 ms) [ RUN ] pkixbuild.AvoidUnboundedPathSearchingFailure [ OK ] pkixbuild.AvoidUnboundedPathSearchingFailure (3431 ms) [ RUN ] pkixbuild.AvoidUnboundedPathSearchingSuccess [ OK ] pkixbuild.AvoidUnboundedPathSearchingSuccess (3902 ms) [----------] 8 tests from pkixbuild (7386 ms total) [----------] 1 test from pkixbuild_DSS [ RUN ] pkixbuild_DSS.DSSEndEntityKeyNotAccepted [ OK ] pkixbuild_DSS.DSSEndEntityKeyNotAccepted (7 ms) [----------] 1 test from pkixbuild_DSS (7 ms total) [----------] 2 tests from pkixc_tests [ RUN ] pkixc_tests.Valid_VerifyCodeSigningCertificateChain [ OK ] pkixc_tests.Valid_VerifyCodeSigningCertificateChain (13 ms) [ RUN ] pkixc_tests.Invalid_VerifyCodeSigningCertificateChain [ OK ] pkixc_tests.Invalid_VerifyCodeSigningCertificateChain (9 ms) [----------] 2 tests from pkixc_tests (22 ms total) [----------] 1 test from pkixcert_extension [ RUN ] pkixcert_extension.DuplicateSubjectAltName [ OK ] pkixcert_extension.DuplicateSubjectAltName (3 ms) [----------] 1 test from pkixcert_extension (3 ms total) [----------] 2 tests from pkixcheck_CheckExtendedKeyUsage [ RUN ] pkixcheck_CheckExtendedKeyUsage.none [ OK ] pkixcheck_CheckExtendedKeyUsage.none (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage.empty [ OK ] pkixcheck_CheckExtendedKeyUsage.empty (0 ms) [----------] 2 tests from pkixcheck_CheckExtendedKeyUsage (0 ms total) [----------] 2 tests from pkixcheck_CheckIssuer [ RUN ] pkixcheck_CheckIssuer.ValidIssuer [ OK ] pkixcheck_CheckIssuer.ValidIssuer (0 ms) [ RUN ] pkixcheck_CheckIssuer.EmptyIssuer [ OK ] pkixcheck_CheckIssuer.EmptyIssuer (0 ms) [----------] 2 tests from pkixcheck_CheckIssuer (0 ms total) [----------] 11 tests from pkixcheck_CheckKeyUsage [ RUN ] pkixcheck_CheckKeyUsage.EE_none [ OK ] pkixcheck_CheckKeyUsage.EE_none (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.EE_empty [ OK ] pkixcheck_CheckKeyUsage.EE_empty (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.CA_none [ OK ] pkixcheck_CheckKeyUsage.CA_none (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.CA_empty [ OK ] pkixcheck_CheckKeyUsage.CA_empty (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.maxUnusedBits [ OK ] pkixcheck_CheckKeyUsage.maxUnusedBits (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.tooManyUnusedBits [ OK ] pkixcheck_CheckKeyUsage.tooManyUnusedBits (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.NoValueBytes_NoPaddingBits [ OK ] pkixcheck_CheckKeyUsage.NoValueBytes_NoPaddingBits (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.NoValueBytes_7PaddingBits [ OK ] pkixcheck_CheckKeyUsage.NoValueBytes_7PaddingBits (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.simpleCases [ OK ] pkixcheck_CheckKeyUsage.simpleCases (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.keyCertSign [ OK ] pkixcheck_CheckKeyUsage.keyCertSign (0 ms) [ RUN ] pkixcheck_CheckKeyUsage.unusedBitNotZero [ OK ] pkixcheck_CheckKeyUsage.unusedBitNotZero (0 ms) [----------] 11 tests from pkixcheck_CheckKeyUsage (0 ms total) [----------] 1 test from pkixcheck_CheckSignatureAlgorithm [ RUN ] pkixcheck_CheckSignatureAlgorithm.BuildCertChain [ OK ] pkixcheck_CheckSignatureAlgorithm.BuildCertChain (6 ms) [----------] 1 test from pkixcheck_CheckSignatureAlgorithm (6 ms total) [----------] 6 tests from pkixcheck_CheckValidity [ RUN ] pkixcheck_CheckValidity.Valid_UTCTIME_UTCTIME [ OK ] pkixcheck_CheckValidity.Valid_UTCTIME_UTCTIME (0 ms) [ RUN ] pkixcheck_CheckValidity.Valid_GENERALIZEDTIME_GENERALIZEDTIME [ OK ] pkixcheck_CheckValidity.Valid_GENERALIZEDTIME_GENERALIZEDTIME (0 ms) [ RUN ] pkixcheck_CheckValidity.Valid_GENERALIZEDTIME_UTCTIME [ OK ] pkixcheck_CheckValidity.Valid_GENERALIZEDTIME_UTCTIME (0 ms) [ RUN ] pkixcheck_CheckValidity.Valid_UTCTIME_GENERALIZEDTIME [ OK ] pkixcheck_CheckValidity.Valid_UTCTIME_GENERALIZEDTIME (0 ms) [ RUN ] pkixcheck_CheckValidity.InvalidBeforeNotBefore [ OK ] pkixcheck_CheckValidity.InvalidBeforeNotBefore (0 ms) [ RUN ] pkixcheck_CheckValidity.InvalidAfterNotAfter [ OK ] pkixcheck_CheckValidity.InvalidAfterNotAfter (0 ms) [----------] 6 tests from pkixcheck_CheckValidity (0 ms total) [----------] 4 tests from pkixcheck_ParseValidity [ RUN ] pkixcheck_ParseValidity.BothEmptyNull [ OK ] pkixcheck_ParseValidity.BothEmptyNull (0 ms) [ RUN ] pkixcheck_ParseValidity.NotBeforeEmptyNull [ OK ] pkixcheck_ParseValidity.NotBeforeEmptyNull (0 ms) [ RUN ] pkixcheck_ParseValidity.NotAfterEmptyNull [ OK ] pkixcheck_ParseValidity.NotAfterEmptyNull (0 ms) [ RUN ] pkixcheck_ParseValidity.InvalidNotAfterBeforeNotBefore [ OK ] pkixcheck_ParseValidity.InvalidNotAfterBeforeNotBefore (0 ms) [----------] 4 tests from pkixcheck_ParseValidity (0 ms total) [----------] 70 tests from pkixder_input_tests [ RUN ] pkixder_input_tests.InputInit [ OK ] pkixder_input_tests.InputInit (0 ms) [ RUN ] pkixder_input_tests.InputInitWithNullPointerOrZeroLength [ OK ] pkixder_input_tests.InputInitWithNullPointerOrZeroLength (0 ms) [ RUN ] pkixder_input_tests.InputInitWithLargeData [ OK ] pkixder_input_tests.InputInitWithLargeData (0 ms) [ RUN ] pkixder_input_tests.InputInitMultipleTimes [ OK ] pkixder_input_tests.InputInitMultipleTimes (0 ms) [ RUN ] pkixder_input_tests.PeekWithinBounds [ OK ] pkixder_input_tests.PeekWithinBounds (0 ms) [ RUN ] pkixder_input_tests.PeekPastBounds [ OK ] pkixder_input_tests.PeekPastBounds (0 ms) [ RUN ] pkixder_input_tests.ReadByte [ OK ] pkixder_input_tests.ReadByte (0 ms) [ RUN ] pkixder_input_tests.ReadBytePastEnd [ OK ] pkixder_input_tests.ReadBytePastEnd (0 ms) [ RUN ] pkixder_input_tests.ReadByteWrapAroundPointer [ OK ] pkixder_input_tests.ReadByteWrapAroundPointer (0 ms) [ RUN ] pkixder_input_tests.ReadWord [ OK ] pkixder_input_tests.ReadWord (0 ms) [ RUN ] pkixder_input_tests.ReadWordPastEnd [ OK ] pkixder_input_tests.ReadWordPastEnd (0 ms) [ RUN ] pkixder_input_tests.ReadWordWithInsufficentData [ OK ] pkixder_input_tests.ReadWordWithInsufficentData (0 ms) [ RUN ] pkixder_input_tests.ReadWordWrapAroundPointer [ OK ] pkixder_input_tests.ReadWordWrapAroundPointer (0 ms) [ RUN ] pkixder_input_tests.Skip [ OK ] pkixder_input_tests.Skip (0 ms) [ RUN ] pkixder_input_tests.Skip_ToEnd [ OK ] pkixder_input_tests.Skip_ToEnd (0 ms) [ RUN ] pkixder_input_tests.Skip_PastEnd [ OK ] pkixder_input_tests.Skip_PastEnd (0 ms) [ RUN ] pkixder_input_tests.Skip_ToNewInput [ OK ] pkixder_input_tests.Skip_ToNewInput (0 ms) [ RUN ] pkixder_input_tests.Skip_ToNewInputPastEnd [ OK ] pkixder_input_tests.Skip_ToNewInputPastEnd (0 ms) [ RUN ] pkixder_input_tests.Skip_ToInput [ OK ] pkixder_input_tests.Skip_ToInput (0 ms) [ RUN ] pkixder_input_tests.Skip_WrapAroundPointer [ OK ] pkixder_input_tests.Skip_WrapAroundPointer (0 ms) [ RUN ] pkixder_input_tests.Skip_ToInputPastEnd [ OK ] pkixder_input_tests.Skip_ToInputPastEnd (0 ms) [ RUN ] pkixder_input_tests.SkipToEnd_ToInput [ OK ] pkixder_input_tests.SkipToEnd_ToInput (0 ms) [ RUN ] pkixder_input_tests.SkipToEnd_ToInput_InputAlreadyInited [ OK ] pkixder_input_tests.SkipToEnd_ToInput_InputAlreadyInited (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndSkipValue [ OK ] pkixder_input_tests.ExpectTagAndSkipValue (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndSkipValueWithTruncatedData [ OK ] pkixder_input_tests.ExpectTagAndSkipValueWithTruncatedData (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndSkipValueWithOverrunData [ OK ] pkixder_input_tests.ExpectTagAndSkipValueWithOverrunData (0 ms) [ RUN ] pkixder_input_tests.AtEndOnUnInitializedInput [ OK ] pkixder_input_tests.AtEndOnUnInitializedInput (0 ms) [ RUN ] pkixder_input_tests.AtEndAtBeginning [ OK ] pkixder_input_tests.AtEndAtBeginning (0 ms) [ RUN ] pkixder_input_tests.AtEndAtEnd [ OK ] pkixder_input_tests.AtEndAtEnd (0 ms) [ RUN ] pkixder_input_tests.MarkAndGetInput [ OK ] pkixder_input_tests.MarkAndGetInput (0 ms) [ RUN ] pkixder_input_tests.MarkAndGetInputDifferentInput [ OK ] pkixder_input_tests.MarkAndGetInputDifferentInput (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_AtEnd [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_AtEnd (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_TruncatedAfterTag [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_TruncatedAfterTag (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_ValidEmpty [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_ValidNotEmpty [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_ValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidNotEmptyValueTruncated (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidWrongLength [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm1 [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm1 (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm2 [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm2 (0 ms) [ RUN ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm3 [ OK ] pkixder_input_tests.ReadTagAndGetValue_Input_InvalidHighTagNumberForm3 (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_ValidEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_ValidNotEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_ValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidNotEmptyValueTruncated (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidWrongLength [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidWrongTag [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Reader_InvalidWrongTag (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_ValidEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_ValidNotEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_ValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidNotEmptyValueTruncated (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidWrongLength [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidWrongTag [ OK ] pkixder_input_tests.ExpectTagAndGetValue_Input_InvalidWrongTag (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_ValidEmpty [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_InValidNotEmpty [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_InValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_Input_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_Input_InvalidNotEmptyValueTruncated (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_InvalidWrongLength [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndEmptyValue_InvalidWrongTag [ OK ] pkixder_input_tests.ExpectTagAndEmptyValue_InvalidWrongTag (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_ValidEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_ValidEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_ValidNotEmpty [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_ValidNotEmpty (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidNotEmptyValueTruncated [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidNotEmptyValueTruncated (1 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidWrongLength [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidWrongLength (0 ms) [ RUN ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidWrongTag [ OK ] pkixder_input_tests.ExpectTagAndGetTLV_Input_InvalidWrongTag (0 ms) [ RUN ] pkixder_input_tests.EndAtEnd [ OK ] pkixder_input_tests.EndAtEnd (0 ms) [ RUN ] pkixder_input_tests.EndBeforeEnd [ OK ] pkixder_input_tests.EndBeforeEnd (0 ms) [ RUN ] pkixder_input_tests.EndAtBeginning [ OK ] pkixder_input_tests.EndAtBeginning (0 ms) [ RUN ] pkixder_input_tests.NestedOf [ OK ] pkixder_input_tests.NestedOf (0 ms) [ RUN ] pkixder_input_tests.NestedOfWithTruncatedData [ OK ] pkixder_input_tests.NestedOfWithTruncatedData (0 ms) [ RUN ] pkixder_input_tests.MatchRestAtEnd [ OK ] pkixder_input_tests.MatchRestAtEnd (0 ms) [ RUN ] pkixder_input_tests.MatchRest1Match [ OK ] pkixder_input_tests.MatchRest1Match (0 ms) [ RUN ] pkixder_input_tests.MatchRest1Mismatch [ OK ] pkixder_input_tests.MatchRest1Mismatch (0 ms) [ RUN ] pkixder_input_tests.MatchRest2WithTrailingByte [ OK ] pkixder_input_tests.MatchRest2WithTrailingByte (0 ms) [ RUN ] pkixder_input_tests.MatchRest2Mismatch [ OK ] pkixder_input_tests.MatchRest2Mismatch (0 ms) [----------] 70 tests from pkixder_input_tests (1 ms total) [----------] 10 tests from pkixder_pki_types_tests [ RUN ] pkixder_pki_types_tests.CertificateSerialNumber [ OK ] pkixder_pki_types_tests.CertificateSerialNumber (0 ms) [ RUN ] pkixder_pki_types_tests.CertificateSerialNumberLongest [ OK ] pkixder_pki_types_tests.CertificateSerialNumberLongest (0 ms) [ RUN ] pkixder_pki_types_tests.CertificateSerialNumberCrazyLong [ OK ] pkixder_pki_types_tests.CertificateSerialNumberCrazyLong (0 ms) [ RUN ] pkixder_pki_types_tests.CertificateSerialNumberZeroLength [ OK ] pkixder_pki_types_tests.CertificateSerialNumberZeroLength (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionV1ExplicitEncodingAllowed [ OK ] pkixder_pki_types_tests.OptionalVersionV1ExplicitEncodingAllowed (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionV2 [ OK ] pkixder_pki_types_tests.OptionalVersionV2 (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionV3 [ OK ] pkixder_pki_types_tests.OptionalVersionV3 (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionUnknown [ OK ] pkixder_pki_types_tests.OptionalVersionUnknown (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionInvalidTooLong [ OK ] pkixder_pki_types_tests.OptionalVersionInvalidTooLong (0 ms) [ RUN ] pkixder_pki_types_tests.OptionalVersionMissing [ OK ] pkixder_pki_types_tests.OptionalVersionMissing (0 ms) [----------] 10 tests from pkixder_pki_types_tests (0 ms total) [----------] 56 tests from pkixder_universal_types_tests [ RUN ] pkixder_universal_types_tests.BooleanTrue01 [ OK ] pkixder_universal_types_tests.BooleanTrue01 (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanTrue42 [ OK ] pkixder_universal_types_tests.BooleanTrue42 (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanTrueFF [ OK ] pkixder_universal_types_tests.BooleanTrueFF (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanFalse [ OK ] pkixder_universal_types_tests.BooleanFalse (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanInvalidLength [ OK ] pkixder_universal_types_tests.BooleanInvalidLength (0 ms) [ RUN ] pkixder_universal_types_tests.BooleanInvalidZeroLength [ OK ] pkixder_universal_types_tests.BooleanInvalidZeroLength (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalBooleanValidEncodings [ OK ] pkixder_universal_types_tests.OptionalBooleanValidEncodings (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalBooleanInvalidEncodings [ OK ] pkixder_universal_types_tests.OptionalBooleanInvalidEncodings (0 ms) [ RUN ] pkixder_universal_types_tests.Enumerated [ OK ] pkixder_universal_types_tests.Enumerated (0 ms) [ RUN ] pkixder_universal_types_tests.EnumeratedNotShortestPossibleDER [ OK ] pkixder_universal_types_tests.EnumeratedNotShortestPossibleDER (0 ms) [ RUN ] pkixder_universal_types_tests.EnumeratedOutOfAcceptedRange [ OK ] pkixder_universal_types_tests.EnumeratedOutOfAcceptedRange (0 ms) [ RUN ] pkixder_universal_types_tests.EnumeratedInvalidZeroLength [ OK ] pkixder_universal_types_tests.EnumeratedInvalidZeroLength (0 ms) [ RUN ] pkixder_universal_types_tests.ValidControl [ OK ] pkixder_universal_types_tests.ValidControl (0 ms) [ RUN ] pkixder_universal_types_tests.TimeTimeZoneOffset [ OK ] pkixder_universal_types_tests.TimeTimeZoneOffset (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidZeroLength [ OK ] pkixder_universal_types_tests.TimeInvalidZeroLength (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidLocal [ OK ] pkixder_universal_types_tests.TimeInvalidLocal (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidTruncated [ OK ] pkixder_universal_types_tests.TimeInvalidTruncated (0 ms) [ RUN ] pkixder_universal_types_tests.TimeNoSeconds [ OK ] pkixder_universal_types_tests.TimeNoSeconds (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidPrefixedYear [ OK ] pkixder_universal_types_tests.TimeInvalidPrefixedYear (0 ms) [ RUN ] pkixder_universal_types_tests.TimeTooManyDigits [ OK ] pkixder_universal_types_tests.TimeTooManyDigits (0 ms) [ RUN ] pkixder_universal_types_tests.GeneralizedTimeYearValidRange [ OK ] pkixder_universal_types_tests.GeneralizedTimeYearValidRange (0 ms) [ RUN ] pkixder_universal_types_tests.TimeYearInvalid1969 [ OK ] pkixder_universal_types_tests.TimeYearInvalid1969 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthDaysValidRange [ OK ] pkixder_universal_types_tests.TimeMonthDaysValidRange (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthInvalid0 [ OK ] pkixder_universal_types_tests.TimeMonthInvalid0 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthInvalid13 [ OK ] pkixder_universal_types_tests.TimeMonthInvalid13 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeDayInvalid0 [ OK ] pkixder_universal_types_tests.TimeDayInvalid0 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthDayInvalidPastEndOfMonth [ OK ] pkixder_universal_types_tests.TimeMonthDayInvalidPastEndOfMonth (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebLeapYear2016 [ OK ] pkixder_universal_types_tests.TimeMonthFebLeapYear2016 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebLeapYear2000 [ OK ] pkixder_universal_types_tests.TimeMonthFebLeapYear2000 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebLeapYear2400 [ OK ] pkixder_universal_types_tests.TimeMonthFebLeapYear2400 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebNotLeapYear2014 [ OK ] pkixder_universal_types_tests.TimeMonthFebNotLeapYear2014 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMonthFebNotLeapYear2100 [ OK ] pkixder_universal_types_tests.TimeMonthFebNotLeapYear2100 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeHoursValidRange [ OK ] pkixder_universal_types_tests.TimeHoursValidRange (0 ms) [ RUN ] pkixder_universal_types_tests.TimeHoursInvalid_24_00_00 [ OK ] pkixder_universal_types_tests.TimeHoursInvalid_24_00_00 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMinutesValidRange [ OK ] pkixder_universal_types_tests.TimeMinutesValidRange (0 ms) [ RUN ] pkixder_universal_types_tests.TimeMinutesInvalid60 [ OK ] pkixder_universal_types_tests.TimeMinutesInvalid60 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeSecondsValidRange [ OK ] pkixder_universal_types_tests.TimeSecondsValidRange (0 ms) [ RUN ] pkixder_universal_types_tests.TimeSecondsInvalid60 [ OK ] pkixder_universal_types_tests.TimeSecondsInvalid60 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeSecondsInvalid61 [ OK ] pkixder_universal_types_tests.TimeSecondsInvalid61 (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidZulu [ OK ] pkixder_universal_types_tests.TimeInvalidZulu (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidExtraData [ OK ] pkixder_universal_types_tests.TimeInvalidExtraData (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidCenturyChar [ OK ] pkixder_universal_types_tests.TimeInvalidCenturyChar (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidYearChar [ OK ] pkixder_universal_types_tests.TimeInvalidYearChar (0 ms) [ RUN ] pkixder_universal_types_tests.GeneralizedTimeInvalidMonthChar [ OK ] pkixder_universal_types_tests.GeneralizedTimeInvalidMonthChar (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidDayChar [ OK ] pkixder_universal_types_tests.TimeInvalidDayChar (0 ms) [ RUN ] pkixder_universal_types_tests.TimeInvalidFractionalSeconds [ OK ] pkixder_universal_types_tests.TimeInvalidFractionalSeconds (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalIntegerSupportedDefault [ OK ] pkixder_universal_types_tests.OptionalIntegerSupportedDefault (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalIntegerUnsupportedDefault [ OK ] pkixder_universal_types_tests.OptionalIntegerUnsupportedDefault (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalIntegerSupportedDefaultAtEnd [ OK ] pkixder_universal_types_tests.OptionalIntegerSupportedDefaultAtEnd (0 ms) [ RUN ] pkixder_universal_types_tests.OptionalIntegerNonDefaultValue [ OK ] pkixder_universal_types_tests.OptionalIntegerNonDefaultValue (0 ms) [ RUN ] pkixder_universal_types_tests.Null [ OK ] pkixder_universal_types_tests.Null (0 ms) [ RUN ] pkixder_universal_types_tests.NullWithBadLength [ OK ] pkixder_universal_types_tests.NullWithBadLength (0 ms) [ RUN ] pkixder_universal_types_tests.OID [ OK ] pkixder_universal_types_tests.OID (0 ms) [ RUN ] pkixder_universal_types_tests.SkipOptionalImplicitPrimitiveTag [ OK ] pkixder_universal_types_tests.SkipOptionalImplicitPrimitiveTag (0 ms) [ RUN ] pkixder_universal_types_tests.SkipOptionalImplicitPrimitiveTagMismatch [ OK ] pkixder_universal_types_tests.SkipOptionalImplicitPrimitiveTagMismatch (0 ms) [ RUN ] pkixder_universal_types_tests.NoSkipOptionalImplicitConstructedTag [ OK ] pkixder_universal_types_tests.NoSkipOptionalImplicitConstructedTag (0 ms) [----------] 56 tests from pkixder_universal_types_tests (0 ms total) [----------] 1 test from pkixnames_CheckCertHostname [ RUN ] pkixnames_CheckCertHostname.SANWithoutSequence [ OK ] pkixnames_CheckCertHostname.SANWithoutSequence (3 ms) [----------] 1 test from pkixnames_CheckCertHostname (3 ms total) [----------] 2 tests from pkixocsp_CreateEncodedOCSPRequest [ RUN ] pkixocsp_CreateEncodedOCSPRequest.ChildCertLongSerialNumberTest [ OK ] pkixocsp_CreateEncodedOCSPRequest.ChildCertLongSerialNumberTest (185 ms) [ RUN ] pkixocsp_CreateEncodedOCSPRequest.LongestSupportedSerialNumberTest [ OK ] pkixocsp_CreateEncodedOCSPRequest.LongestSupportedSerialNumberTest (166 ms) [----------] 2 tests from pkixocsp_CreateEncodedOCSPRequest (351 ms total) [----------] 8 tests from pkixocsp_VerifyEncodedResponse_successful [ RUN ] pkixocsp_VerifyEncodedResponse_successful.good_byKey [ OK ] pkixocsp_VerifyEncodedResponse_successful.good_byKey (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.good_byName [ OK ] pkixocsp_VerifyEncodedResponse_successful.good_byName (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.good_byKey_without_nextUpdate [ OK ] pkixocsp_VerifyEncodedResponse_successful.good_byKey_without_nextUpdate (4 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.revoked [ OK ] pkixocsp_VerifyEncodedResponse_successful.revoked (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.unknown [ OK ] pkixocsp_VerifyEncodedResponse_successful.unknown (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.good_unsupportedSignatureAlgorithm [ OK ] pkixocsp_VerifyEncodedResponse_successful.good_unsupportedSignatureAlgorithm (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.check_validThrough [ OK ] pkixocsp_VerifyEncodedResponse_successful.check_validThrough (3 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_successful.ct_extension [ OK ] pkixocsp_VerifyEncodedResponse_successful.ct_extension (3 ms) [----------] 8 tests from pkixocsp_VerifyEncodedResponse_successful (25 ms total) [----------] 13 tests from pkixocsp_VerifyEncodedResponse_DelegatedResponder [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byKey [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byKey (80 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byName [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byName (103 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byKey_missing_signer [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byKey_missing_signer (119 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byName_missing_signer [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_byName_missing_signer (123 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_expired [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_expired (114 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_future [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_future (66 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_no_eku [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_no_eku (74 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_wrong_eku [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_wrong_eku (95 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_tampered_eku [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_tampered_eku (141 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_unknown_issuer [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_unknown_issuer (269 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_subca_1_first [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_subca_1_first (269 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_subca_1_second [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_indirect_subca_1_second (265 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_unsupportedSignatureAlgorithmOnResponder [ OK ] pkixocsp_VerifyEncodedResponse_DelegatedResponder.good_unsupportedSignatureAlgorithmOnResponder (185 ms) [----------] 13 tests from pkixocsp_VerifyEncodedResponse_DelegatedResponder (1903 ms total) [----------] 3 tests from pkixocsp_VerifyEncodedResponse_GetCertTrust [ RUN ] pkixocsp_VerifyEncodedResponse_GetCertTrust.InheritTrust [ OK ] pkixocsp_VerifyEncodedResponse_GetCertTrust.InheritTrust (98 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_GetCertTrust.TrustAnchor [ OK ] pkixocsp_VerifyEncodedResponse_GetCertTrust.TrustAnchor (85 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_GetCertTrust.ActivelyDistrusted [ OK ] pkixocsp_VerifyEncodedResponse_GetCertTrust.ActivelyDistrusted (144 ms) [----------] 3 tests from pkixocsp_VerifyEncodedResponse_GetCertTrust (327 ms total) [----------] 9 tests from pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/0 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/0 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/1 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/1 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/2 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/2 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/3 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/3 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/4 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/4 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/5 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/5 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/6 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/6 (9 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/7 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/7 (6 ms) [ RUN ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/8 [ OK ] pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck.MatchingName/8 (6 ms) [----------] 9 tests from pkixbuild_IssuerNameCheck/pkixbuild_IssuerNameCheck (57 ms total) [----------] 8 tests from pkixcert_extension/pkixcert_extension [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/0 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/0 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/1 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/1 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/2 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/2 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/3 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/3 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/4 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/4 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/5 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/5 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/6 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/6 (3 ms) [ RUN ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/7 [ OK ] pkixcert_extension/pkixcert_extension.ExtensionHandledProperly/7 (3 ms) [----------] 8 tests from pkixcert_extension/pkixcert_extension (25 ms total) [----------] 8 tests from pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/0 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/0 (6 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/1 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/1 (6 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/2 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/2 (6 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/3 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/3 (6 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/4 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/4 (6 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/5 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/5 (9 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/6 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/6 (9 ms) [ RUN ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/7 [ OK ] pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm.IsValidChainForAlgorithm/7 (9 ms) [----------] 8 tests from pkixcert_IsValidChainForAlgorithm/pkixcert_IsValidChainForAlgorithm (58 ms total) [----------] 216 tests from pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/0 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/0 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/1 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/1 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/2 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/2 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/3 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/3 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/4 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/4 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/5 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/5 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/6 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/6 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/7 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/7 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/8 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/8 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/9 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/9 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/10 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/10 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/11 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/11 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/12 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/12 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/13 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/13 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/14 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/14 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/15 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/15 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/16 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/16 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/17 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/17 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/18 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/18 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/19 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/19 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/20 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/20 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/21 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/21 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/22 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/22 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/23 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/23 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/24 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/24 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/25 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/25 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/26 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/26 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/27 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/27 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/28 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/28 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/29 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/29 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/30 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/30 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/31 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/31 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/32 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/32 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/33 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/33 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/34 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/34 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/35 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/35 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/36 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/36 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/37 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/37 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/38 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/38 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/39 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/39 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/40 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/40 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/41 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/41 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/42 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/42 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/43 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/43 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/44 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/44 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/45 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/45 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/46 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/46 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/47 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/47 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/48 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/48 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/49 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/49 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/50 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/50 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/51 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/51 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/52 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/52 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/53 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/53 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/54 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/54 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/55 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/55 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/56 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/56 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/57 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/57 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/58 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/58 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/59 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/59 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/60 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/60 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/61 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/61 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/62 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/62 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/63 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/63 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/64 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/64 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/65 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/65 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/66 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/66 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/67 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/67 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/68 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/68 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/69 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/69 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/70 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/70 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/71 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/71 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/72 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/72 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/73 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/73 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/74 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/74 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/75 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/75 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/76 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/76 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/77 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/77 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/78 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/78 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/79 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/79 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/80 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/80 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/81 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/81 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/82 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/82 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/83 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/83 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/84 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/84 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/85 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/85 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/86 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/86 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/87 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/87 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/88 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/88 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/89 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/89 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/90 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/90 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/91 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/91 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/92 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/92 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/93 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/93 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/94 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/94 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/95 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/95 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/96 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/96 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/97 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/97 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/98 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/98 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/99 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/99 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/100 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/100 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/101 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/101 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/102 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/102 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/103 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/103 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/104 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/104 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/105 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/105 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/106 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/106 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/107 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/107 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/108 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/108 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/109 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/109 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/110 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/110 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/111 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/111 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/112 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/112 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/113 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/113 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/114 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/114 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/115 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/115 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/116 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/116 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/117 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/117 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/118 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/118 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/119 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/119 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/120 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/120 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/121 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/121 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/122 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/122 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/123 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/123 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/124 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/124 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/125 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/125 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/126 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/126 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/127 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/127 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/128 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/128 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/129 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/129 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/130 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/130 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/131 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/131 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/132 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/132 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/133 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/133 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/134 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/134 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/135 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/135 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/136 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/136 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/137 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/137 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/138 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/138 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/139 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/139 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/140 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/140 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/141 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/141 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/142 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/142 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/143 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/143 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/144 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/144 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/145 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/145 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/146 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/146 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/147 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/147 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/148 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/148 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/149 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/149 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/150 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/150 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/151 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/151 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/152 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/152 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/153 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/153 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/154 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/154 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/155 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/155 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/156 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/156 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/157 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/157 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/158 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/158 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/159 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/159 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/160 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/160 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/161 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/161 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/162 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/162 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/163 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/163 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/164 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/164 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/165 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/165 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/166 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/166 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/167 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/167 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/168 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/168 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/169 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/169 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/170 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/170 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/171 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/171 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/172 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/172 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/173 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/173 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/174 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/174 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/175 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/175 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/176 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/176 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/177 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/177 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/178 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/178 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/179 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/179 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/180 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/180 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/181 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/181 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/182 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/182 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/183 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/183 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/184 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/184 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/185 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/185 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/186 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/186 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/187 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/187 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/188 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/188 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/189 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/189 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/190 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/190 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/191 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/191 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/192 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/192 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/193 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/193 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/194 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/194 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/195 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/195 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/196 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/196 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/197 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/197 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/198 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/198 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/199 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/199 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/200 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/200 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/201 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/201 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/202 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/202 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/203 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/203 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/204 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/204 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/205 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/205 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/206 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/206 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/207 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/207 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/208 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/208 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/209 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/209 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/210 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/210 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/211 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/211 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/212 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/212 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/213 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/213 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/214 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/214 (0 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/215 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest.EKUTestcase/215 (0 ms) [----------] 216 tests from pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageTest (0 ms total) [----------] 14 tests from pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/0 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/0 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/1 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/1 (7 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/2 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/2 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/3 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/3 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/4 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/4 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/5 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/5 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/6 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/6 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/7 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/7 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/8 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/8 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/9 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/9 (9 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/10 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/10 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/11 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/11 (7 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/12 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/12 (6 ms) [ RUN ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/13 [ OK ] pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest.EKUChainTestcase/13 (6 ms) [----------] 14 tests from pkixcheck_CheckExtendedKeyUsage/CheckExtendedKeyUsageChainTest (89 ms total) [----------] 17 tests from pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/0 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/0 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/1 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/1 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/2 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/2 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/3 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/3 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/4 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/4 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/5 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/5 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/6 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/6 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/7 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/7 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/8 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/8 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/9 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/9 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/10 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/10 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/11 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/11 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/12 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/12 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/13 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/13 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/14 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/14 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/15 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/15 (0 ms) [ RUN ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/16 [ OK ] pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm.CheckSignatureAlgorithm/16 (0 ms) [----------] 17 tests from pkixcheck_CheckSignatureAlgorithm/pkixcheck_CheckSignatureAlgorithm (0 ms total) [----------] 7 tests from pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/0 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/0 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/1 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/1 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/2 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/2 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/3 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/3 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/4 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/4 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/5 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/5 (0 ms) [ RUN ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/6 [ OK ] pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal.TLSFeaturesSatisfiedInternal/6 (0 ms) [----------] 7 tests from pkixcheck_TLSFeaturesSatisfiedInternal/pkixcheck_TLSFeaturesSatisfiedInternal (0 ms total) [----------] 4 tests from pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid [ RUN ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/0 [ OK ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/0 (0 ms) [ RUN ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/1 [ OK ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/1 (0 ms) [ RUN ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/2 [ OK ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/2 (0 ms) [ RUN ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/3 [ OK ] pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid.Valid/3 (0 ms) [----------] 4 tests from pkixder_DigestAlgorithmIdentifier_Valid/pkixder_DigestAlgorithmIdentifier_Valid (0 ms total) [----------] 2 tests from pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid [ RUN ] pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid.Invalid/0 [ OK ] pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid.Invalid/0 (0 ms) [ RUN ] pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid.Invalid/1 [ OK ] pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid.Invalid/1 (0 ms) [----------] 2 tests from pkixder_DigestAlgorithmIdentifier_Invalid/pkixder_DigestAlgorithmIdentifier_Invalid (0 ms total) [----------] 9 tests from pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/0 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/0 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/1 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/1 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/2 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/2 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/3 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/3 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/4 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/4 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/5 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/5 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/6 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/6 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/7 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/7 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/8 [ OK ] pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid.Valid/8 (0 ms) [----------] 9 tests from pkixder_SignatureAlgorithmIdentifierValue_Valid/pkixder_SignatureAlgorithmIdentifierValue_Valid (0 ms total) [----------] 4 tests from pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid [ RUN ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/0 [ OK ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/0 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/1 [ OK ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/1 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/2 [ OK ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/2 (0 ms) [ RUN ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/3 [ OK ] pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid.Invalid/3 (0 ms) [----------] 4 tests from pkixder_SignatureAlgorithmIdentifier_Invalid/pkixder_SignatureAlgorithmIdentifier_Invalid (0 ms total) [----------] 105 tests from pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/0 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/0 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/1 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/1 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/2 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/2 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/3 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/3 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/4 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/4 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/5 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/5 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/6 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/6 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/7 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/7 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/8 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/8 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/9 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/9 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/10 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/10 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/11 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/11 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/12 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/12 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/13 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/13 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/14 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/14 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/15 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/15 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/16 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/16 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/17 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/17 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/18 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/18 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/19 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/19 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/20 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/20 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/21 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/21 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/22 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/22 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/23 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/23 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/24 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/24 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/25 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/25 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/26 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/26 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/27 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/27 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/28 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/28 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/29 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/29 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/30 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/30 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/31 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/31 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/32 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/32 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/33 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/33 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/34 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.Integer/34 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/0 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/0 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/1 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/1 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/2 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/2 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/3 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/3 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/4 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/4 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/5 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/5 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/6 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/6 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/7 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/7 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/8 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/8 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/9 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/9 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/10 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/10 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/11 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/11 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/12 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/12 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/13 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/13 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/14 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/14 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/15 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/15 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/16 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/16 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/17 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/17 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/18 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/18 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/19 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/19 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/20 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/20 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/21 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/21 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/22 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/22 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/23 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/23 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/24 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/24 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/25 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/25 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/26 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/26 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/27 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/27 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/28 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/28 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/29 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/29 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/30 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/30 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/31 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/31 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/32 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/32 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/33 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/33 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/34 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_without_significantBytes/34 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/0 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/0 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/1 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/1 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/2 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/2 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/3 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/3 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/4 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/4 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/5 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/5 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/6 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/6 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/7 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/7 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/8 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/8 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/9 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/9 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/10 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/10 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/11 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/11 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/12 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/12 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/13 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/13 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/14 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/14 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/15 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/15 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/16 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/16 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/17 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/17 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/18 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/18 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/19 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/19 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/20 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/20 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/21 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/21 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/22 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/22 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/23 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/23 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/24 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/24 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/25 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/25 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/26 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/26 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/27 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/27 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/28 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/28 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/29 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/29 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/30 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/30 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/31 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/31 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/32 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/32 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/33 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/33 (0 ms) [ RUN ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/34 [ OK ] pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer.PositiveInteger_with_significantBytes/34 (0 ms) [----------] 105 tests from pkixder_universal_types_tests_Integer/pkixder_universal_types_tests_Integer (0 ms total) [----------] 128 tests from pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/0 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/0 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/1 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/1 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/2 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/2 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/3 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/3 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/4 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/4 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/5 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/5 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/6 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/6 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/7 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/7 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/8 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/8 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/9 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/9 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/10 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/10 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/11 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/11 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/12 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/12 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/13 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/13 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/14 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/14 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/15 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/15 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/16 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/16 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/17 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/17 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/18 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/18 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/19 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/19 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/20 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/20 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/21 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/21 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/22 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/22 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/23 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/23 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/24 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/24 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/25 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/25 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/26 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/26 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/27 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/27 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/28 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/28 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/29 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/29 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/30 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/30 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/31 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/31 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/32 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/32 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/33 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/33 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/34 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/34 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/35 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/35 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/36 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/36 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/37 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/37 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/38 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/38 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/39 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/39 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/40 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/40 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/41 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/41 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/42 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/42 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/43 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/43 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/44 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/44 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/45 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/45 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/46 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/46 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/47 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/47 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/48 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/48 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/49 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/49 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/50 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/50 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/51 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/51 (1 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/52 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/52 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/53 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/53 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/54 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/54 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/55 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/55 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/56 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/56 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/57 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/57 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/58 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/58 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/59 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/59 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/60 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/60 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/61 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/61 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/62 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/62 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/63 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/63 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/64 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/64 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/65 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/65 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/66 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/66 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/67 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/67 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/68 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/68 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/69 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/69 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/70 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/70 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/71 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/71 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/72 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/72 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/73 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/73 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/74 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/74 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/75 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/75 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/76 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/76 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/77 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/77 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/78 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/78 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/79 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/79 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/80 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/80 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/81 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/81 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/82 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/82 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/83 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/83 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/84 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/84 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/85 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/85 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/86 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/86 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/87 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/87 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/88 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/88 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/89 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/89 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/90 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/90 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/91 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/91 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/92 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/92 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/93 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/93 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/94 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/94 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/95 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/95 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/96 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/96 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/97 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/97 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/98 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/98 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/99 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/99 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/100 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/100 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/101 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/101 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/102 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/102 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/103 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/103 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/104 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/104 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/105 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/105 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/106 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/106 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/107 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/107 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/108 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/108 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/109 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/109 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/110 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/110 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/111 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/111 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/112 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/112 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/113 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/113 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/114 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/114 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/115 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/115 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/116 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/116 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/117 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/117 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/118 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/118 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/119 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/119 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/120 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/120 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/121 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/121 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/122 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/122 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/123 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/123 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/124 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/124 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/125 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/125 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/126 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/126 (0 ms) [ RUN ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/127 [ OK ] pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID.MatchPresentedDNSIDWithReferenceDNSID/127 (0 ms) [----------] 128 tests from pkixnames_MatchPresentedDNSIDWithReferenceDNSID/pkixnames_MatchPresentedDNSIDWithReferenceDNSID (1 ms total) [----------] 24 tests from pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/0 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/0 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/1 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/1 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/2 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/2 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/3 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/3 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/4 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/4 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/5 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/5 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/6 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/6 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/7 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.MatchPresentedDNSIDWithReferenceDNSID/7 (0 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/0 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/0 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/1 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/1 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/2 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/2 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/3 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/3 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/4 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/4 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/5 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/5 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/6 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/6 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/7 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_CN_NoSAN/7 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/0 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/0 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/1 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/1 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/2 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/2 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/3 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/3 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/4 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/4 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/5 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/5 (3 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/6 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/6 (4 ms) [ RUN ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/7 [ OK ] pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison.CheckCertHostname_SAN/7 (3 ms) [----------] 24 tests from pkixnames_Turkish_I_Comparison/pkixnames_Turkish_I_Comparison (49 ms total) [----------] 143 tests from pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/0 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/0 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/1 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/1 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/2 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/2 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/3 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/3 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/4 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/4 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/5 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/5 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/6 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/6 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/7 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/7 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/8 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/8 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/9 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/9 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/10 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/10 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/11 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/11 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/12 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/12 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/13 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/13 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/14 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/14 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/15 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/15 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/16 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/16 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/17 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/17 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/18 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/18 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/19 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/19 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/20 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/20 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/21 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/21 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/22 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/22 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/23 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/23 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/24 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/24 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/25 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/25 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/26 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/26 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/27 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/27 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/28 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/28 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/29 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/29 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/30 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/30 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/31 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/31 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/32 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/32 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/33 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/33 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/34 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/34 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/35 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/35 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/36 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/36 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/37 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/37 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/38 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/38 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/39 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/39 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/40 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/40 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/41 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/41 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/42 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/42 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/43 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/43 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/44 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/44 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/45 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/45 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/46 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/46 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/47 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/47 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/48 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/48 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/49 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/49 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/50 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/50 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/51 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/51 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/52 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/52 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/53 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/53 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/54 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/54 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/55 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/55 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/56 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/56 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/57 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/57 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/58 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/58 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/59 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/59 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/60 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/60 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/61 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/61 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/62 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/62 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/63 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/63 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/64 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/64 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/65 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/65 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/66 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/66 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/67 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/67 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/68 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/68 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/69 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/69 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/70 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/70 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/71 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/71 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/72 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/72 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/73 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/73 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/74 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/74 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/75 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/75 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/76 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/76 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/77 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/77 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/78 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/78 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/79 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/79 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/80 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/80 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/81 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/81 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/82 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/82 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/83 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/83 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/84 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/84 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/85 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/85 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/86 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/86 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/87 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/87 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/88 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/88 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/89 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/89 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/90 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/90 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/91 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/91 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/92 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/92 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/93 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/93 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/94 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/94 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/95 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/95 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/96 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/96 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/97 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/97 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/98 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/98 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/99 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/99 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/100 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/100 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/101 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/101 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/102 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/102 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/103 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/103 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/104 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/104 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/105 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/105 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/106 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/106 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/107 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/107 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/108 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/108 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/109 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/109 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/110 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/110 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/111 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/111 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/112 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/112 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/113 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/113 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/114 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/114 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/115 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/115 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/116 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/116 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/117 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/117 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/118 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/118 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/119 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/119 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/120 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/120 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/121 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/121 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/122 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/122 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/123 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/123 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/124 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/124 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/125 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/125 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/126 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/126 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/127 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/127 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/128 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/128 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/129 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/129 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/130 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/130 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/131 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/131 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/132 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/132 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/133 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/133 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/134 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/134 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/135 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/135 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/136 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/136 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/137 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/137 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/138 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/138 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/139 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/139 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/140 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/140 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/141 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/141 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/142 [ OK ] pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/142 (0 ms) [----------] 143 tests from pkixnames_IsValidReferenceDNSID/pkixnames_IsValidReferenceDNSID (0 ms total) [----------] 8 tests from pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/0 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/0 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/1 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/1 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/2 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/2 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/3 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/3 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/4 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/4 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/5 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/5 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/6 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/6 (0 ms) [ RUN ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/7 [ OK ] pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID.IsValidReferenceDNSID/7 (0 ms) [----------] 8 tests from pkixnames_IsValidReferenceDNSID_Turkish_I/pkixnames_IsValidReferenceDNSID (0 ms total) [----------] 53 tests from pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/0 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/0 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/1 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/1 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/2 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/2 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/3 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/3 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/4 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/4 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/5 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/5 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/6 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/6 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/7 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/7 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/8 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/8 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/9 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/9 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/10 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/10 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/11 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/11 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/12 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/12 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/13 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/13 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/14 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/14 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/15 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/15 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/16 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/16 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/17 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/17 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/18 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/18 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/19 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/19 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/20 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/20 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/21 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/21 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/22 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/22 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/23 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/23 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/24 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/24 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/25 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/25 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/26 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/26 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/27 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/27 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/28 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/28 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/29 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/29 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/30 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/30 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/31 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/31 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/32 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/32 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/33 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/33 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/34 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/34 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/35 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/35 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/36 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/36 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/37 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/37 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/38 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/38 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/39 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/39 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/40 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/40 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/41 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/41 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/42 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/42 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/43 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/43 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/44 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/44 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/45 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/45 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/46 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/46 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/47 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/47 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/48 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/48 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/49 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/49 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/50 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/50 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/51 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/51 (0 ms) [ RUN ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/52 [ OK ] pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address.ParseIPv4Address/52 (0 ms) [----------] 53 tests from pkixnames_ParseIPv4Address/pkixnames_ParseIPv4Address (0 ms total) [----------] 83 tests from pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/0 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/0 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/1 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/1 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/2 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/2 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/3 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/3 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/4 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/4 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/5 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/5 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/6 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/6 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/7 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/7 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/8 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/8 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/9 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/9 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/10 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/10 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/11 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/11 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/12 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/12 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/13 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/13 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/14 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/14 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/15 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/15 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/16 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/16 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/17 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/17 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/18 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/18 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/19 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/19 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/20 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/20 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/21 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/21 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/22 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/22 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/23 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/23 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/24 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/24 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/25 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/25 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/26 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/26 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/27 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/27 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/28 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/28 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/29 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/29 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/30 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/30 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/31 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/31 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/32 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/32 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/33 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/33 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/34 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/34 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/35 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/35 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/36 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/36 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/37 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/37 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/38 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/38 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/39 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/39 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/40 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/40 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/41 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/41 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/42 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/42 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/43 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/43 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/44 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/44 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/45 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/45 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/46 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/46 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/47 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/47 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/48 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/48 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/49 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/49 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/50 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/50 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/51 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/51 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/52 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/52 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/53 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/53 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/54 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/54 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/55 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/55 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/56 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/56 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/57 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/57 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/58 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/58 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/59 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/59 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/60 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/60 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/61 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/61 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/62 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/62 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/63 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/63 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/64 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/64 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/65 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/65 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/66 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/66 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/67 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/67 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/68 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/68 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/69 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/69 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/70 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/70 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/71 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/71 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/72 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/72 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/73 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/73 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/74 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/74 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/75 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/75 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/76 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/76 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/77 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/77 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/78 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/78 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/79 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/79 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/80 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/80 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/81 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/81 (0 ms) [ RUN ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/82 [ OK ] pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address.ParseIPv6Address/82 (0 ms) [----------] 83 tests from pkixnames_ParseIPv6Address/pkixnames_ParseIPv6Address (1 ms total) [----------] 80 tests from pkixnames_CheckCertHostname/pkixnames_CheckCertHostname [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/0 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/1 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/1 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/2 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/2 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/3 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/4 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/4 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/5 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/6 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/7 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/8 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/9 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/9 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/10 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/11 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/12 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/13 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/14 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/15 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/15 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/16 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/16 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/17 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/17 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/18 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/18 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/19 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/20 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/21 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/22 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/22 (4 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/23 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/23 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/24 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/25 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/25 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/26 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/26 (6 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/27 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/28 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/28 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/29 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/30 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/31 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/31 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/32 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/32 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/33 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/33 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/34 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/34 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/35 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/36 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/37 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/38 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/39 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/39 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/40 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/40 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/41 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/41 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/42 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/43 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/44 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/45 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/45 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/46 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/47 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/47 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/48 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/48 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/49 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/49 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/50 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/51 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/51 (4 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/52 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/52 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/53 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/53 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/54 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/54 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/55 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/55 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/56 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/56 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/57 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/57 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/58 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/58 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/59 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/59 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/60 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/60 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/61 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/61 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/62 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/62 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/63 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/63 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/64 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/64 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/65 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/65 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/66 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/66 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/67 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/67 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/68 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/68 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/69 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/69 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/70 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/70 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/71 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/71 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/72 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/72 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/73 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/73 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/74 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/74 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/75 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/75 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/76 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/76 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/77 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/77 (6 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/78 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/78 (3 ms) [ RUN ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/79 [ OK ] pkixnames_CheckCertHostname/pkixnames_CheckCertHostname.CheckCertHostname/79 (3 ms) [----------] 80 tests from pkixnames_CheckCertHostname/pkixnames_CheckCertHostname (248 ms total) [----------] 256 tests from pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/0 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/1 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/1 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/2 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/2 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/3 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/4 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/4 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/5 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/6 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/7 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/8 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/9 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/9 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/10 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/11 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/12 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/13 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/14 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/15 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/15 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/16 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/16 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/17 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/17 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/18 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/18 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/19 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/20 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/21 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/22 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/22 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/23 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/23 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/24 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/25 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/25 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/26 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/26 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/27 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/28 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/28 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/29 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/30 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/31 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/31 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/32 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/32 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/33 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/33 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/34 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/34 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/35 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/36 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/37 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/38 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/39 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/39 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/40 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/40 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/41 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/41 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/42 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/43 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/44 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/45 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/45 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/46 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/47 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/47 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/48 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/48 (6 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/49 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/49 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/50 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/51 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/51 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/52 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/52 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/53 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/53 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/54 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/54 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/55 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/55 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/56 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/56 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/57 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/57 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/58 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/58 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/59 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/59 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/60 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/60 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/61 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/61 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/62 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/62 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/63 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/63 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/64 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/64 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/65 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/65 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/66 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/66 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/67 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/67 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/68 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/68 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/69 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/69 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/70 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/70 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/71 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/71 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/72 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/72 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/73 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/73 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/74 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/74 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/75 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/75 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/76 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/76 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/77 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/77 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/78 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/78 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/79 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/79 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/80 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/80 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/81 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/81 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/82 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/82 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/83 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/83 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/84 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/84 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/85 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/85 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/86 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/86 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/87 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/87 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/88 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/88 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/89 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/89 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/90 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/90 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/91 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/91 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/92 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/92 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/93 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/93 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/94 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/94 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/95 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/95 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/96 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/96 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/97 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/97 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/98 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/98 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/99 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/99 (6 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/100 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/100 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/101 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/101 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/102 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/102 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/103 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/103 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/104 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/104 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/105 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/105 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/106 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/106 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/107 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/107 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/108 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/108 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/109 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/109 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/110 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/110 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/111 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/111 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/112 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/112 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/113 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/113 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/114 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/114 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/115 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/115 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/116 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/116 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/117 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/117 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/118 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/118 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/119 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/119 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/120 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/120 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/121 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/121 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/122 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/122 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/123 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/123 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/124 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/124 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/125 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/125 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/126 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/126 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/127 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.CN_NoSAN/127 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/0 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/1 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/1 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/2 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/2 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/3 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/4 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/4 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/5 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/6 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/7 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/8 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/9 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/9 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/10 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/11 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/12 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/13 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/14 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/15 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/15 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/16 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/16 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/17 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/17 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/18 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/18 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/19 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/20 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/21 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/22 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/22 (5 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/23 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/23 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/24 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/25 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/25 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/26 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/26 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/27 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/28 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/28 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/29 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/30 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/31 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/31 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/32 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/32 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/33 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/33 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/34 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/34 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/35 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/36 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/37 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/38 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/39 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/39 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/40 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/40 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/41 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/41 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/42 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/43 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/44 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/45 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/45 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/46 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/47 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/47 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/48 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/48 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/49 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/49 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/50 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/51 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/51 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/52 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/52 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/53 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/53 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/54 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/54 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/55 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/55 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/56 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/56 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/57 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/57 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/58 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/58 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/59 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/59 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/60 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/60 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/61 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/61 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/62 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/62 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/63 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/63 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/64 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/64 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/65 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/65 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/66 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/66 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/67 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/67 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/68 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/68 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/69 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/69 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/70 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/70 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/71 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/71 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/72 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/72 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/73 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/73 (6 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/74 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/74 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/75 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/75 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/76 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/76 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/77 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/77 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/78 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/78 (4 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/79 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/79 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/80 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/80 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/81 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/81 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/82 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/82 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/83 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/83 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/84 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/84 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/85 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/85 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/86 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/86 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/87 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/87 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/88 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/88 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/89 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/89 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/90 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/90 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/91 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/91 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/92 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/92 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/93 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/93 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/94 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/94 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/95 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/95 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/96 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/96 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/97 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/97 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/98 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/98 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/99 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/99 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/100 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/100 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/101 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/101 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/102 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/102 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/103 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/103 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/104 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/104 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/105 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/105 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/106 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/106 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/107 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/107 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/108 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/108 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/109 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/109 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/110 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/110 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/111 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/111 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/112 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/112 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/113 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/113 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/114 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/114 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/115 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/115 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/116 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/116 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/117 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/117 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/118 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/118 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/119 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/119 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/120 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/120 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/121 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/121 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/122 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/122 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/123 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/123 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/124 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/124 (6 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/125 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/125 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/126 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/126 (3 ms) [ RUN ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/127 [ OK ] pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference.SubjectAltName_CNNotDNSName/127 (3 ms) [----------] 256 tests from pkixnames_CheckCertHostname_DNSID_MATCH_PARAMS/pkixnames_CheckCertHostname_PresentedMatchesReference (792 ms total) [----------] 106 tests from pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/0 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/1 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/1 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/2 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/2 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/3 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/4 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/4 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/5 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/6 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/7 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/8 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/9 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/9 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/10 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/11 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/12 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/13 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/14 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/15 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/15 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/16 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/16 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/17 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/17 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/18 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/18 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/19 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/20 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/21 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/22 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/22 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/23 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/23 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/24 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/25 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/25 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/26 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/26 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/27 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/28 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/28 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/29 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/30 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/31 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/31 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/32 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/32 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/33 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/33 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/34 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/34 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/35 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/36 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/37 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/38 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/39 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/39 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/40 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/40 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/41 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/41 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/42 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/43 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/44 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/45 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/45 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/46 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/47 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/47 (6 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/48 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/48 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/49 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/49 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/50 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/51 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/51 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/52 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInIPAddressSAN/52 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/0 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/0 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/1 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/1 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/2 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/2 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/3 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/3 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/4 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/4 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/5 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/5 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/6 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/6 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/7 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/7 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/8 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/8 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/9 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/9 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/10 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/10 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/11 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/11 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/12 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/12 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/13 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/13 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/14 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/14 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/15 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/15 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/16 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/16 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/17 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/17 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/18 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/18 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/19 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/19 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/20 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/20 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/21 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/21 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/22 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/22 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/23 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/23 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/24 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/24 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/25 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/25 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/26 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/26 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/27 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/27 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/28 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/28 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/29 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/29 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/30 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/30 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/31 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/31 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/32 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/32 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/33 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/33 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/34 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/34 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/35 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/35 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/36 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/36 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/37 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/37 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/38 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/38 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/39 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/39 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/40 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/40 (4 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/41 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/41 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/42 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/42 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/43 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/43 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/44 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/44 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/45 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/45 (6 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/46 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/46 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/47 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/47 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/48 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/48 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/49 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/49 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/50 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/50 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/51 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/51 (3 ms) [ RUN ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/52 [ OK ] pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses.ValidIPv4AddressInCN_NoSAN/52 (3 ms) [----------] 106 tests from pkixnames_CheckCertHostname_IPV4_ADDRESSES/pkixnames_CheckCertHostname_IPV4_Addresses (328 ms total) [----------] 133 tests from pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/0 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/0 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/1 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/1 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/2 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/2 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/3 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/3 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/4 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/4 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/5 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/5 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/6 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/6 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/7 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/7 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/8 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/8 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/9 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/9 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/10 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/10 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/11 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/11 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/12 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/12 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/13 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/13 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/14 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/14 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/15 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/15 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/16 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/16 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/17 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/17 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/18 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/18 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/19 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/19 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/20 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/20 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/21 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/21 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/22 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/22 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/23 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/23 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/24 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/24 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/25 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/25 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/26 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/26 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/27 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/27 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/28 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/28 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/29 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/29 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/30 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/30 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/31 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/31 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/32 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/32 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/33 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/33 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/34 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/34 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/35 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/35 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/36 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/36 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/37 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/37 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/38 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/38 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/39 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/39 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/40 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/40 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/41 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/41 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/42 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/42 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/43 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/43 (6 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/44 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/44 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/45 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/45 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/46 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/46 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/47 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/47 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/48 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/48 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/49 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/49 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/50 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/50 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/51 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/51 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/52 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/52 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/53 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/53 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/54 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/54 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/55 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/55 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/56 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/56 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/57 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/57 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/58 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/58 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/59 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/59 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/60 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/60 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/61 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/61 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/62 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/62 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/63 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/63 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/64 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/64 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/65 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/65 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/66 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/66 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/67 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/67 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/68 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/68 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/69 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/69 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/70 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/70 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/71 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/71 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/72 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/72 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/73 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/73 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/74 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/74 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/75 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/75 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/76 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/76 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/77 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/77 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/78 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/78 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/79 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/79 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/80 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/80 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/81 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/81 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/82 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/82 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/83 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/83 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/84 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/84 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/85 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/85 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/86 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/86 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/87 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/87 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/88 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/88 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/89 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/89 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/90 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/90 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/91 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/91 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/92 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/92 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/93 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/93 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/94 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/94 (6 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/95 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/95 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/96 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/96 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/97 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/97 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/98 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/98 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/99 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/99 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/100 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/100 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/101 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/101 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/102 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/102 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/103 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/103 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/104 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/104 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/105 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/105 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/106 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/106 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/107 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/107 (4 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/108 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/108 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/109 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/109 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/110 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/110 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/111 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/111 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/112 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/112 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/113 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/113 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/114 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/114 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/115 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/115 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/116 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/116 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/117 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/117 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/118 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/118 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/119 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/119 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/120 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/120 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/121 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/121 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/122 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/122 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/123 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/123 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/124 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/124 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/125 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/125 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/126 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/126 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/127 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/127 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/128 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/128 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/129 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/129 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/130 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/130 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/131 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/131 (3 ms) [ RUN ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/132 [ OK ] pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints.NameConstraintsEnforcedForDirectlyIssuedEndEntity/132 (3 ms) [----------] 133 tests from pkixnames_CheckNameConstraints/pkixnames_CheckNameConstraints (409 ms total) [----------] 5 tests from pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/0 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/0 (4 ms) [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/1 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/1 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/2 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/2 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/3 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/3 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/4 [ OK ] pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate.NameConstraintsEnforcedOnIntermediate/4 (3 ms) [----------] 5 tests from pkixnames_CheckNameConstraintsOnIntermediate/pkixnames_CheckNameConstraintsOnIntermediate (16 ms total) [----------] 5 tests from pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/0 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/0 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/1 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/1 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/2 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/2 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/3 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/3 (3 ms) [ RUN ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/4 [ OK ] pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage.NameConstraintsEnforcedForNonServerAuthUsage/4 (3 ms) [----------] 5 tests from pkixnames_CheckNameConstraintsForNonServerAuthUsage/pkixnames_CheckNameConstraintsForNonServerAuthUsage (15 ms total) [----------] 8 tests from pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/0 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/0 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/1 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/1 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/2 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/2 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/3 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/3 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/4 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/4 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/5 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/5 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/6 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/6 (0 ms) [ RUN ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/7 [ OK ] pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes.CorrectErrorCode/7 (0 ms) [----------] 8 tests from pkixocsp_VerifyEncodedResponse_WithoutResponseBytes/pkixocsp_VerifyEncodedResponse_WithoutResponseBytes (0 ms total) [----------] Global test environment tear-down [==========] 1636 tests from 43 test suites ran. (12521 ms total) [ PASSED ] 1636 tests. gtests.sh: #24: mozpkix_gtest run successfully - PASSED test output dir: /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests/mozpkix_gtest/report.xml executing sed to parse the xml report processing the parsed report ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/gtests TIMESTAMP gtests END: Tue Aug 3 00:57:01 UTC 2021 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Tue Aug 3 00:57:01 UTC 2021 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #1: create ssl_gtest database - PASSED ~/RPM/BUILD/nss-3.66.0/nss/tests ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n client -s CN=client -t ,, -x -m 1 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #2: create certificate: client rsa sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa -s CN=rsa -t ,, -x -m 2 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #3: create certificate: rsa rsa sign kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa2048 -s CN=rsa2048 -t ,, -x -m 3 -w -2 -v 120 -k rsa -g 2048 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4: create certificate: rsa2048 rsa2048 sign kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa8192 -s CN=rsa8192 -t ,, -x -m 4 -w -2 -v 120 -k rsa -g 8192 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #5: create certificate: rsa8192 rsa8192 sign kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_sign -s CN=rsa_sign -t ,, -x -m 5 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #6: create certificate: rsa_sign rsa sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_pss -s CN=rsa_pss -t ,, -x -m 6 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7: create certificate: rsa_pss rsapss sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_pss384 -s CN=rsa_pss384 -t ,, -x -m 7 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA384 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8: create certificate: rsa_pss384 rsapss384 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_pss512 -s CN=rsa_pss512 -t ,, -x -m 8 -w -2 -v 120 -k rsa -g 2048 --pss -Z SHA512 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9: create certificate: rsa_pss512 rsapss512 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_pss_noparam -s CN=rsa_pss_noparam -t ,, -x -m 9 -w -2 -v 120 -k rsa -g 2048 --pss -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #10: create certificate: rsa_pss_noparam rsapss_noparam sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_decrypt -s CN=rsa_decrypt -t ,, -x -m 10 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11: create certificate: rsa_decrypt rsa kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n ecdsa256 -s CN=ecdsa256 -t ,, -x -m 11 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12: create certificate: ecdsa256 p256 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n ecdsa384 -s CN=ecdsa384 -t ,, -x -m 12 -w -2 -v 120 -k ec -q secp384r1 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #13: create certificate: ecdsa384 p384 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n ecdsa521 -s CN=ecdsa521 -t ,, -x -m 13 -w -2 -v 120 -k ec -q secp521r1 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #14: create certificate: ecdsa521 p521 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n ecdh_ecdsa -s CN=ecdh_ecdsa -t ,, -x -m 14 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15: create certificate: ecdh_ecdsa p256 kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_ca -s CN=rsa_ca -t CT,CT,CT -x -m 15 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #16: create certificate: rsa_ca rsa_ca ca - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_chain -s CN=rsa_chain -t ,, -c rsa_ca -m 16 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #17: create certificate: rsa_chain rsa_chain sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_pss_ca -s CN=rsa_pss_ca -t CT,CT,CT -x -m 17 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #18: create certificate: rsa_pss_ca rsapss_ca ca - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_pss_chain -s CN=rsa_pss_chain -t ,, -c rsa_pss_ca -m 18 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #19: create certificate: rsa_pss_chain rsapss_chain sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n rsa_ca_rsa_pss_chain -s CN=rsa_ca_rsa_pss_chain -t ,, -c rsa_ca -m 19 -w -2 -v 120 -k rsa -g 1024 --pss-sign -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #20: create certificate: rsa_ca_rsa_pss_chain rsa_ca_rsapss_chain sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n ecdh_rsa -s CN=ecdh_rsa -t ,, -c rsa_ca -m 20 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #21: create certificate: ecdh_rsa ecdh_rsa kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n dsa -s CN=dsa -t ,, -x -m 21 -w -2 -v 120 -k dsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #22: create certificate: dsa dsa sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n delegator_ecdsa256 -s CN=delegator_ecdsa256 -t ,, -x -m 22 -w -2 -v 120 -k ec -q nistp256 --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #23: create certificate: delegator_ecdsa256 delegator_p256 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n delegator_rsae2048 -s CN=delegator_rsae2048 -t ,, -x -m 23 -w -2 -v 120 -k rsa -g 2048 --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #24: create certificate: delegator_rsae2048 delegator_rsae2048 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/pkix/ssl_gtests -n delegator_rsa_pss2048 -s CN=delegator_rsa_pss2048 -t ,, -x -m 24 -w -2 -v 120 -k rsa -g 2048 --pss --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #25: create certificate: delegator_rsa_pss2048 delegator_rsa_pss2048 sign - PASSED DEBUG: ssl_gtests will be divided into 1 chunk(s) [==========] Running 12780 tests from 103 test suites. [----------] Global test environment set-up. [----------] 8 tests from SelfEncryptTest128 [ RUN ] SelfEncryptTest128.ShortKeyName Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortKeyName (0 ms) [ RUN ] SelfEncryptTest128.ShortIv Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortIv (0 ms) [ RUN ] SelfEncryptTest128.ShortCiphertextLen Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortCiphertextLen (0 ms) [ RUN ] SelfEncryptTest128.ShortCiphertext Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortCiphertext (0 ms) [ RUN ] SelfEncryptTest128.MacWithAESKeyEncrypt Error: SEC_ERROR_LIBRARY_FAILURE [ OK ] SelfEncryptTest128.MacWithAESKeyEncrypt (0 ms) [ RUN ] SelfEncryptTest128.AESWithMacKeyEncrypt Error: SEC_ERROR_INVALID_KEY [ OK ] SelfEncryptTest128.AESWithMacKeyEncrypt (0 ms) [ RUN ] SelfEncryptTest128.MacWithAESKeyDecrypt Error: SEC_ERROR_LIBRARY_FAILURE [ OK ] SelfEncryptTest128.MacWithAESKeyDecrypt (0 ms) [ RUN ] SelfEncryptTest128.AESWithMacKeyDecrypt Error: SEC_ERROR_INVALID_KEY [ OK ] SelfEncryptTest128.AESWithMacKeyDecrypt (1 ms) [----------] 8 tests from SelfEncryptTest128 (1 ms total) [----------] 108 tests from TlsConnectStreamTls13 [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicket (10 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicketPha Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicketPha (11 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicketClientAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicketClientAuth (9 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttLateReadTls Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttLateReadTls (8 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttCoalesceReadTls Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttCoalesceReadTls (8 ms) [ RUN ] TlsConnectStreamTls13.TimePassesByDefault Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TimePassesByDefault (1012 ms) [ RUN ] TlsConnectStreamTls13.BadAntiReplayArgs Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.BadAntiReplayArgs (0 ms) [ RUN ] TlsConnectStreamTls13.SuppressEndOfEarlyDataClientOnly Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SuppressEndOfEarlyDataClientOnly (8 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuth (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthAfterResumption Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthAfterResumption (10 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthMultiple Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthMultiple (12 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthConcurrent Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthConcurrent (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthBeforeKeyUpdate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthBeforeKeyUpdate (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthDuringClientKeyUpdate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthDuringClientKeyUpdate (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthMissingExtension Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthMissingExtension (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthAfterClientAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthAfterClientAuth (9 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthContextMismatch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [47] 1052ddc46d6dd2cd29b48d19cb7398cd09001c000d0018001604030503060302... handshake new: [47] 101bddc46d6dd2cd29b48d19cb7398cd09001c000d0018001604030503060302... record old: [51] 0d00002f1052ddc46d6dd2cd29b48d19cb7398cd09001c000d00180016040305... record new: [51] 0d00002f101bddc46d6dd2cd29b48d19cb7398cd09001c000d00180016040305... server: Filtered packet: [73] 17030300444cd18f6f368c4d0eceddd8efa7372691a40dbedfcafc66d10d1c21... server: Fatal alert sent: 47 server: Read error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Fatal alert received: 47 client: Read error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthContextMismatch (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthBadSignature Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [132] 080400802f7902840597b78a0450464d5fff221950a71bdf23b7507f5a0e67c8... handshake new: [132] 080449802f7902840597b78a0450464d5fff221950a71bdf23b7507f5a0e67c8... record old: [639] 0b0001cf10983fc75b7f8eb6cf84d3de3fef2d8be90001bb0001b6308201b230... record new: [639] 0b0001cf10983fc75b7f8eb6cf84d3de3fef2d8be90001bb0001b6308201b230... client: Filtered packet: [661] 170303029060a3742eca0f609adbb906def10449ca7e02fe24f03b9ce7da861a... server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthBadSignature (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthDecline Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Fatal alert sent: 116 server: Read error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthDecline (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthWithSessionTicketsEnabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthWithSessionTicketsEnabled (8 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthDisjointSchemes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthDisjointSchemes (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionAllNoopClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionAllNoopClient (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionAllNoopServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionAllNoopServer (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionEmptyWriterClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionEmptyWriterClient (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionEmptyWriterServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionEmptyWriterServer (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionWriterDisable Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionWriterDisable (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOverride Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionOverride (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientToServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionClientToServer (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerToClientSH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionServerToClientSH (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerToClientEE Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionServerToClientEE (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionUnsolicitedServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionUnsolicitedServer (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerReject Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionServerReject (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientReject Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionClientReject (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerRejectAlert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 246 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 246 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionServerRejectAlert (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientRejectAlert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 246 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionClientRejectAlert (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOnlyWriter Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CustomExtensionOnlyWriter (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOnlyHandler Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CustomExtensionOnlyHandler (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOverrunBuffer Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SEC_ERROR_APPLICATION_CALLBACK_ERROR: The certificate was rejected by extra checks in the application. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionOverrunBuffer (3 ms) [ RUN ] TlsConnectStreamTls13.RetryCallbackWithSessionTicketToken Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.RetryCallbackWithSessionTicketToken (8 ms) [ RUN ] TlsConnectStreamTls13.RetryStatelessDamageFirstClientHello Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING handshake old: [180] 0303101b1d45fddd94e99897f85330e392c914a673d6eb6cb52f82f4b6c95ae0... handshake new: [184] 0303101b1d45fddd94e99897f85330e392c914a673d6eb6cb52f82f4b6c95ae0... record old: [184] 010000b40303101b1d45fddd94e99897f85330e392c914a673d6eb6cb52f82f4... record new: [188] 010000b80303101b1d45fddd94e99897f85330e392c914a673d6eb6cb52f82f4... client: Filtered packet: [193] 16030100bc010000b80303101b1d45fddd94e99897f85330e392c914a673d6eb... server: Changing state from INIT to CONNECTING handshake old: [508] 0303101b1d45fddd94e99897f85330e392c914a673d6eb6cb52f82f4b6c95ae0... handshake new: [512] 0303101b1d45fddd94e99897f85330e392c914a673d6eb6cb52f82f4b6c95ae0... record old: [512] 010001fc0303101b1d45fddd94e99897f85330e392c914a673d6eb6cb52f82f4... record new: [516] 010002000303101b1d45fddd94e99897f85330e392c914a673d6eb6cb52f82f4... client: Filtered packet: [521] 1603030204010002000303101b1d45fddd94e99897f85330e392c914a673d6eb... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryStatelessDamageFirstClientHello (7 ms) [ RUN ] TlsConnectStreamTls13.RetryStatelessDamageSecondClientHello Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING handshake old: [508] 03031248f4ccec455941d41a483c2548d17a6ce90292c58de17886cd928ac044... handshake new: [512] 03031248f4ccec455941d41a483c2548d17a6ce90292c58de17886cd928ac044... record old: [512] 010001fc03031248f4ccec455941d41a483c2548d17a6ce90292c58de17886cd... record new: [516] 0100020003031248f4ccec455941d41a483c2548d17a6ce90292c58de17886cd... client: Filtered packet: [521] 16030302040100020003031248f4ccec455941d41a483c2548d17a6ce90292c5... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryStatelessDamageSecondClientHello (7 ms) [ RUN ] TlsConnectStreamTls13.SecondClientHelloSendSameTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SecondClientHelloSendSameTicket (9 ms) [ RUN ] TlsConnectStreamTls13.RetryWithDifferentCipherSuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [151] 0303fe351da703929f5eef38c9395718eb7dbd644291c950de03c2544224f2f1... handshake new: [151] 0303fe351da703929f5eef38c9395718eb7dbd644291c950de03c2544224f2f1... record old: [155] 020000970303fe351da703929f5eef38c9395718eb7dbd644291c950de03c254... record new: [155] 020000970303fe351da703929f5eef38c9395718eb7dbd644291c950de03c254... server: Filtered packet: [823] 160303009b020000970303fe351da703929f5eef38c9395718eb7dbd644291c9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryWithDifferentCipherSuite (14 ms) [ RUN ] TlsConnectStreamTls13.HrrThenTls12 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.HrrThenTls12 (3 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttHrrThenTls12 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. [ OK ] TlsConnectStreamTls13.ZeroRttHrrThenTls12 (7 ms) [ RUN ] TlsConnectStreamTls13.HrrThenTls12SupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03036cb9c25323752043edbeb4dfdaa508c976039699941a1969f8d71c21b7f6... handshake new: [194] 03036cb9c25323752043edbeb4dfdaa508c976039699941a1969f8d71c21b7f6... record old: [191] 010000bb03036cb9c25323752043edbeb4dfdaa508c976039699941a1969f8d7... record new: [198] 010000c203036cb9c25323752043edbeb4dfdaa508c976039699941a1969f8d7... client: Filtered packet: [203] 16030100c6010000c203036cb9c25323752043edbeb4dfdaa508c97603969994... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.HrrThenTls12SupportedVersions (7 ms) [ RUN ] TlsConnectStreamTls13.KeyUpdateTooEarly_Client Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [774] 160303005a0200005603036695315ea115c7476ec64f1dcecb84efb7b9d9fc32... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.KeyUpdateTooEarly_Client (4 ms) [ RUN ] TlsConnectStreamTls13.KeyUpdateTooEarly_Server Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [58] 17030300351fb973ebc770686768b7e61b9bb3155219c08013c8763408b96d28... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.KeyUpdateTooEarly_Server (4 ms) [ RUN ] TlsConnectStreamTls13.DecryptRecordClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DecryptRecordClient (4 ms) [ RUN ] TlsConnectStreamTls13.DecryptRecordServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DecryptRecordServer (4 ms) [ RUN ] TlsConnectStreamTls13.DropRecordServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record drop: TLS 1.2 Data 3000000000000:[40] 52149860f2619bb8a05da48fb4e6953c032839bed0aeb89960655c2574b99aa6... server: Drop packet server: Filtered packet: [72] 170303004352149860f2619bb8a05da48fb4e6953c032839bed0aeb8993385ad... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DropRecordServer (4 ms) [ RUN ] TlsConnectStreamTls13.DropRecordClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record drop: TLS 1.2 Data 3000000000000:[43] 3fdeefc72f5c3f244851086801e5690eb3eb7217f3d98e5436839d24908fe37f... client: Drop packet client: Filtered packet: [72] 17030300433fdeefc72f5c3f244851086801e5690eb3eb7217f3d98e54368390... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DropRecordClient (4 ms) [ RUN ] TlsConnectStreamTls13.Tls13FailedWriteSecondFlight Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SOCKET_WRITE_FAILURE: Attempt to write encrypted data to underlying socket failed. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Tls13FailedWriteSecondFlight (3 ms) [ RUN ] TlsConnectStreamTls13.LargeRecord Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [10] 00010203040506070809 record new: [16384] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... client: Filtered packet: [16406] 17030340118296664484bf1581186b28bd19999b1a8f30a1a6c0dae1c9fd37d8... client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.LargeRecord (4 ms) [ RUN ] TlsConnectStreamTls13.TooLargeRecord Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [10] 00010203040506070809 record new: [16385] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... client: Filtered packet: [16407] 17030340123e482040fd80208137728c370d14cad8f545f8d498b5ed31dcc7f3... server: Fatal alert sent: 22 client: Fatal alert received: 22 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TooLargeRecord (5 ms) [ RUN ] TlsConnectStreamTls13.UnencryptedFinishedMessage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [41] 1603030024140000207698408f4eec0e179630dc2aa1585116d75411ff301f5d... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.UnencryptedFinishedMessage (3 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerZeroRtt (8 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncPostHandshake Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncPostHandshake (4 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncEarlyAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncEarlyAuth (5 ms) [ RUN ] TlsConnectStreamTls13.ForwardInvalidData Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.ForwardInvalidData (2 ms) [ RUN ] TlsConnectStreamTls13.SuppressEndOfEarlyData Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SuppressEndOfEarlyData (8 ms) [ RUN ] TlsConnectStreamTls13.ClientHelloF5Padding Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] TlsConnectStreamTls13.ClientHelloF5Padding (2 ms) [ RUN ] TlsConnectStreamTls13.RecordSizeClientExtensionInvalid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [180] 0303442d329d530ca94914b17638da19638f9930633edea33ad70da8fecfb248... handshake new: [180] 0303442d329d530ca94914b17638da19638f9930633edea33ad70da8fecfb248... record old: [184] 010000b40303442d329d530ca94914b17638da19638f9930633edea33ad70da8... record new: [184] 010000b40303442d329d530ca94914b17638da19638f9930633edea33ad70da8... client: Filtered packet: [189] 16030100b8010000b40303442d329d530ca94914b17638da19638f9930633ede... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RecordSizeClientExtensionInvalid (4 ms) [ RUN ] TlsConnectStreamTls13.ExternalResumptionUseSecondTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalResumptionUseSecondTicket (10 ms) [ RUN ] TlsConnectStreamTls13.ExternalTokenAfterHrr Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalTokenAfterHrr (22 ms) [ RUN ] TlsConnectStreamTls13.ExternalTokenWithPeerId Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client client: setting external resumption token server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalTokenWithPeerId (10 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello13 Version: TLS 1.3 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello13 (2 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHelloTwice Version: TLS 1.3 client: Send Direct [6] 140303000101 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHelloTwice (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterClientHelloEmptySid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [6] 140303000101 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterClientHelloEmptySid (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterServerHelloEmptySid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [32] 9eb90f2254f58c2f30e55cc1a1c59aad9e2c5b3d303a197ba33cf892c6ce173b record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [621] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [738] 160303005a020000560303729c343a46ef89c23c86dc790f32a7d602ddae1d19... server: Send Direct [6] 140303000101 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterServerHelloEmptySid (4 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello12 Version: TLS 1.3 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello12 (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterFinished13 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [6] 140303000101 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterFinished13 (4 ms) [ RUN ] TlsConnectStreamTls13.Tls14ClientHelloWithSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303c7ca2240b6ff81b04a67f7a39cd0166acf4bb4f39a5175cc337c8b1ff03d... handshake new: [180] 0305c7ca2240b6ff81b04a67f7a39cd0166acf4bb4f39a5175cc337c8b1ff03d... record old: [184] 010000b40303c7ca2240b6ff81b04a67f7a39cd0166acf4bb4f39a5175cc337c... record new: [184] 010000b40305c7ca2240b6ff81b04a67f7a39cd0166acf4bb4f39a5175cc337c... client: Filtered packet: [189] 16030100b8010000b40305c7ca2240b6ff81b04a67f7a39cd0166acf4bb4f39a... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Tls14ClientHelloWithSupportedVersions (3 ms) [ RUN ] TlsConnectStreamTls13.Ssl30ClientHelloWithSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 030351a78d11b1526a6d243850f12b838e3a8b7cf47bf23a9b188ed53f268998... handshake new: [180] 030051a78d11b1526a6d243850f12b838e3a8b7cf47bf23a9b188ed53f268998... record old: [184] 010000b4030351a78d11b1526a6d243850f12b838e3a8b7cf47bf23a9b188ed5... record new: [184] 010000b4030051a78d11b1526a6d243850f12b838e3a8b7cf47bf23a9b188ed5... client: Filtered packet: [189] 16030100b8010000b4030051a78d11b1526a6d243850f12b838e3a8b7cf47bf2... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Ssl30ClientHelloWithSupportedVersions (3 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptIgnoreSingleUnknownSuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptIgnoreSingleUnknownSuite (4 ms) [ RUN ] TlsConnectStreamTls13.OuterWithEchAndEchIsInner Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [508] 0303692120938a50784a082e79d230695e13809e5b531d951f20da42b66a15da... handshake new: [512] 0303692120938a50784a082e79d230695e13809e5b531d951f20da42b66a15da... record old: [512] 010001fc0303692120938a50784a082e79d230695e13809e5b531d951f20da42... record new: [516] 010002000303692120938a50784a082e79d230695e13809e5b531d951f20da42... client: Filtered packet: [521] 1603010204010002000303692120938a50784a082e79d230695e13809e5b531d... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.OuterWithEchAndEchIsInner (3 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithResume Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithResume (9 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithExternalPsk Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithExternalPsk (4 ms) [ RUN ] TlsConnectStreamTls13.EchDowngradeNoFalseStart Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [213] 000100034d0020e019060d32b3398052d14ddaa4edee0025bbc042c77657b676... handshake old: [512] 030371cb8cb9c8727d1f6fcc6558773f3fe46b49927a8e0100ed331ecf99c13a... handshake new: [295] 030371cb8cb9c8727d1f6fcc6558773f3fe46b49927a8e0100ed331ecf99c13a... record old: [516] 01000200030371cb8cb9c8727d1f6fcc6558773f3fe46b49927a8e0100ed331e... record new: [299] 01000127030371cb8cb9c8727d1f6fcc6558773f3fe46b49927a8e0100ed331e... client: Filtered packet: [304] 160301012b01000127030371cb8cb9c8727d1f6fcc6558773f3fe46b49927a8e... [ OK ] TlsConnectStreamTls13.EchDowngradeNoFalseStart (4 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithHrr (8 ms) [ RUN ] TlsConnectStreamTls13.GreaseEchHrrMatches Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.GreaseEchHrrMatches (7 ms) [ RUN ] TlsConnectStreamTls13.EchFailDecryptCH2 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [117] 000100034d0000006c7226adea23e3a78981ffe66ef24a44e9519e1a59dc6fcd... extension new: [117] 000100034d0000006c7226adea23e3a78981ffe66ef24a44e9519e1a59dc6fcd... handshake old: [570] 03033c3162bbaa5cdc6ba9e5e6432170b7a17597122bb77c2507dc04966223a9... handshake new: [570] 03033c3162bbaa5cdc6ba9e5e6432170b7a17597122bb77c2507dc04966223a9... record old: [574] 0100023a03033c3162bbaa5cdc6ba9e5e6432170b7a17597122bb77c2507dc04... record new: [574] 0100023a03033c3162bbaa5cdc6ba9e5e6432170b7a17597122bb77c2507dc04... client: Filtered packet: [579] 160303023e0100023a03033c3162bbaa5cdc6ba9e5e6432170b7a17597122bb7... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchFailDecryptCH2 (4 ms) [ RUN ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingYN Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingYN (5 ms) [ RUN ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingNY Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [147] 000100034d00208d2a5a3e5dc5f93c103eecb917d5fe81f261be9956bdbf4fea... handshake old: [512] 0303d3532e8a2c718378ef0715b47d03afb43a2768b5a3391370a6c632a894ea... handshake new: [361] 0303d3532e8a2c718378ef0715b47d03afb43a2768b5a3391370a6c632a894ea... record old: [516] 010002000303d3532e8a2c718378ef0715b47d03afb43a2768b5a3391370a6c6... record new: [365] 010001690303d3532e8a2c718378ef0715b47d03afb43a2768b5a3391370a6c6... client: Filtered packet: [370] 160301016d010001690303d3532e8a2c718378ef0715b47d03afb43a2768b5a3... server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingNY (7 ms) [ RUN ] TlsConnectStreamTls13.EchHrrChangeCipherSuite Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [117] 000100034d0000006cb8886a9cf705e1757d29c7fe6482c8fc4d946fb67864e9... extension new: [117] 490100034d0000006cb8886a9cf705e1757d29c7fe6482c8fc4d946fb67864e9... handshake old: [570] 03031f14c4287bf99b37b06219bc721b1b299010a87d1f8d91b48a87da7d2a90... handshake new: [570] 03031f14c4287bf99b37b06219bc721b1b299010a87d1f8d91b48a87da7d2a90... record old: [574] 0100023a03031f14c4287bf99b37b06219bc721b1b299010a87d1f8d91b48a87... record new: [574] 0100023a03031f14c4287bf99b37b06219bc721b1b299010a87d1f8d91b48a87... client: Filtered packet: [579] 160303023e0100023a03031f14c4287bf99b37b06219bc721b1b299010a87d1f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchHrrChangeCipherSuite (6 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithHrrAndPsk Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithHrrAndPsk (7 ms) [ RUN ] TlsConnectStreamTls13.EchRejectWithHrrAndPsk Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.EchRejectWithHrrAndPsk (8 ms) [ RUN ] TlsConnectStreamTls13.EchRejectResume Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchRejectResume (10 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttBoth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchZeroRttBoth (9 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttFirst Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchZeroRttFirst (8 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttSecond Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchZeroRttSecond (9 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttRejectSecond Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED [ OK ] TlsConnectStreamTls13.EchZeroRttRejectSecond (9 ms) [ RUN ] TlsConnectStreamTls13.EchRejectUnknownCriticalExtension Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] TlsConnectStreamTls13.EchRejectUnknownCriticalExtension (6 ms) [ RUN ] TlsConnectStreamTls13.EchRejectAuthCertSuccessNoRetries Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.EchRejectAuthCertSuccessNoRetries (4 ms) [ RUN ] TlsConnectStreamTls13.EchRejectSuppressClientCert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchRejectSuppressClientCert (4 ms) [ RUN ] TlsConnectStreamTls13.EchRejectAuthCertSuccessIncompatibleRetries Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.EchRejectAuthCertSuccessIncompatibleRetries (5 ms) [ RUN ] TlsConnectStreamTls13.EchRejectAuthCertFail Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchRejectAuthCertFail (4 ms) [ RUN ] TlsConnectStreamTls13.EchValidateGreaseResponse Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [70] 0044fe0a00404d00200020a84c777e5d66ec2e6aab99de4a3d100a90d15656dd... extension new: [70] 4944fe0a00404d00200020a84c777e5d66ec2e6aab99de4a3d100a90d15656dd... handshake old: [110] 006cfe0a00460044fe0a00404d00200020a84c777e5d66ec2e6aab99de4a3d10... handshake new: [110] 006cfe0a00464944fe0a00404d00200020a84c777e5d66ec2e6aab99de4a3d10... record old: [731] 0800006e006cfe0a00460044fe0a00404d00200020a84c777e5d66ec2e6aab99... record new: [731] 0800006e006cfe0a00464944fe0a00404d00200020a84c777e5d66ec2e6aab99... server: Filtered packet: [848] 160303005a020000560303815afdadab2b8db3c1fc885c05c9d71011320bac5d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_KEYS: SSL received a malformed ESNI keys structure client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchValidateGreaseResponse (12 ms) [ RUN ] TlsConnectStreamTls13.EchBadCiphertext Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100034d0020b9091372ef9d67f1a676398ff77a8e1f3d666990be9a2c7085... extension new: [147] 000100034d0020b9091372ef9d67f1a676398ff77a8e1f3d666990be9a2c7085... handshake old: [512] 0303d266e44b5c3e3a47cf2c66d227ecbb6a6a4f3671df7cb4db2924f9c2e4b6... handshake new: [512] 0303d266e44b5c3e3a47cf2c66d227ecbb6a6a4f3671df7cb4db2924f9c2e4b6... record old: [516] 010002000303d266e44b5c3e3a47cf2c66d227ecbb6a6a4f3671df7cb4db2924... record new: [516] 010002000303d266e44b5c3e3a47cf2c66d227ecbb6a6a4f3671df7cb4db2924... client: Filtered packet: [521] 1603010204010002000303d266e44b5c3e3a47cf2c66d227ecbb6a6a4f3671df... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchBadCiphertext (5 ms) [ RUN ] TlsConnectStreamTls13.EchOuterBinding Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020304 handshake old: [512] 030366fca7ff0d9b8f2cfb0b0e8b314eaaac4de06087cbe61d1677416912b02f... handshake new: [510] 030366fca7ff0d9b8f2cfb0b0e8b314eaaac4de06087cbe61d1677416912b02f... record old: [516] 01000200030366fca7ff0d9b8f2cfb0b0e8b314eaaac4de06087cbe61d167741... record new: [514] 010001fe030366fca7ff0d9b8f2cfb0b0e8b314eaaac4de06087cbe61d167741... client: Filtered packet: [519] 1603010202010001fe030366fca7ff0d9b8f2cfb0b0e8b314eaaac4de06087cb... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchOuterBinding (4 ms) [ RUN ] TlsConnectStreamTls13.EchBadCiphersuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100034d002031cc1a9b910d53da5aad846b3623d6ee055eb915fa64331bd7... extension new: [147] 490100034d002031cc1a9b910d53da5aad846b3623d6ee055eb915fa64331bd7... handshake old: [512] 0303acef1beb7cddcfcc0d413165fb474444f973f7916283762929568e3a86c9... handshake new: [512] 0303acef1beb7cddcfcc0d413165fb474444f973f7916283762929568e3a86c9... record old: [516] 010002000303acef1beb7cddcfcc0d413165fb474444f973f791628376292956... record new: [516] 010002000303acef1beb7cddcfcc0d413165fb474444f973f791628376292956... client: Filtered packet: [521] 1603010204010002000303acef1beb7cddcfcc0d413165fb474444f973f79162... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100034d00208cbf1b355758b832ad675847ddfbd432c78d8bf40c235bea66... extension new: [147] 0001004c4d00208cbf1b355758b832ad675847ddfbd432c78d8bf40c235bea66... handshake old: [512] 03036e89c6c4b1d9ed4759e1cac8540bbf2659a14bfb7d34e4fe116cc2a6c2b1... handshake new: [512] 03036e89c6c4b1d9ed4759e1cac8540bbf2659a14bfb7d34e4fe116cc2a6c2b1... record old: [516] 0100020003036e89c6c4b1d9ed4759e1cac8540bbf2659a14bfb7d34e4fe116c... record new: [516] 0100020003036e89c6c4b1d9ed4759e1cac8540bbf2659a14bfb7d34e4fe116c... client: Filtered packet: [521] 16030102040100020003036e89c6c4b1d9ed4759e1cac8540bbf2659a14bfb7d... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchBadCiphersuite (9 ms) [ RUN ] TlsConnectStreamTls13.EchToTls12Server Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchToTls12Server (4 ms) [ RUN ] TlsConnectStreamTls13.NoEchFromTls12Client Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.NoEchFromTls12Client (4 ms) [ RUN ] TlsConnectStreamTls13.EchOuterWith12Max Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020303 handshake old: [512] 030303353a35faef401c17fd86347f867da406dd8d101919c7b75a484684d761... handshake new: [510] 030303353a35faef401c17fd86347f867da406dd8d101919c7b75a484684d761... record old: [516] 01000200030303353a35faef401c17fd86347f867da406dd8d101919c7b75a48... record new: [514] 010001fe030303353a35faef401c17fd86347f867da406dd8d101919c7b75a48... client: Filtered packet: [519] 1603010202010001fe030303353a35faef401c17fd86347f867da406dd8d1019... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchOuterWith12Max (4 ms) [ RUN ] TlsConnectStreamTls13.EchOuterExtensionsInCHOuter Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 03037e9f2e669edd45088d6710499d550f560deff84982db33b7685c35e7f88c... handshake new: [186] 03037e9f2e669edd45088d6710499d550f560deff84982db33b7685c35e7f88c... record old: [184] 010000b403037e9f2e669edd45088d6710499d550f560deff84982db33b7685c... record new: [190] 010000ba03037e9f2e669edd45088d6710499d550f560deff84982db33b7685c... client: Filtered packet: [195] 16030100be010000ba03037e9f2e669edd45088d6710499d550f560deff84982... server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchOuterExtensionsInCHOuter (2 ms) [ RUN ] TlsConnectStreamTls13.EchBackendAcceptance Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303fcef86e8a5f15b268f6c020acf27fe9e1f3ac48e1a2e175d9ac52e666c5b... handshake new: [184] 0303fcef86e8a5f15b268f6c020acf27fe9e1f3ac48e1a2e175d9ac52e666c5b... record old: [184] 010000b40303fcef86e8a5f15b268f6c020acf27fe9e1f3ac48e1a2e175d9ac5... record new: [188] 010000b80303fcef86e8a5f15b268f6c020acf27fe9e1f3ac48e1a2e175d9ac5... client: Filtered packet: [193] 16030100bc010000b80303fcef86e8a5f15b268f6c020acf27fe9e1f3ac48e1a... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchBackendAcceptance (4 ms) [ RUN ] TlsConnectStreamTls13.ClientRejectHandshakeCertReq Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [199] 16030300600200005c03031f66432382db9f6dcce3ced4338248e2ac35751a70... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_REQUEST: SSL received an unexpected Certificate Request handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ClientRejectHandshakeCertReq (3 ms) [ RUN ] TlsConnectStreamTls13.RejectPha Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [199] 16030300600200005c0303cc7634c2b5189a0bf7083f5107b055315d11f597b9... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Filtered packet: [27] 170303001609ce7a0410b483c3674f27c6188b7ee06c6f8a742dc9 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_REQUEST: SSL received an unexpected Certificate Request handshake message. client: Changing state from CONNECTED to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.RejectPha (4 ms) [----------] 108 tests from TlsConnectStreamTls13 (1606 ms total) [----------] 19 tests from TlsConnectDatagram13 [ RUN ] TlsConnectDatagram13.ZeroRttLateReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttLateReadDtls (22 ms) [ RUN ] TlsConnectDatagram13.ZeroRttLateArrivalDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Send Direct [25] 2dc32e001441ce1830d39672ea8241330a7e8e64ad560226c7 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttLateArrivalDtls (7 ms) [ RUN ] TlsConnectDatagram13.ZeroRttNoCoalesceReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttNoCoalesceReadDtls (8 ms) [ RUN ] TlsConnectDatagram13.ZeroRttShortReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttShortReadDtls (8 ms) [ RUN ] TlsConnectDatagram13.AuthCompleteBeforeFinished Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.AuthCompleteBeforeFinished (54 ms) [ RUN ] TlsConnectDatagram13.SendOutOfOrderAppWithHandshakeKey Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Send Direct [25] 2e1c4700148dc24e95bfa1d62934cb386e84b48bc4eab31b82 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendOutOfOrderAppWithHandshakeKey (4 ms) [ RUN ] TlsConnectDatagram13.SendOutOfOrderHsNonsenseWithHandshakeKey Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Send Direct [25] 2e99ac00142a963ad1a36e50bd69667788a8c02d2b617d10e6 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendOutOfOrderHsNonsenseWithHandshakeKey (5 ms) [ RUN ] TlsConnectDatagram13.UnderflowSequenceNumber Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.UnderflowSequenceNumber (4 ms) [ RUN ] TlsConnectDatagram13.Dtls13RejectLegacyCookie Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd2cdbbc653f5ff381984a0f2639b68d888f221ef383eef1c4231b16d5cd32... handshake new: [184] fefd2cdbbc653f5ff381984a0f2639b68d888f221ef383eef1c4231b16d5cd32... record old: [193] 010000b500000000000000b5fefd2cdbbc653f5ff381984a0f2639b68d888f22... record new: [196] 010000b800000000000000b8fefd2cdbbc653f5ff381984a0f2639b68d888f22... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd2cdbbc653f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.Dtls13RejectLegacyCookie (2 ms) [ RUN ] TlsConnectDatagram13.DropClientSecondFlightWithHelloRetry Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DropClientSecondFlightWithHelloRetry (24 ms) [ RUN ] TlsConnectDatagram13.MessageSeq1ClientHello Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record old: [193] 010000b500000000000000b5fefd5c14dbbc882c9afb99fa7999fff67ede815d... record new: [193] 010000b500010000000000b5fefd5c14dbbc882c9afb99fa7999fff67ede815d... client: Filtered packet: [206] 16feff000000000000000000c1010000b500010000000000b5fefd5c14dbbc88... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.MessageSeq1ClientHello (2 ms) [ RUN ] TlsConnectDatagram13.AeadLimit Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked record old: [27] d74bdef0b70ea0f38e618e09579f8216a11dd91c3b6e97f6cf8cc2 record new: [27] d74bdef0b70ea0f38e618e09579f8216a11dd91c3b6e97f6cf8cc3 client: Filtered packet: [32] 2f0000001bd74bdef0b70ea0f38e618e09579f8216a11dd91c3b6e97f6cf8cc3 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked record old: [27] 2070e5bce461b51d58e9b54ae4a2b084a9674ccc27642106aef4c5 record new: [27] 2070e5bce461b51d58e9b54ae4a2b084a9674ccc27642106aef4c6 client: Filtered packet: [32] 2f0000001b2070e5bce461b51d58e9b54ae4a2b084a9674ccc27642106aef4c6 server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.AeadLimit (4 ms) [ RUN ] TlsConnectDatagram13.ShortHeadersClient Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ShortHeadersClient (4 ms) [ RUN ] TlsConnectDatagram13.ShortHeadersServer Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ShortHeadersServer (4 ms) [ RUN ] TlsConnectDatagram13.DtlsAlternateShortHeader Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [23] 2b7d995dc4791428ae2f1fe04a931ad0f63a0280eab230 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DtlsAlternateShortHeader (4 ms) [ RUN ] TlsConnectDatagram13.ForwardDataDtls Version: DTLS 1.3 [ OK ] TlsConnectDatagram13.ForwardDataDtls (3 ms) [ RUN ] TlsConnectDatagram13.SendSessionTicketDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendSessionTicketDtls (5 ms) [ RUN ] TlsConnectDatagram13.CompatModeDtlsClient Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.CompatModeDtlsClient (5 ms) [ RUN ] TlsConnectDatagram13.CompatModeDtlsServer Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd53cf5e8d567591cfe5198e5b1fd7413290df48be3a667ae527a75a6b0f4c... handshake new: [213] fefd53cf5e8d567591cfe5198e5b1fd7413290df48be3a667ae527a75a6b0f4c... record old: [193] 010000b500000000000000b5fefd53cf5e8d567591cfe5198e5b1fd7413290df... record new: [225] 010000d500000000000000d5fefd53cf5e8d567591cfe5198e5b1fd7413290df... client: Filtered packet: [238] 16feff000000000000000000e1010000d500000000000000d5fefd53cf5e8d56... [ OK ] TlsConnectDatagram13.CompatModeDtlsServer (3 ms) [----------] 19 tests from TlsConnectDatagram13 (172 ms total) [----------] 9 tests from AeadTest [ RUN ] AeadTest.AeadBadVersion [ OK ] AeadTest.AeadBadVersion (0 ms) [ RUN ] AeadTest.AeadUnsupportedCipher [ OK ] AeadTest.AeadUnsupportedCipher (0 ms) [ RUN ] AeadTest.AeadOlderCipher [ OK ] AeadTest.AeadOlderCipher (0 ms) [ RUN ] AeadTest.AeadNoLabel [ OK ] AeadTest.AeadNoLabel (0 ms) [ RUN ] AeadTest.AeadLongLabel [ OK ] AeadTest.AeadLongLabel (0 ms) [ RUN ] AeadTest.AeadNoPointer [ OK ] AeadTest.AeadNoPointer (0 ms) [ RUN ] AeadTest.AeadAes128Gcm [ OK ] AeadTest.AeadAes128Gcm (0 ms) [ RUN ] AeadTest.AeadAes256Gcm [ OK ] AeadTest.AeadAes256Gcm (0 ms) [ RUN ] AeadTest.AeadChaCha20Poly1305 [ OK ] AeadTest.AeadChaCha20Poly1305 (0 ms) [----------] 9 tests from AeadTest (0 ms total) [----------] 3 tests from TlsAgentStreamTestClient [ RUN ] TlsAgentStreamTestClient.EncryptedExtensionsInClearTwoPieces client: Changing state from INIT to CONNECTING Process message: [25] 16030400140200005603039cbc149b0e2efa0df3f05c707ae0 Process message: [79] 160304004ad19b3e5a446bdfe5c22864f700c19c08760800130100002e003300... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestClient.EncryptedExtensionsInClearTwoPieces (1 ms) [ RUN ] TlsAgentStreamTestClient.Set0RttOptionThenWrite client: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestClient.Set0RttOptionThenWrite (0 ms) [ RUN ] TlsAgentStreamTestClient.Set0RttOptionThenRead client: Changing state from INIT to CONNECTING Process message: [11] 1703040006414243444546 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestClient.Set0RttOptionThenRead (1 ms) [----------] 3 tests from TlsAgentStreamTestClient (2 ms total) [----------] 3 tests from TlsAgentDgramTestClient [ RUN ] TlsAgentDgramTestClient.EncryptedExtensionsInClearTwoPieces client: Changing state from INIT to CONNECTING Process message: [45] 16030400000000000000000020020000560000000000000014fefd9cbc149b0e... Process message: [103] 1603040000000000000001005a020000560000000014000042446bdfe5c22864... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.EncryptedExtensionsInClearTwoPieces (0 ms) [ RUN ] TlsAgentDgramTestClient.AckWithBogusLengthField client: Changing state from INIT to CONNECTING Process message: [16] 1afefd00000000000000000003000800 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DTLS_ACK: SSL received a malformed DTLS ACK client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.AckWithBogusLengthField (0 ms) [ RUN ] TlsAgentDgramTestClient.AckWithNonEvenLength client: Changing state from INIT to CONNECTING Process message: [16] 1afefd00000000000000000003000100 client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_BAD_SERVER: The client has encountered bad data from the server. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.AckWithNonEvenLength (1 ms) [----------] 3 tests from TlsAgentDgramTestClient (1 ms total) [----------] 5 tests from TlsAgentStreamTestServer [ RUN ] TlsAgentStreamTestServer.Set0RttOptionClientHelloThenRead server: Changing state from INIT to CONNECTING Process message: [216] 16030400d3010000cf03036cb34681c81af9d20597487ca831031c06a862b190... Process message: [216] 17030400064142434445466cb34681c81af9d20597487ca831031c06a862b190... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestServer.Set0RttOptionClientHelloThenRead (5 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1SignAndKEX server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1SignAndKEX (6 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1Sign server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1Sign (4 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1KEX server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1KEX (4 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPss server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPss (4 ms) [----------] 5 tests from TlsAgentStreamTestServer (23 ms total) [----------] 5 tests from TlsCipherOrderTest [ RUN ] TlsCipherOrderTest.CipherOrderGet Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsCipherOrderTest.CipherOrderGet (4 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSet Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] TlsCipherOrderTest.CipherOrderSet (4 ms) [ RUN ] TlsCipherOrderTest.CipherOrderCopySocket Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderCopySocket (2 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSetLower Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderSetLower (2 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSetControls Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderSetControls (3 ms) [----------] 5 tests from TlsCipherOrderTest (15 ms total) [----------] 44 tests from TlsConnectTest [ RUN ] TlsConnectTest.DamageSecretHandleClientFinished Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Damaging HS secret client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectTest.DamageSecretHandleClientFinished (3 ms) [ RUN ] TlsConnectTest.DamageSecretHandleServerFinished Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [95] 160303005a02000056030317d3345ea0aa3e8e20bd7ed3f1c555f1979a8b455d... record drop: TLS 1.2 Handshake 2000000000000:[90] 02000056030317d3345ea0aa3e8e20bd7ed3f1c555f1979a8b455df04068b418... server: Filtered packet: [679] 17030302a2eab18f359169b874c7ef0960abd3b3db6c1dde387b4001ed206d5f... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.DamageSecretHandleServerFinished (4 ms) [ RUN ] TlsConnectTest.GatherEmptyV3Record Version: TLS (no version) client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.GatherEmptyV3Record (4 ms) [ RUN ] TlsConnectTest.GatherExcessiveV3Record Version: TLS (no version) client: Send Direct [5] 1603014801 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 22 server: Handshake failed with error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.GatherExcessiveV3Record (2 ms) [ RUN ] TlsConnectTest.Select12AfterHelloRetryRequest Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.Select12AfterHelloRetryRequest (11 ms) [ RUN ] TlsConnectTest.KeyUpdateClient Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateClient (4 ms) [ RUN ] TlsConnectTest.KeyUpdateClientRequestUpdate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateClientRequestUpdate (4 ms) [ RUN ] TlsConnectTest.KeyUpdateServer Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateServer (4 ms) [ RUN ] TlsConnectTest.KeyUpdateServerRequestUpdate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateServerRequestUpdate (4 ms) [ RUN ] TlsConnectTest.KeyUpdateConsecutiveRequests Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateConsecutiveRequests (4 ms) [ RUN ] TlsConnectTest.KeyUpdateLocalUpdateThenConsecutiveRequests Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateLocalUpdateThenConsecutiveRequests (5 ms) [ RUN ] TlsConnectTest.KeyUpdateMultiple Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateMultiple (4 ms) [ RUN ] TlsConnectTest.KeyUpdateBothRequest Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateBothRequest (4 ms) [ RUN ] TlsConnectTest.KeyUpdateAutomaticOnWrite Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateAutomaticOnWrite (4 ms) [ RUN ] TlsConnectTest.KeyUpdateAutomaticOnRead Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateAutomaticOnRead (4 ms) [ RUN ] TlsConnectTest.ConnectSSLv3 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsConnectTest.ConnectSSLv3 (3 ms) [ RUN ] TlsConnectTest.ConnectSSLv3ClientAuth Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsConnectTest.ConnectSSLv3ClientAuth (5 ms) [ RUN ] TlsConnectTest.OneNRecordSplitting Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.OneNRecordSplitting (3 ms) [ RUN ] TlsConnectTest.HandshakeSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.HandshakeSecrets (4 ms) [ RUN ] TlsConnectTest.ZeroRttSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.ZeroRttSecrets (8 ms) [ RUN ] TlsConnectTest.KeyUpdateSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateSecrets (4 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionTwice Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionTwice (12 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDuplicateNST Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDuplicateNST (9 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDuplicateNSTWithToken Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDuplicateNSTWithToken (8 ms) [ RUN ] TlsConnectTest.SendSessionTicketWithTicketsDisabled Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketWithTicketsDisabled (8 ms) [ RUN ] TlsConnectTest.SendTicketAfterResumption Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendTicketAfterResumption (12 ms) [ RUN ] TlsConnectTest.SendSessionTicketInappropriate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketInappropriate (5 ms) [ RUN ] TlsConnectTest.SendSessionTicketMassiveToken Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketMassiveToken (5 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDowngrade Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDowngrade (9 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionForcedDowngrade Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... handshake new: [92] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... record old: [96] 0200005c030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... record new: [96] 0200005c030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... handshake old: [92] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... handshake new: [92] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... record old: [96] 0200005c030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... record new: [96] 0200005c030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... extension drop: [2] 0304 handshake old: [92] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... handshake new: [86] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... record old: [96] 0200005c030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... record new: [90] 02000056030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... extension drop: [36] 001d0020948e995914c44cef5596a5570b04e6acb674fc1f16e1c3bc2c28e197... handshake old: [86] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... handshake new: [46] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... record old: [90] 02000056030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... record new: [50] 0200002e030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... extension drop: [2] 0000 handshake old: [46] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... handshake new: [40] 030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa7875449800d4d3ca... record old: [50] 0200002e030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... record new: [44] 02000028030377cbef439db1ef900549f76ae68fba0288b7b1ec6daa78754498... server: Filtered packet: [147] 160303002c02000028030377cbef439db1ef900549f76ae68fba0288b7b1ec6d... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestTls13ResumptionForcedDowngrade (9 ms) [ RUN ] TlsConnectTest.RenegotiationConfigTls13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.RenegotiationConfigTls13 (4 ms) [ RUN ] TlsConnectTest.Tls13RejectsRehandshakeClient Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.Tls13RejectsRehandshakeClient (4 ms) [ RUN ] TlsConnectTest.Tls13RejectsRehandshakeServer Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.Tls13RejectsRehandshakeServer (3 ms) [ RUN ] TlsConnectTest.EchoTLS13CompatibilitySessionID Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0303478b0c6dbee97d979c1334ac3a645e6a318191d1b05c9f68e56c0ebb3092... handshake new: [93] 0303478b0c6dbee97d979c1334ac3a645e6a318191d1b05c9f68e56c0ebb3092... record old: [715] 0200005d0303478b0c6dbee97d979c1334ac3a645e6a318191d1b05c9f68e56c... record new: [715] 0200005d0303478b0c6dbee97d979c1334ac3a645e6a318191d1b05c9f68e56c... server: Filtered packet: [720] 16030302cb0200005d0303478b0c6dbee97d979c1334ac3a645e6a318191d1b0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.EchoTLS13CompatibilitySessionID (4 ms) [ RUN ] TlsConnectTest.TLS13NonCompatModeSessionID Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 030304f615efa6c6c0adbe01e79f4ba2d55cb30ea20a91825a1f9289b09f550f... handshake new: [118] 030304f615efa6c6c0adbe01e79f4ba2d55cb30ea20a91825a1f9289b09f550f... record old: [90] 02000056030304f615efa6c6c0adbe01e79f4ba2d55cb30ea20a91825a1f9289... record new: [122] 02000076030304f615efa6c6c0adbe01e79f4ba2d55cb30ea20a91825a1f9289... server: Filtered packet: [806] 160303007a02000076030304f615efa6c6c0adbe01e79f4ba2d55cb30ea20a91... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TLS13NonCompatModeSessionID (3 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls11 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303df6f19cc7433080285e11bd73033b6984ef07073581a7754a12a0e83a31c... handshake new: [187] 0302df6f19cc7433080285e11bd73033b6984ef07073581a7754a12a0e83a31c... record old: [191] 010000bb0303df6f19cc7433080285e11bd73033b6984ef07073581a7754a12a... record new: [191] 010000bb0302df6f19cc7433080285e11bd73033b6984ef07073581a7754a12a... client: Filtered packet: [196] 16030100bf010000bb0302df6f19cc7433080285e11bd73033b6984ef0707358... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls11 (3 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls12 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [5] 0403040303 handshake old: [508] 0303b013d766a659bd1ce6a1e37f11926834c553f40cbf5b59af13dc393c8829... handshake new: [499] 0303b013d766a659bd1ce6a1e37f11926834c553f40cbf5b59af13dc393c8829... record old: [512] 010001fc0303b013d766a659bd1ce6a1e37f11926834c553f40cbf5b59af13dc... record new: [503] 010001f30303b013d766a659bd1ce6a1e37f11926834c553f40cbf5b59af13dc... client: Filtered packet: [508] 16030101f7010001f30303b013d766a659bd1ce6a1e37f11926834c553f40cbf... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls12 (3 ms) [ RUN ] TlsConnectTest.TestDisableDowngradeDetection Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [5] 0403040303 handshake old: [508] 03032eb68af032a7e5beacaa1bba5053fbce9d396dd507d25bb0609395986075... handshake new: [499] 03032eb68af032a7e5beacaa1bba5053fbce9d396dd507d25bb0609395986075... record old: [512] 010001fc03032eb68af032a7e5beacaa1bba5053fbce9d396dd507d25bb06093... record new: [503] 010001f303032eb68af032a7e5beacaa1bba5053fbce9d396dd507d25bb06093... client: Filtered packet: [508] 16030101f7010001f303032eb68af032a7e5beacaa1bba5053fbce9d396dd507... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDisableDowngradeDetection (4 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls10 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0302980c6cc8391f6dabe1658ffa7544edf36a12758a6f6ca095dd47827c13de... handshake new: [117] 0301980c6cc8391f6dabe1658ffa7544edf36a12758a6f6ca095dd47827c13de... record old: [121] 010000750302980c6cc8391f6dabe1658ffa7544edf36a12758a6f6ca095dd47... record new: [121] 010000750301980c6cc8391f6dabe1658ffa7544edf36a12758a6f6ca095dd47... client: Filtered packet: [126] 1603010079010000750301980c6cc8391f6dabe1658ffa7544edf36a12758a6f... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls10 (3 ms) [ RUN ] TlsConnectTest.TestFallbackFromTls12 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestFallbackFromTls12 (3 ms) [ RUN ] TlsConnectTest.DisableFalseStartOnFallback Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.DisableFalseStartOnFallback (4 ms) [ RUN ] TlsConnectTest.TestFallbackFromTls13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestFallbackFromTls13 (2 ms) [ RUN ] TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled Version: TLS (no version) [ OK ] TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled (2 ms) [ RUN ] TlsConnectTest.TlsSupportedVersionsEncoding Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.TlsSupportedVersionsEncoding (4 ms) [----------] 44 tests from TlsConnectTest (217 ms total) [----------] 15 tests from TlsExtensionTest13Stream [ RUN ] TlsExtensionTest13Stream.SignatureAlgorithmsPrecedingGarbage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [66] 0040ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... handshake old: [180] 03039b0003e5c5ef380bdbe45c032ebfb484baa3faa090f4139f780b98d61364... handshake new: [222] 03039b0003e5c5ef380bdbe45c032ebfb484baa3faa090f4139f780b98d61364... record old: [184] 010000b403039b0003e5c5ef380bdbe45c032ebfb484baa3faa090f4139f780b... record new: [226] 010000de03039b0003e5c5ef380bdbe45c032ebfb484baa3faa090f4139f780b... client: Filtered packet: [231] 16030100e2010000de03039b0003e5c5ef380bdbe45c032ebfb484baa3faa090... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.SignatureAlgorithmsPrecedingGarbage (3 ms) [ RUN ] TlsExtensionTest13Stream.DropServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d002058f6da2bc63ce6aaa71cbd6a660ccd579513721015d2009cd6457daf... handshake old: [86] 03031f4b3341a5eee8ca689146472e515b8e9a1ab1491fc8bcf027c02259ef56... handshake new: [46] 03031f4b3341a5eee8ca689146472e515b8e9a1ab1491fc8bcf027c02259ef56... record old: [90] 0200005603031f4b3341a5eee8ca689146472e515b8e9a1ab1491fc8bcf027c0... record new: [50] 0200002e03031f4b3341a5eee8ca689146472e515b8e9a1ab1491fc8bcf027c0... server: Filtered packet: [734] 16030300320200002e03031f4b3341a5eee8ca689146472e515b8e9a1ab1491f... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.DropServerKeyShare (5 ms) [ RUN ] TlsExtensionTest13Stream.WrongServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [36] 001d002043555efe4ec097343d46478f6d5529c92e37595b62668fe1489258e4... extension new: [6] 001800020102 handshake old: [86] 030366e04b276bda91a8d8028d996e145d798e65f5e218ca92f3a6640fe36623... handshake new: [56] 030366e04b276bda91a8d8028d996e145d798e65f5e218ca92f3a6640fe36623... record old: [90] 02000056030366e04b276bda91a8d8028d996e145d798e65f5e218ca92f3a664... record new: [60] 02000038030366e04b276bda91a8d8028d996e145d798e65f5e218ca92f3a664... server: Filtered packet: [744] 160303003c02000038030366e04b276bda91a8d8028d996e145d798e65f5e218... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_KEY_SHARE: SSL received a malformed Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.WrongServerKeyShare (3 ms) [ RUN ] TlsExtensionTest13Stream.UnknownServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [36] 001d00205ac3056d1d89fc012e1a6944b9c43347f2c069d6bf78ecd9cf164476... extension new: [6] ffff00020102 handshake old: [86] 0303df590e1fae16cd9a6ea0ac04b5b89d6a1563a71d8ea99f1baa3ee72f20e5... handshake new: [56] 0303df590e1fae16cd9a6ea0ac04b5b89d6a1563a71d8ea99f1baa3ee72f20e5... record old: [90] 020000560303df590e1fae16cd9a6ea0ac04b5b89d6a1563a71d8ea99f1baa3e... record new: [60] 020000380303df590e1fae16cd9a6ea0ac04b5b89d6a1563a71d8ea99f1baa3e... server: Filtered packet: [744] 160303003c020000380303df590e1fae16cd9a6ea0ac04b5b89d6a1563a71d8e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_KEY_SHARE: SSL received a malformed Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.UnknownServerKeyShare (4 ms) [ RUN ] TlsExtensionTest13Stream.AddServerSignatureAlgorithmsOnResumption Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 03035ebd62ac5002dfe0e8a97c8b2822c3ba6d8b2168d9bf180fe8bd2272f91f... handshake new: [96] 03035ebd62ac5002dfe0e8a97c8b2822c3ba6d8b2168d9bf180fe8bd2272f91f... record old: [96] 0200005c03035ebd62ac5002dfe0e8a97c8b2822c3ba6d8b2168d9bf180fe8bd... record new: [100] 0200006003035ebd62ac5002dfe0e8a97c8b2822c3ba6d8b2168d9bf180fe8bd... server: Filtered packet: [203] 16030300640200006003035ebd62ac5002dfe0e8a97c8b2822c3ba6d8b2168d9... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.AddServerSignatureAlgorithmsOnResumption (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeEmptyPskLabel Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b26744a594d80789e0285c060b00000000f9241df80c6b395cf6df8f8b... extension new: [43] 000600006f00d17900212000be7ae70c728e7a993a471de5c7b553d81cfaf216... handshake old: [508] 03031a0528748f40da2422404fe1ea13b06cbfdeee83707a897efe77c732f4e7... handshake new: [330] 03031a0528748f40da2422404fe1ea13b06cbfdeee83707a897efe77c732f4e7... record old: [512] 010001fc03031a0528748f40da2422404fe1ea13b06cbfdeee83707a897efe77... record new: [334] 0100014a03031a0528748f40da2422404fe1ea13b06cbfdeee83707a897efe77... client: Filtered packet: [339] 160301014e0100014a03031a0528748f40da2422404fe1ea13b06cbfdeee8370... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeEmptyPskLabel (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeIncorrectBinderValue Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b228dfc166a8798e94bc8f354b00000000e02a7d3a9049ddcb873f08e4... extension new: [221] 00b800b228dfc166a8798e94bc8f354b00000000e02a7d3a9049ddcb873f08e4... handshake old: [508] 0303c189f9d4e0d1dcc92100cc124d36e09b26dc655a0c0a898e9eafcbb1fe50... handshake new: [508] 0303c189f9d4e0d1dcc92100cc124d36e09b26dc655a0c0a898e9eafcbb1fe50... record old: [512] 010001fc0303c189f9d4e0d1dcc92100cc124d36e09b26dc655a0c0a898e9eaf... record new: [512] 010001fc0303c189f9d4e0d1dcc92100cc124d36e09b26dc655a0c0a898e9eaf... client: Filtered packet: [517] 1603010200010001fc0303c189f9d4e0d1dcc92100cc124d36e09b26dc655a0c... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeIncorrectBinderValue (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeIncorrectBinderLength Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2ddda03afa632d4412fcfc2880000000069297545c39ac1890bb9ff6d... extension new: [222] 00b800b2ddda03afa632d4412fcfc2880000000069297545c39ac1890bb9ff6d... handshake old: [508] 0303d0f0792da5d5bcdd759d3ed641838eaae9ebda38efaed8ce7314620c45e9... handshake new: [509] 0303d0f0792da5d5bcdd759d3ed641838eaae9ebda38efaed8ce7314620c45e9... record old: [512] 010001fc0303d0f0792da5d5bcdd759d3ed641838eaae9ebda38efaed8ce7314... record new: [513] 010001fd0303d0f0792da5d5bcdd759d3ed641838eaae9ebda38efaed8ce7314... client: Filtered packet: [518] 1603010201010001fd0303d0f0792da5d5bcdd759d3ed641838eaae9ebda38ef... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeIncorrectBinderLength (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeBinderTooShort Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b292c439ccb808653860e1606800000000d4a75ce4efa2b2300b7c76e4... extension new: [220] 00b800b292c439ccb808653860e1606800000000d4a75ce4efa2b2300b7c76e4... handshake old: [508] 0303597279750465174e2a623f199ef9d91872e37f1f0dd21e7baa18706217b7... handshake new: [507] 0303597279750465174e2a623f199ef9d91872e37f1f0dd21e7baa18706217b7... record old: [512] 010001fc0303597279750465174e2a623f199ef9d91872e37f1f0dd21e7baa18... record new: [511] 010001fb0303597279750465174e2a623f199ef9d91872e37f1f0dd21e7baa18... client: Filtered packet: [516] 16030101ff010001fb0303597279750465174e2a623f199ef9d91872e37f1f0d... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeBinderTooShort (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeTwoPsks Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b22019fd444933b7b007ec6b860000000012e605fdfa4b185f5473d107... extension new: [438] 017000b22019fd444933b7b007ec6b860000000012e605fdfa4b185f5473d107... handshake old: [508] 0303ba5b04eac9eae3fff4fdb06f0136a440acd9e9b830758296ffdee8261033... handshake new: [725] 0303ba5b04eac9eae3fff4fdb06f0136a440acd9e9b830758296ffdee8261033... record old: [512] 010001fc0303ba5b04eac9eae3fff4fdb06f0136a440acd9e9b830758296ffde... record new: [729] 010002d50303ba5b04eac9eae3fff4fdb06f0136a440acd9e9b830758296ffde... client: Filtered packet: [734] 16030102d9010002d50303ba5b04eac9eae3fff4fdb06f0136a440acd9e9b830... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeTwoPsks (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeTwoIdentitiesOneBinder Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2a969ee3cfea55759593923e500000000e070c32c83099ec3197ea1c1... extension new: [405] 017000b2a969ee3cfea55759593923e500000000e070c32c83099ec3197ea1c1... handshake old: [508] 03038e69fe1fc1441558c269234c3556ce4720eaa090ed1483994304bdfd277f... handshake new: [692] 03038e69fe1fc1441558c269234c3556ce4720eaa090ed1483994304bdfd277f... record old: [512] 010001fc03038e69fe1fc1441558c269234c3556ce4720eaa090ed1483994304... record new: [696] 010002b403038e69fe1fc1441558c269234c3556ce4720eaa090ed1483994304... client: Filtered packet: [701] 16030102b8010002b403038e69fe1fc1441558c269234c3556ce4720eaa090ed... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeTwoIdentitiesOneBinder (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeOneIdentityTwoBinders Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2bcba7a75d66f7b400a163c6a000000009265da5ce49b78dabc0972db... extension new: [254] 00b800b2bcba7a75d66f7b400a163c6a000000009265da5ce49b78dabc0972db... handshake old: [508] 0303d8d67cbf08401244e830617a9ebc99de63d2bffcb5f08ecefd8b402a0606... handshake new: [541] 0303d8d67cbf08401244e830617a9ebc99de63d2bffcb5f08ecefd8b402a0606... record old: [512] 010001fc0303d8d67cbf08401244e830617a9ebc99de63d2bffcb5f08ecefd8b... record new: [545] 0100021d0303d8d67cbf08401244e830617a9ebc99de63d2bffcb5f08ecefd8b... client: Filtered packet: [550] 16030102210100021d0303d8d67cbf08401244e830617a9ebc99de63d2bffcb5... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeOneIdentityTwoBinders (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumePskExtensionNotLast Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [508] 03030ae8037a6b6e5262622adc1bb0401877b1a2da303f0748be28f297106aeb... handshake new: [512] 03030ae8037a6b6e5262622adc1bb0401877b1a2da303f0748be28f297106aeb... record old: [512] 010001fc03030ae8037a6b6e5262622adc1bb0401877b1a2da303f0748be28f2... record new: [516] 0100020003030ae8037a6b6e5262622adc1bb0401877b1a2da303f0748be28f2... client: Filtered packet: [521] 16030102040100020003030ae8037a6b6e5262622adc1bb0401877b1a2da303f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumePskExtensionNotLast (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeNoKeModes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [508] 0303f70331a4d6f1929f09d9b22d49d15b736da9bfa764a4a315662a0523c6e9... handshake new: [502] 0303f70331a4d6f1929f09d9b22d49d15b736da9bfa764a4a315662a0523c6e9... record old: [512] 010001fc0303f70331a4d6f1929f09d9b22d49d15b736da9bfa764a4a315662a... record new: [506] 010001f60303f70331a4d6f1929f09d9b22d49d15b736da9bfa764a4a315662a... client: Filtered packet: [511] 16030101fa010001f60303f70331a4d6f1929f09d9b22d49d15b736da9bfa764... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeNoKeModes (6 ms) [ RUN ] TlsExtensionTest13Stream.ResumeBogusKeModes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0101 extension new: [2] 0100 handshake old: [508] 03036205a83b77c87a8f55078ded92ab61fcaa5437112af4b6c4a5c21c6dbd65... handshake new: [508] 03036205a83b77c87a8f55078ded92ab61fcaa5437112af4b6c4a5c21c6dbd65... record old: [512] 010001fc03036205a83b77c87a8f55078ded92ab61fcaa5437112af4b6c4a5c2... record new: [512] 010001fc03036205a83b77c87a8f55078ded92ab61fcaa5437112af4b6c4a5c2... client: Filtered packet: [517] 1603010200010001fc03036205a83b77c87a8f55078ded92ab61fcaa5437112a... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeBogusKeModes (8 ms) [----------] 15 tests from TlsExtensionTest13Stream (92 ms total) [----------] 7 tests from GatherV2ClientHelloTest [ RUN ] GatherV2ClientHelloTest.GatherV2RecordLongHeader Version: TLS (no version) client: Send Direct [5] 0002000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordLongHeader (3 ms) [ RUN ] GatherV2ClientHelloTest.GatherV2RecordLongHeader2 Version: TLS (no version) client: Send Direct [5] 0001000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordLongHeader2 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordLongHeader Version: TLS (no version) client: Send Direct [5] 0000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordLongHeader (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherV2RecordShortHeader Version: TLS (no version) client: Send Direct [5] 8003000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordShortHeader (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader2 Version: TLS (no version) client: Send Direct [5] 8002000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader2 (3 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader3 Version: TLS (no version) client: Send Direct [5] 8001000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader3 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader Version: TLS (no version) client: Send Direct [5] 8000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader (2 ms) [----------] 7 tests from GatherV2ClientHelloTest (16 ms total) [----------] 1 test from MiscTest [ RUN ] MiscTest.NonExistentExperimentalAPI [ OK ] MiscTest.NonExistentExperimentalAPI (0 ms) [----------] 1 test from MiscTest (0 ms total) [----------] 2 tests from RecordSizeDefaultsTest [ RUN ] RecordSizeDefaultsTest.RecordSizeBadValues [ OK ] RecordSizeDefaultsTest.RecordSizeBadValues (0 ms) [ RUN ] RecordSizeDefaultsTest.RecordSizeGetValue [ OK ] RecordSizeDefaultsTest.RecordSizeGetValue (0 ms) [----------] 2 tests from RecordSizeDefaultsTest (0 ms total) [----------] 11 tests from Tls13CompatTest [ RUN ] Tls13CompatTest.Disabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.Disabled (4 ms) [ RUN ] Tls13CompatTest.Enabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.Enabled (4 ms) [ RUN ] Tls13CompatTest.EnabledZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledZeroRtt (8 ms) [ RUN ] Tls13CompatTest.EnabledHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledHrr (17 ms) [ RUN ] Tls13CompatTest.EnabledStatelessHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledStatelessHrr (20 ms) [ RUN ] Tls13CompatTest.EnabledHrrZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledHrrZeroRtt (22 ms) [ RUN ] Tls13CompatTest.EnabledAcceptedEch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledAcceptedEch (4 ms) [ RUN ] Tls13CompatTest.EnabledRejectedEch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.EnabledRejectedEch (5 ms) [ RUN ] Tls13CompatTest.ChangeCipherSpecAfterClientHelloTwice Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [6] 140303000101 client: Send Direct [6] 140303000101 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. server: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.ChangeCipherSpecAfterClientHelloTwice (3 ms) [ RUN ] Tls13CompatTest.ChangeCipherSpecAfterServerHelloTwice Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [32] 61579ed4ea1125c228114af802c7eb9f1331bd6824854c7f69125a133950d7d2 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [621] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [776] 160303007a0200007603039b6190b19b8c6baa6623fb5ab54c11bbf8d9b20c14... server: Send Direct [6] 140303000101 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. client: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.ChangeCipherSpecAfterServerHelloTwice (4 ms) [ RUN ] Tls13CompatTest.ConnectWith12ThenAttemptToResume13CompatMode Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.ConnectWith12ThenAttemptToResume13CompatMode (7 ms) [----------] 11 tests from Tls13CompatTest (98 ms total) [----------] 3 tests from SSLv2ClientHelloTestF [ RUN ] SSLv2ClientHelloTestF.Connect13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030400030000001000c02f1d4d0bbd67ff1611da39f8bef26dedf9 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] SSLv2ClientHelloTestF.Connect13 (2 ms) [ RUN ] SSLv2ClientHelloTestF.FallbackSCSV Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f01030200060000001000003300560051ce088cfc243ac071e9a2f5646ee5... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] SSLv2ClientHelloTestF.FallbackSCSV (8 ms) [ RUN ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103020006000000100000330056006a8580be718215cade642c1a79a08c... server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV (2 ms) [----------] 3 tests from SSLv2ClientHelloTestF (12 ms total) [----------] 3 tests from DtlsConnectTest [ RUN ] DtlsConnectTest.TestDtlsVersion11 Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefd62f23578047a2957fe5db846566691200ad6549ef196d8d6968c56f69f35... handshake new: [184] fefe62f23578047a2957fe5db846566691200ad6549ef196d8d6968c56f69f35... record old: [196] 010000b800000000000000b8fefd62f23578047a2957fe5db846566691200ad6... record new: [196] 010000b800000000000000b8fefe62f23578047a2957fe5db846566691200ad6... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefe62f2357804... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] DtlsConnectTest.TestDtlsVersion11 (2 ms) [ RUN ] DtlsConnectTest.DtlsSupportedVersionsEncoding Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DtlsConnectTest.DtlsSupportedVersionsEncoding (4 ms) [ RUN ] DtlsConnectTest.Dtls13VersionWorkaround Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DtlsConnectTest.Dtls13VersionWorkaround (4 ms) [----------] 3 tests from DtlsConnectTest (11 ms total) [----------] 3 tests from Tls13NoSupportedVersions [ RUN ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer12 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303504564bc31cb816169d17fcc8232249cbc9982af593564361ddb966c8094... handshake new: [187] 0304504564bc31cb816169d17fcc8232249cbc9982af593564361ddb966c8094... record old: [191] 010000bb0303504564bc31cb816169d17fcc8232249cbc9982af593564361ddb... record new: [191] 010000bb0304504564bc31cb816169d17fcc8232249cbc9982af593564361ddb... client: Filtered packet: [196] 16030100bf010000bb0304504564bc31cb816169d17fcc8232249cbc9982af59... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer12 (3 ms) [ RUN ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer13 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303637fd747c957e83e0ac2339adc4fbd813c0d0d6db136df851a4aa34f846e... handshake new: [187] 0304637fd747c957e83e0ac2339adc4fbd813c0d0d6db136df851a4aa34f846e... record old: [191] 010000bb0303637fd747c957e83e0ac2339adc4fbd813c0d0d6db136df851a4a... record new: [191] 010000bb0304637fd747c957e83e0ac2339adc4fbd813c0d0d6db136df851a4a... client: Filtered packet: [196] 16030100bf010000bb0304637fd747c957e83e0ac2339adc4fbd813c0d0d6db1... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer13 (3 ms) [ RUN ] Tls13NoSupportedVersions.Tls14ClientHelloWithoutSupportedVersionsServer13 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303d1dae5724cf74f1aa0037dbd99e97400b9c119494f979b3788cb21020aae... handshake new: [187] 0305d1dae5724cf74f1aa0037dbd99e97400b9c119494f979b3788cb21020aae... record old: [191] 010000bb0303d1dae5724cf74f1aa0037dbd99e97400b9c119494f979b3788cb... record new: [191] 010000bb0305d1dae5724cf74f1aa0037dbd99e97400b9c119494f979b3788cb... client: Filtered packet: [196] 16030100bf010000bb0305d1dae5724cf74f1aa0037dbd99e97400b9c119494f... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls14ClientHelloWithoutSupportedVersionsServer13 (4 ms) [----------] 3 tests from Tls13NoSupportedVersions (10 ms total) [----------] 16 tests from TlsConnectStreamTls13Ech [ RUN ] TlsConnectStreamTls13Ech.EchFixedConfig Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchFixedConfig (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchOuterExtensionsReferencesMissing Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 160304020401000200030341a6813ccf3eefc2deb9c78f7627715ae343f5236e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchOuterExtensionsReferencesMissing (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchVersion12Inner Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 1603040204010002000303baf30ea25e5056b659a4d55233922c4ee261a04e6d... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchVersion12Inner (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchVersion12InnerSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 16030402040100020003036c4a7f6f6b5479a5c1f769c7b04c082ba40b514522... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchVersion12InnerSupportedVersions (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchInnerMissing Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 1603040204010002000303912d293136b843248ffeecdde6ef0d5bc5d0adb4d3... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_MISSING_ESNI_EXTENSION: SSL did not receive an ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchInnerMissing (3 ms) [ RUN ] TlsConnectStreamTls13Ech.InnerWithEchAndEchIsInner Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 1603040204010002000303b690bc4090ecfd7ad167de639b1d1ea7682588ffef... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.InnerWithEchAndEchIsInner (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchConfigsTrialDecrypt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchConfigsTrialDecrypt (5 ms) [ RUN ] TlsConnectStreamTls13Ech.EchAcceptBasic Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchAcceptBasic (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchRejectWithHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13Ech.EchRejectWithHrr (8 ms) [ RUN ] TlsConnectStreamTls13Ech.EchShortClientEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100014d00206b952b1635aafeab3825118129a3782c3040e6bb4d9acefdc1... extension new: [1] 00 handshake old: [512] 03033cfb44fd68651c774a41ee70073ee0d930e4f78a62bdb672979f22b19407... handshake new: [366] 03033cfb44fd68651c774a41ee70073ee0d930e4f78a62bdb672979f22b19407... record old: [516] 0100020003033cfb44fd68651c774a41ee70073ee0d930e4f78a62bdb672979f... record new: [370] 0100016e03033cfb44fd68651c774a41ee70073ee0d930e4f78a62bdb672979f... client: Filtered packet: [375] 16030101720100016e03033cfb44fd68651c774a41ee70073ee0d930e4f78a62... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchShortClientEncryptedCH (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchLongClientEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100014d00202fdef84ee423b56e14517f706dbc7cd0243f61c251d3671a1f... extension new: [853] 0000000000000000000000000000000000000000000000000000000000000000... handshake old: [512] 03038696b3fbbafedbecf2527b5f2da19601438e10bc43f3f413396d311389c6... handshake new: [1218] 03038696b3fbbafedbecf2527b5f2da19601438e10bc43f3f413396d311389c6... record old: [516] 0100020003038696b3fbbafedbecf2527b5f2da19601438e10bc43f3f413396d... record new: [1222] 010004c203038696b3fbbafedbecf2527b5f2da19601438e10bc43f3f413396d... client: Filtered packet: [1227] 16030104c6010004c203038696b3fbbafedbecf2527b5f2da19601438e10bc43... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchLongClientEncryptedCH (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchShortServerEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [66] 0040fe0a003c4d002000201ceaabb4478141200bc814d3407f6f594c03d8ea08... extension new: [1] 00 handshake old: [106] 0068fe0a00420040fe0a003c4d002000201ceaabb4478141200bc814d3407f6f... handshake new: [41] 0027fe0a000100000a00140012001d0017001800190100010101020103010400... record old: [727] 0800006a0068fe0a00420040fe0a003c4d002000201ceaabb4478141200bc814... record new: [662] 080000290027fe0a000100000a00140012001d00170018001901000101010201... server: Filtered packet: [779] 160303005a02000056030330585b3101974be3592e412c8ce1c6d0fa5f0cac10... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_KEYS: SSL received a malformed ESNI keys structure client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchShortServerEncryptedCH (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchLongServerEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [66] 0040fe0a003c4d00200020a1a64662e8e5a99242905040a4c0a9de97db1a7332... extension new: [934] 0000000000000000000000000000000000000000000000000000000000000000... handshake old: [106] 0068fe0a00420040fe0a003c4d00200020a1a64662e8e5a99242905040a4c0a9... handshake new: [974] 03ccfe0a03a60000000000000000000000000000000000000000000000000000... record old: [727] 0800006a0068fe0a00420040fe0a003c4d00200020a1a64662e8e5a992429050... record new: [1595] 080003ce03ccfe0a03a600000000000000000000000000000000000000000000... server: Filtered packet: [1712] 160303005a020000560303f0549bd1784d8a2d3595e09433897b6f9dda6a501b... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_KEYS: SSL received a malformed ESNI keys structure client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchLongServerEncryptedCH (5 ms) [ RUN ] TlsConnectStreamTls13Ech.EchInsecureFallbackNoRetries Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchInsecureFallbackNoRetries (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchMismatchHpkeCiphersRetry Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITH_ECH: TLS ECH was rejected, but verification succeeded and compatible retry_configs are available. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchMismatchHpkeCiphersRetry (9 ms) [ RUN ] TlsConnectStreamTls13Ech.EchMismatchKeysRetry Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITH_ECH: TLS ECH was rejected, but verification succeeded and compatible retry_configs are available. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchMismatchKeysRetry (9 ms) [----------] 16 tests from TlsConnectStreamTls13Ech (75 ms total) [----------] 1 test from DCDelegation [ RUN ] DCDelegation.DCDelegations [ OK ] DCDelegation.DCDelegations (5 ms) [----------] 1 test from DCDelegation (5 ms total) [----------] 60 tests from BloomFilterConfigurations/BloomFilterTest [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/9 (0 ms) [----------] 60 tests from BloomFilterConfigurations/BloomFilterTest (0 ms total) [----------] 56 tests from VariousSizes/SelfEncryptTestVariable [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/0 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/1 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/2 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/3 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/4 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/5 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/6 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/3 (1 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/0 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/1 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/2 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/3 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/4 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/5 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/6 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/6 (1 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/6 (0 ms) [----------] 56 tests from VariousSizes/SelfEncryptTestVariable (2 ms total) [----------] 244 tests from Version13Only/TlsConnectTls13 [ RUN ] Version13Only/TlsConnectTls13.ZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRtt/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRtt/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_TOO_MUCH_EARLY_DATA: SSL received more early data than permitted. server: Changing state from CONNECTING to ERROR client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOrdering/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Drop packet client: Send Direct [135] 170303001406b74e4bf0c32561bb090be38dfb29a187d17cde1703030015934e... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Drop packet client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOrdering/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOrdering/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Drop packet client: Send Direct [151] 2d83ac00142bf9827151822e60281468cc35571431d6c93fa62df2cd001de8cf... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Drop packet client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOrdering/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete SEC_ERROR_REVOKED_CERTIFICATE client: Fatal alert sent: 44 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 44 server: Handshake failed with error SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete SEC_ERROR_REVOKED_CERTIFICATE client: Fatal alert sent: 44 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 44 server: Handshake failed with error SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/0 Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/1 Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/0 Version: TLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/1 Version: DTLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/1 (1 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/0 Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/1 Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/0 (1 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [180] 0303cd57ef9eb41d9e4ebbad155a4d0a0c4d3f7c5b6b303645715108283dc359... handshake new: [152] 0303cd57ef9eb41d9e4ebbad155a4d0a0c4d3f7c5b6b303645715108283dc359... record old: [184] 010000b40303cd57ef9eb41d9e4ebbad155a4d0a0c4d3f7c5b6b303645715108... record new: [156] 010000980303cd57ef9eb41d9e4ebbad155a4d0a0c4d3f7c5b6b303645715108... client: Filtered packet: [161] 160301009c010000980303cd57ef9eb41d9e4ebbad155a4d0a0c4d3f7c5b6b30... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [181] fefdae03335e6e789e06ce6c24c2d63c20d6c7afff0390dc69ea1c565e6965a9... handshake new: [153] fefdae03335e6e789e06ce6c24c2d63c20d6c7afff0390dc69ea1c565e6965a9... record old: [193] 010000b500000000000000b5fefdae03335e6e789e06ce6c24c2d63c20d6c7af... record new: [165] 010000990000000000000099fefdae03335e6e789e06ce6c24c2d63c20d6c7af... client: Filtered packet: [178] 16feff000000000000000000a5010000990000000000000099fefdae03335e6e... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400806d32ac551494c317b93a92b4ab5b6bd1ef12b851c861ec121f2956d0... handshake new: [132] 000000806d32ac551494c317b93a92b4ab5b6bd1ef12b851c861ec121f2956d0... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a020000560303c2c939d669e53e18e68f876ef1a057e628faff612b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008046940ca35826e1762e4630cd14809cc2cc2198b9ea9e037ec6e0b04b... handshake new: [132] 0000008046940ca35826e1762e4630cd14809cc2cc2198b9ea9e037ec6e0b04b... record old: [144] 0f00008400030000000000840804008046940ca35826e1762e4630cd14809cc2... record new: [144] 0f00008400030000000000840000008046940ca35826e1762e4630cd14809cc2... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefd62dd632c3c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008051eedc3257e81d09369d8429bcce116a2684d47ddc7b2f2d5c5c9670... handshake new: [132] 0403008051eedc3257e81d09369d8429bcce116a2684d47ddc7b2f2d5c5c9670... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a020000560303b909946c6f4fbd3f2273d65a0b643b7a49ffd57739... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08040080cdf5d8285de48b8be7ce8c4c9d06456ee0659eff103a3be6832c199d... handshake new: [132] 04030080cdf5d8285de48b8be7ce8c4c9d06456ee0659eff103a3be6832c199d... record old: [144] 0f000084000300000000008408040080cdf5d8285de48b8be7ce8c4c9d06456e... record new: [144] 0f000084000300000000008404030080cdf5d8285de48b8be7ce8c4c9d06456e... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefd98331cd65e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete no error client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete no error client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/0 Version: TLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/1 Version: DTLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DamageServerSignature/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08040080bd0fb110d746d8dbcbc75bc2d5f0cacbc6c216b11b918258b1085c05... handshake new: [132] 08040080bd0fb110d746d8dbcbc75bc2d5f0cacbc6c216b11b918258b1085c05... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a020000560303c9481561d14216a5afbbd983d39ae03c6f0b45bec0... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DamageServerSignature/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DamageServerSignature/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08040080751166072da2bc429e779455407fb94fb9ff0ee583dc5b2ad1be25a4... handshake new: [132] 08040080751166072da2bc429e779455407fb94fb9ff0ee583dc5b2ad1be25a4... record old: [144] 0f000084000300000000008408040080751166072da2bc429e779455407fb94f... record new: [144] 0f000084000300000000008408040080751166072da2bc429e779455407fb94f... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefd801b1299a1... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DamageServerSignature/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeFfdhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeFfdhe/0 (16 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeFfdhe/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeFfdhe/1 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [180] 0303a1853820cfacfc04c75bab73da05f2940e876f40ca387395873acb9f88a7... handshake new: [156] 0303a1853820cfacfc04c75bab73da05f2940e876f40ca387395873acb9f88a7... record old: [184] 010000b40303a1853820cfacfc04c75bab73da05f2940e876f40ca387395873a... record new: [160] 0100009c0303a1853820cfacfc04c75bab73da05f2940e876f40ca387395873a... client: Filtered packet: [165] 16030100a00100009c0303a1853820cfacfc04c75bab73da05f2940e876f40ca... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [181] fefd0a9b4dd5e7519bd17868eb00573795df9bedf6f07682d9c3599033542efc... handshake new: [157] fefd0a9b4dd5e7519bd17868eb00573795df9bedf6f07682d9c3599033542efc... record old: [193] 010000b500000000000000b5fefd0a9b4dd5e7519bd17868eb00573795df9bed... record new: [169] 0100009d000000000000009dfefd0a9b4dd5e7519bd17868eb00573795df9bed... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefd0a9b4dd5e7... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.UseLameGroup/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UseLameGroup/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.UseLameGroup/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UseLameGroup/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterSha384/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterSha384/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterSha384/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterSha384/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporter/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporter/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporter/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporter/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [46] 00090003666f6f000000000021201851f0b125c90c0017c279081878208891d8... extension new: [46] 00090003666f6f00000000002120e751f0b125c90c0017c279081878208891d8... handshake old: [230] 030300565c09ed0db08fcb674deeeeb5ad84242e42d6f42473af19c655664d8b... handshake new: [230] 030300565c09ed0db08fcb674deeeeb5ad84242e42d6f42473af19c655664d8b... record old: [234] 010000e6030300565c09ed0db08fcb674deeeeb5ad84242e42d6f42473af19c6... record new: [234] 010000e6030300565c09ed0db08fcb674deeeeb5ad84242e42d6f42473af19c6... client: Filtered packet: [239] 16030100ea010000e6030300565c09ed0db08fcb674deeeeb5ad84242e42d6f4... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [46] 00090003666f6f00000000002120a950e35f5f544d40313ca2f8fcc2b81e9926... extension new: [46] 00090003666f6f000000000021205650e35f5f544d40313ca2f8fcc2b81e9926... handshake old: [231] fefd157836113bdc502c7a98f77cbf255d595379baaf1ab11a99fb6555d9cb72... handshake new: [231] fefd157836113bdc502c7a98f77cbf255d595379baaf1ab11a99fb6555d9cb72... record old: [243] 010000e700000000000000e7fefd157836113bdc502c7a98f77cbf255d595379... record new: [243] 010000e700000000000000e7fefd157836113bdc502c7a98f77cbf255d595379... client: Filtered packet: [256] 16feff000000000000000000f3010000e700000000000000e7fefd157836113b... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/0 (21 ms) [ RUN ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/1 (22 ms) [ RUN ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [486] 16feff000000000000000101d9010001cd00010000000001cdfefdceac5f790e... server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/1 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 006500180061043ed1452f97d2a3f983a39e6d8cba85996cb6dba6bf7df3bea6... extension new: [38] 0024001d0020bff0b51697ab1bb11f27b6d310da10abc1832ad86e7722ef548c... handshake old: [508] 03033640cbb0c6f25e341b0f58f8d044f5e8fac15d621398dc9ab9f12bc2f4fc... handshake new: [443] 03033640cbb0c6f25e341b0f58f8d044f5e8fac15d621398dc9ab9f12bc2f4fc... record old: [512] 010001fc03033640cbb0c6f25e341b0f58f8d044f5e8fac15d621398dc9ab9f1... record new: [447] 010001bb03033640cbb0c6f25e341b0f58f8d044f5e8fac15d621398dc9ab9f1... client: Filtered packet: [452] 16030301bf010001bb03033640cbb0c6f25e341b0f58f8d044f5e8fac15d6213... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 006500180061049e5c9d38e1cc6405863a174838cac0e37f8dc3877d6d333346... extension new: [38] 0024001d0020dfff6217d34bddaf59680abd434b84f61bf137aaf302c9a950eb... handshake old: [366] fefd1b8519f96e8f1bef89329cf2bb1e1e3a9bba13c50ccc620568fa61048b38... handshake new: [301] fefd1b8519f96e8f1bef89329cf2bb1e1e3a9bba13c50ccc620568fa61048b38... record old: [378] 0100016e000100000000016efefd1b8519f96e8f1bef89329cf2bb1e1e3a9bba... record new: [313] 0100012d000100000000012dfefd1b8519f96e8f1bef89329cf2bb1e1e3a9bba... client: Filtered packet: [326] 16fefd000000000000000101390100012d000100000000012dfefd1b8519f96e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithTwoShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 00650018006104b24382981d2d944126a6f05827a3a0d8a990b223efd70cd26c... extension new: [107] 0069001d00200d8a9cfadd33a70c4f8446662e5dc810d681de0b8ac2d6267bd5... handshake old: [508] 03035f7873b67b6e68110c5f53f1b1e0e7e24f27be4615b1683e1aca044081f8... handshake new: [512] 03035f7873b67b6e68110c5f53f1b1e0e7e24f27be4615b1683e1aca044081f8... record old: [512] 010001fc03035f7873b67b6e68110c5f53f1b1e0e7e24f27be4615b1683e1aca... record new: [516] 0100020003035f7873b67b6e68110c5f53f1b1e0e7e24f27be4615b1683e1aca... client: Filtered packet: [521] 16030302040100020003035f7873b67b6e68110c5f53f1b1e0e7e24f27be4615... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithTwoShares/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithTwoShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 00650018006104cb088fbe4e2b92ead73c5bbbf73ad400f12bf2c38bd7e8a2c4... extension new: [107] 0069001d00206bb4c89ec68c9353ffa7fd5648e1c3ee3199cfbe4de120f1466b... handshake old: [366] fefdb457e6ee9a2cb2bb51e6b803cf18e969ebffafe27697f962d2743f4236bd... handshake new: [370] fefdb457e6ee9a2cb2bb51e6b803cf18e969ebffafe27697f962d2743f4236bd... record old: [378] 0100016e000100000000016efefdb457e6ee9a2cb2bb51e6b803cf18e969ebff... record new: [382] 010001720001000000000172fefdb457e6ee9a2cb2bb51e6b803cf18e969ebff... client: Filtered packet: [395] 16fefd0000000000000001017e010001720001000000000172fefdb457e6ee9a... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithTwoShares/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAccept/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAccept/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAccept/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAccept/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/0 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/1 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackFail/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_APPLICATION_ABORT: SSL handshake aborted by the application. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackFail/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackFail/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_APPLICATION_ABORT: SSL handshake aborted by the application. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackFail/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetry/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetry/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetry/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetry/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/0 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/1 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/0 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/1 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStateless/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryStateless/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStateless/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryStateless/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [116] 0072d326e262df1979329741cbae00000000da0fd481620baff0d2e36acc85c3... handshake old: [508] 03036150d4f38b7258892b5c890d96def830400cb39d62c5567181032bc7b140... handshake new: [388] 03036150d4f38b7258892b5c890d96def830400cb39d62c5567181032bc7b140... record old: [512] 010001fc03036150d4f38b7258892b5c890d96def830400cb39d62c556718103... record new: [392] 0100018403036150d4f38b7258892b5c890d96def830400cb39d62c556718103... client: Filtered packet: [397] 16030301880100018403036150d4f38b7258892b5c890d96def830400cb39d62... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [116] 00728466432de854116bf5bb21de000000002a013768b84bbc6c91fc4b406102... handshake old: [301] fefdd2acec0f7a9ebcfc5e1f2314f7c384387e75e30af2da09563254cc46377f... handshake new: [181] fefdd2acec0f7a9ebcfc5e1f2314f7c384387e75e30af2da09563254cc46377f... record old: [313] 0100012d000100000000012dfefdd2acec0f7a9ebcfc5e1f2314f7c384387e75... record new: [193] 010000b500010000000000b5fefdd2acec0f7a9ebcfc5e1f2314f7c384387e75... client: Filtered packet: [206] 16fefd000000000000000000c1010000b500010000000000b5fefdd2acec0f7a... extension drop: [116] 00728466432de854116bf5bb21de000000002a013768b84bbc6c91fc4b406102... handshake old: [301] fefdd2acec0f7a9ebcfc5e1f2314f7c384387e75e30af2da09563254cc46377f... handshake new: [181] fefdd2acec0f7a9ebcfc5e1f2314f7c384387e75e30af2da09563254cc46377f... record old: [313] 0100012d000100000000012dfefdd2acec0f7a9ebcfc5e1f2314f7c384387e75... record new: [193] 010000b500010000000000b5fefdd2acec0f7a9ebcfc5e1f2314f7c384387e75... client: Filtered packet: [206] 16fefd000000000000000200c1010000b500010000000000b5fefdd2acec0f7a... extension drop: [116] 00728466432de854116bf5bb21de000000002a013768b84bbc6c91fc4b406102... handshake old: [301] fefdd2acec0f7a9ebcfc5e1f2314f7c384387e75e30af2da09563254cc46377f... handshake new: [181] fefdd2acec0f7a9ebcfc5e1f2314f7c384387e75e30af2da09563254cc46377f... record old: [313] 0100012d000100000000012dfefdd2acec0f7a9ebcfc5e1f2314f7c384387e75... record new: [193] 010000b500010000000000b5fefdd2acec0f7a9ebcfc5e1f2314f7c384387e75... client: Filtered packet: [206] 16fefd000000000000000300c1010000b500010000000000b5fefdd2acec0f7a... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/1 (155 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieEmpty/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 0072f3785f4dc6a51b8e2e36ee3f0000000028b1d9fce974159b1609ad8813c8... extension new: [2] 0000 handshake old: [508] 0303e0c8b673f11614be3fc0d391a7460b6ad589d0826d3bf3067bb55c7299a1... handshake new: [394] 0303e0c8b673f11614be3fc0d391a7460b6ad589d0826d3bf3067bb55c7299a1... record old: [512] 010001fc0303e0c8b673f11614be3fc0d391a7460b6ad589d0826d3bf3067bb5... record new: [398] 0100018a0303e0c8b673f11614be3fc0d391a7460b6ad589d0826d3bf3067bb5... client: Filtered packet: [403] 160303018e0100018a0303e0c8b673f11614be3fc0d391a7460b6ad589d0826d... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieEmpty/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieEmpty/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 0072342b9250269b3f259b82a6f500000000782029bd75d9492bb6cff6da559d... extension new: [2] 0000 handshake old: [301] fefd85726625561c7e9622b00b92ca1d23bf6b70a5779046f6dc2a1e2acc4a22... handshake new: [187] fefd85726625561c7e9622b00b92ca1d23bf6b70a5779046f6dc2a1e2acc4a22... record old: [313] 0100012d000100000000012dfefd85726625561c7e9622b00b92ca1d23bf6b70... record new: [199] 010000bb00010000000000bbfefd85726625561c7e9622b00b92ca1d23bf6b70... client: Filtered packet: [212] 16fefd000000000000000000c7010000bb00010000000000bbfefd8572662556... extension old: [116] 0072342b9250269b3f259b82a6f500000000782029bd75d9492bb6cff6da559d... extension new: [2] 0000 handshake old: [301] fefd85726625561c7e9622b00b92ca1d23bf6b70a5779046f6dc2a1e2acc4a22... handshake new: [187] fefd85726625561c7e9622b00b92ca1d23bf6b70a5779046f6dc2a1e2acc4a22... record old: [313] 0100012d000100000000012dfefd85726625561c7e9622b00b92ca1d23bf6b70... record new: [199] 010000bb00010000000000bbfefd85726625561c7e9622b00b92ca1d23bf6b70... client: Filtered packet: [212] 16fefd000000000000000200c7010000bb00010000000000bbfefd8572662556... extension old: [116] 0072342b9250269b3f259b82a6f500000000782029bd75d9492bb6cff6da559d... extension new: [2] 0000 handshake old: [301] fefd85726625561c7e9622b00b92ca1d23bf6b70a5779046f6dc2a1e2acc4a22... handshake new: [187] fefd85726625561c7e9622b00b92ca1d23bf6b70a5779046f6dc2a1e2acc4a22... record old: [313] 0100012d000100000000012dfefd85726625561c7e9622b00b92ca1d23bf6b70... record new: [199] 010000bb00010000000000bbfefd85726625561c7e9622b00b92ca1d23bf6b70... client: Filtered packet: [212] 16fefd000000000000000300c7010000bb00010000000000bbfefd8572662556... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieEmpty/1 (158 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 0072d767b3557c78f430df68cb10000000006cf01ba1adcb671c8caf9022491c... extension new: [118] 0072d767b3557c78f430df68cb10000000006cf01ba1adcb671c8caf9022491c... handshake old: [508] 030376206bad1e2de786f7b85219cd32fe91553fc74e3ee59b9a9e3fedaa4710... handshake new: [510] 030376206bad1e2de786f7b85219cd32fe91553fc74e3ee59b9a9e3fedaa4710... record old: [512] 010001fc030376206bad1e2de786f7b85219cd32fe91553fc74e3ee59b9a9e3f... record new: [514] 010001fe030376206bad1e2de786f7b85219cd32fe91553fc74e3ee59b9a9e3f... client: Filtered packet: [519] 1603030202010001fe030376206bad1e2de786f7b85219cd32fe91553fc74e3e... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 00728de71d7d107c79408b28471300000000dacc1e3bf1a5a9651ba53569ce68... extension new: [118] 00728de71d7d107c79408b28471300000000dacc1e3bf1a5a9651ba53569ce68... handshake old: [301] fefdd509c9741ab45e5f506f66e3c88d8d8c5adf31cfa68e261c970a913b4485... handshake new: [303] fefdd509c9741ab45e5f506f66e3c88d8d8c5adf31cfa68e261c970a913b4485... record old: [313] 0100012d000100000000012dfefdd509c9741ab45e5f506f66e3c88d8d8c5adf... record new: [315] 0100012f000100000000012ffefdd509c9741ab45e5f506f66e3c88d8d8c5adf... client: Filtered packet: [328] 16fefd0000000000000000013b0100012f000100000000012ffefdd509c9741a... extension old: [116] 00728de71d7d107c79408b28471300000000dacc1e3bf1a5a9651ba53569ce68... extension new: [118] 00728de71d7d107c79408b28471300000000dacc1e3bf1a5a9651ba53569ce68... handshake old: [301] fefdd509c9741ab45e5f506f66e3c88d8d8c5adf31cfa68e261c970a913b4485... handshake new: [303] fefdd509c9741ab45e5f506f66e3c88d8d8c5adf31cfa68e261c970a913b4485... record old: [313] 0100012d000100000000012dfefdd509c9741ab45e5f506f66e3c88d8d8c5adf... record new: [315] 0100012f000100000000012ffefdd509c9741ab45e5f506f66e3c88d8d8c5adf... client: Filtered packet: [328] 16fefd0000000000000002013b0100012f000100000000012ffefdd509c9741a... extension old: [116] 00728de71d7d107c79408b28471300000000dacc1e3bf1a5a9651ba53569ce68... extension new: [118] 00728de71d7d107c79408b28471300000000dacc1e3bf1a5a9651ba53569ce68... handshake old: [301] fefdd509c9741ab45e5f506f66e3c88d8d8c5adf31cfa68e261c970a913b4485... handshake new: [303] fefdd509c9741ab45e5f506f66e3c88d8d8c5adf31cfa68e261c970a913b4485... record old: [313] 0100012d000100000000012dfefdd509c9741ab45e5f506f66e3c88d8d8c5adf... record new: [315] 0100012f000100000000012ffefdd509c9741ab45e5f506f66e3c88d8d8c5adf... client: Filtered packet: [328] 16fefd0000000000000003013b0100012f000100000000012ffefdd509c9741a... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/1 (157 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.CaptureAlertClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 0303acb346f30997b6088e27999d3daf83e7fb106842f154b9d564623325131d... handshake new: [85] 0303acb346f30997b6088e27999d3daf83e7fb106842f154b9d564623325131d... record old: [90] 020000560303acb346f30997b6088e27999d3daf83e7fb106842f154b9d56462... record new: [89] 020000550303acb346f30997b6088e27999d3daf83e7fb106842f154b9d56462... server: Filtered packet: [773] 1603030059020000550303acb346f30997b6088e27999d3daf83e7fb106842f1... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.CaptureAlertClient/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.CaptureAlertClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] fefd73805fd799c2c00266672268c4fee52d0741ad3a9f8e2ea42c2c56d31d21... handshake new: [85] fefd73805fd799c2c00266672268c4fee52d0741ad3a9f8e2ea42c2c56d31d21... record old: [98] 020000560000000000000056fefd73805fd799c2c00266672268c4fee52d0741... record new: [97] 020000550000000000000055fefd73805fd799c2c00266672268c4fee52d0741... server: Filtered packet: [887] 16fefd00000000000000000061020000550000000000000055fefd73805fd799... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.CaptureAlertClient/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 255 client: Warning alert received: 255 client: Read error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownAlert/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 255 client: Warning alert received: 255 client: Read error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownAlert/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AlertWrongLevel/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 10 client: Warning alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AlertWrongLevel/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AlertWrongLevel/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 10 client: Warning alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AlertWrongLevel/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownRecord/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Send Direct [5] ff03030000 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownRecord/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownRecord/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Send Direct [5] ff03030000 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownRecord/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [63] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... record new: [64] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... server: Filtered packet: [86] 17030300514ed15ad620334d1c4e554963ed546a7100ceea57d53309ee536427... record old: [37] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... record new: [38] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... server: Filtered packet: [60] 1703030037f505625bae38f7fd13743b0abbb080955ebcfa8498595dc7d95087... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [63] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... record new: [64] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... server: Filtered packet: [86] 2fc78300511a9cbf8087728430974e1103b5329ced835341da1b36a1f9833efb... record old: [37] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... record new: [38] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... server: Filtered packet: [60] 2fa93e0037751fa36e23eb8d4c3d651b1e89f724e1ac020ec56d41078f7c01c3... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [80] 7b292fae5d038e4d9b202df31ace7e959591352c92e4c41d8f2aaf836230113f... record new: [416] 7b292fae5d038e4d9b202df31ace7e959591352c92e4c41d8f2aaf836230113f... server: Filtered packet: [421] 17030301a07b292fae5d038e4d9b202df31ace7e959591352c92e4c41d8f2aaf... record old: [54] 9ee9af4f596c71180f850381daae04ece9b243d0df2bb831e1e15a1f0b6b6a34... record new: [390] 9ee9af4f596c71180f850381daae04ece9b243d0df2bb831e1e15a1f0b6b6a34... server: Filtered packet: [395] 17030301869ee9af4f596c71180f850381daae04ece9b243d0df2bb831e1e15a... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [80] aa6ee4db2407e17e8bec94756be3a577199f0401b41747c4b52f6fe164c3f417... record new: [416] aa6ee4db2407e17e8bec94756be3a577199f0401b41747c4b52f6fe164c3f417... server: Filtered packet: [421] 2f000001a0aa6ee4db2407e17e8bec94756be3a577199f0401b41747c4b52f6f... record old: [54] 31a34c9dfa6371e0e8cb42613aa7faa4fa550a89d3f42504a904ef3581da1a8f... record new: [390] 31a34c9dfa6371e0e8cb42613aa7faa4fa550a89d3f42504a904ef3581da1a8f... server: Filtered packet: [395] 2f0001018631a34c9dfa6371e0e8cb42613aa7faa4fa550a89d3f42504a904ef... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [90] 020000560303aef500d4f17bcc8b5cb52420ee9f383b07da373b515686f1fc9c... max: [80] 737656ac29ec3c6360656d249338571ff7256218903dc93101afc35782b1ebc8... max: [80] 5bc79c5b2089fe22331aebb769c71242b320cb7ba19ff0243834b3c18ff03439... max: [80] de230d10b78e7a411d6138071726694faba3993c7b704a32964905796be1983f... max: [80] 832e5451230b1daee5830d78cc131f76dd231b3257b19122ec1d2fda3934d750... max: [80] e2b2f85d141bc93378b98e14b41391975746f14f46120943caa8028565b44ad4... max: [80] c5ab0a815e789434397ab0eca46f4e663a13ea987a4372ffbcb6c8ac455a4f51... max: [80] 489050b2d054b1df40dd00b03f604fbd46c1eb22bd6e67100d6e61f47ecd9d70... max: [80] c71fe48d899be4b036fe16a2044e165f881ef3793bd62aab12a1b45dfda67e0e... max: [80] 65b3eb2cca0161c72147a8d59b068275bddf616dc4b1784c158957733c403845... max: [80] 85d1d8aa31bdc219c810deeab73181d36bc024dace944d099c5e738e933725fe... max: [44] a3d7e4d43a176e7f3408180a552d2266b5e8f8bf5423b0d9fd8f80b70ad4f05f... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] b4a18d020001e6cf3ecb46aa09fa28f494a5f5d66a131202808d07edaf3848a4... server: Filtered packet: [86] 1703030051b4a18d020001e6cf3ecb46aa09fa28f494a5f5d66a131202808d07... max: [54] cdf5ccdb8fbc9fc9edb7d63643e852b62706b3afea98ee0dadbe89980d425ace... server: Filtered packet: [60] 1703030037cdf5ccdb8fbc9fc9edb7d63643e852b62706b3afea98ee0dadbe89... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [98] 020000560000000000000056fefd375f179865cdf4bd5cf6c4b97924365e2702... max: [65] 1f58b18a1657bfe7eff5b8afe777118cc257e4db90b48f3f98e9033e74426477... max: [80] 3f079da98c6c5afa4377466d33cb8e0fefe2e385c0fc592756a9638771d52d62... max: [80] 22cc8e1994aed6b54f0880e3826bbc17f713525c86a30afb0e154daa48f715f3... max: [80] dd91bcd204eb22e953c7b18410fa80aed56f4c77d426ed6b891e003e4cc5781b... max: [80] 85996359bf6ed03af40c8f3bd61e8ca5262def275b062824fa517402f9efcb96... max: [80] 5c8d1af6bbd28789b0a2e8b5dcbbf00051ecded31261f9da05bb2b6ea6269a90... max: [80] ddf109e2c7b54c5678b975babbc7de827cf4799933931a20a39abb773ef960a8... max: [80] 10d20f1c4eb0cbed08ca17edea33105790b7dbbe3737599196aa95b400f3fd89... max: [80] f5e8101f262c2436c71e2b4c9e060ff4a00a8a57e7c8e59ba55c0e016b1408fa... max: [62] bf2f384091a11c0e4bedc832d6dee03d4f05fa993751c4eebf4e4551906a39a6... max: [80] 6e947d153007b716ea3c04493475175b9c80137b62ffc91b04f21f9a79790a7d... max: [80] 10b204ee68408ba36151a4817818c1a7cde24c3e4d3257f502278d639cfe0910... max: [59] 759eafc96bc5f0263591a40a14ebb0528ca537c7144ff7c262a4d3eb279de3f0... max: [61] affbc7c27ac3fe2c1d74239ae194d7c126c832d3c8efab626fdfae721bba5e95... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] db59109f134fa7c80975c1e640c1048e97cdaf5a81c166a0ff67fc Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 7daed6fadf527396867b5cfb7fa35ea2ad3dc977691bdcec14e102b6c068537a... server: Filtered packet: [86] 2fb30500517daed6fadf527396867b5cfb7fa35ea2ad3dc977691bdcec14e102... max: [54] b5d33edcab854a6b8a3960b4f7ddbd2c75cecb21ea34f7ec03200a4ed3c2d1ea... server: Filtered packet: [60] 2f43930037b5d33edcab854a6b8a3960b4f7ddbd2c75cecb21ea34f7ec03200a... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/0 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/1 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCNotConfigured/0 Version: TLS 1.3 [ OK ] Version13Only/TlsConnectTls13.DCNotConfigured/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCNotConfigured/1 Version: DTLS 1.3 [ OK ] Version13Only/TlsConnectTls13.DCNotConfigured/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/0 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/1 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/1 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCWeakKey/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 71 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 71 server: Handshake failed with error SSL_ERROR_INSUFFICIENT_SECURITY_ALERT: Server requires ciphers more secure than those supported by client. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCWeakKey/0 (21 ms) [ RUN ] Version13Only/TlsConnectTls13.DCWeakKey/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 71 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 71 server: Handshake failed with error SSL_ERROR_INSUFFICIENT_SECURITY_ALERT: Server requires ciphers more secure than those supported by client. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCWeakKey/1 (21 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [75] 04030047304502202ef3fb52fc75e8e65d37daa59942abb3a02427e0cc9b2afb... handshake new: [75] 05030047304502202ef3fb52fc75e8e65d37daa59942abb3a02427e0cc9b2afb... record old: [687] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [687] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [804] 160303005a0200005603037018b8232ac26b4447995baefcab59636295ddb9cb... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [75] 040300473045022100e09ac068362eb9c85b0c2ca98a6fab507278de9ad7dff3... handshake new: [75] 050300473045022100e09ac068362eb9c85b0c2ca98a6fab507278de9ad7dff3... record old: [87] 0f00004b000300000000004b040300473045022100e09ac068362eb9c85b0c2c... record new: [87] 0f00004b000300000000004b050300473045022100e09ac068362eb9c85b0c2c... server: Filtered packet: [919] 16fefd00000000000000000062020000560000000000000056fefde29681b393... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadSignature/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_BAD_SIGNATURE: SSL received a delegated credential with an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadSignature/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadSignature/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_BAD_SIGNATURE: SSL received a delegated credential with an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadSignature/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExpired/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_EXPIRED: SSL received a delegated credential that expired. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExpired/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExpired/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_EXPIRED: SSL received a delegated credential that expired. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExpired/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INAPPROPRIATE_VALIDITY_PERIOD: SSL received a delegated credential with excessive TTL. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INAPPROPRIATE_VALIDITY_PERIOD: SSL received a delegated credential with excessive TTL. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INVALID_KEY_USAGE: SSL received a delegated credential from a certificate with invalid key usage. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INVALID_KEY_USAGE: SSL received a delegated credential from a certificate with invalid key usage. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [76] 040300483046022100efe47e6c529ac069560631ed643aff742bc7a84ca72827... handshake drop: [32] d3664499456addddf0771b0177e7dccb0e500175a2c7a8f933418f9796196e7e record old: [690] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [574] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [691] 160303005a020000560303d15df13785b4e06f521a1e1e4067ab171b794c8b3b... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [75] 0403004730450220361269c25f4eea36ac8b0f67f344764186714c2fbc39bd73... record drop: DTLS 1.3 <46> 2000000000002:[104] d94c6a0713d817f03030ff1fd033617a2aeba4258307b212a7041d44d68a3c8a... handshake drop: [32] 7f16f76d9f3cd2f814e6441f9fecd16251c9b217fd1b58b0d94bff27a5b12095 record drop: DTLS 1.3 <46> 2000000000003:[61] e98b0cd5364318a2ed6ecadea59b69a7e6b2ab9d0c9f0d98d278c646d9f8c23b... server: Filtered packet: [744] 16fefd00000000000000000062020000560000000000000056fefdb44c958731... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [75] 040300473045022100e2b5ff5523fcf8dc12e3f0317162fb2660c30f75c9a461... handshake drop: [32] f41f8e2d34303cd2fa3b792028606a2127b34a0ded1189a34f5a60e114a87d5a record old: [509] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [394] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [511] 160303005a0200005603037599df27209d816e97ea2928972e81231917013fac... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [74] 04030046304402206a8f3fecd6bc061bb8467cb7b04f284835e3fd59ed163524... record drop: DTLS 1.3 <46> 2000000000002:[103] 57b0ab2ce049a80b1131e34f75a1781e7df1b247a1758e5379c20fc7dbaac412... handshake drop: [32] baf1ea705007c9b791c1ccbfb4445af2c818a3a0dfdf5d91dc95caedd9d472c5 record drop: DTLS 1.3 <46> 2000000000003:[61] b5f6a2b3cd14160a241dce87069a4a55bfd5177f36b020d6b52534577c42d13d... server: Filtered packet: [565] 16fefd00000000000000000062020000560000000000000056fefd09d7c5f9dc... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/1 (9 ms) [----------] 244 tests from Version13Only/TlsConnectTls13 (2035 ms total) [----------] 6 tests from Tls13ZeroRttReplayTest/TlsZeroRttReplayTest [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/0 (10 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/1 (10 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/0 (6 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/1 (7 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/0 (10 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/1 (10 ms) [----------] 6 tests from Tls13ZeroRttReplayTest/TlsZeroRttReplayTest (53 ms total) [----------] 292 tests from GenericStream/TlsConnectGeneric [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/2 Version: TLS 1.1 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/3 Version: TLS 1.0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/0 Version: TLS 1.3 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/1 Version: TLS 1.2 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/2 Version: TLS 1.1 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/3 Version: TLS 1.0 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/0 Version: TLS 1.3 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/1 Version: TLS 1.2 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/2 Version: TLS 1.1 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/3 Version: TLS 1.0 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 Version: TLS 1.3 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 Version: TLS 1.2 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 Version: TLS 1.1 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/3 Version: TLS 1.0 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/2 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/0 Version: TLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/1 Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/2 Version: TLS 1.1 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/3 Version: TLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (26 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/3 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/3 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/3 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008015b79facd87ba9a002332ee9d3c0efed39695dce9694ed80383a021f... handshake new: [132] 0804008015b79facd87ba9a002332ee9d3c0efed39695dce9694ed80383a021f... record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... client: Filtered packet: [645] 1703030280cb39b30fc7be3c3b15eef93abff0b04c116dd9644bc76742ea2876... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 020100808d9079eff8b2ff1362edde3f6bf8606f9915db3bcd620073372ab74a... handshake new: [132] 020100808d9079eff8b2ff1362edde3f6bf8606f9915db3bcd620073372ab74a... record old: [621] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [621] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [677] 160303026d0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080acf31d2849d332cb37c3c0fdad7a38f5d813cc6ba272708df41fb4df36f5... handshake new: [130] 0080acf31d2849d332cb37c3c0fdad7a38f5d813cc6ba272708df41fb4df36f5... record old: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [699] 160302026b0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00808819a018784efbe1363a63d5ce886dbccfa3783402bc20d09075ade2fff4... handshake new: [130] 00808819a018784efbe1363a63d5ce886dbccfa3783402bc20d09075ade2fff4... record old: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [683] 160301026b0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 (15 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/0 (18 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/2 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/3 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/0 (18 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/1 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/2 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/3 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/0 Version: TLS 1.3 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/0 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/1 Version: TLS 1.2 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/1 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/2 Version: TLS 1.1 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/2 (1 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/3 Version: TLS 1.0 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/0 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303de47360acb274a543f35d874bc45898f6a5e72de7e1d273d425c096b59e6... handshake new: [179] 0303de47360acb274a543f35d874bc45898f6a5e72de7e1d273d425c096b59e6... record old: [184] 010000b40303de47360acb274a543f35d874bc45898f6a5e72de7e1d273d425c... record new: [183] 010000b30303de47360acb274a543f35d874bc45898f6a5e72de7e1d273d425c... client: Filtered packet: [188] 16030100b7010000b30303de47360acb274a543f35d874bc45898f6a5e72de7e... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303904b535cf8161fa74f96c68fd9dd7cdf81edc7a82ddfeadc2c8d78fa3425... handshake new: [186] 0303904b535cf8161fa74f96c68fd9dd7cdf81edc7a82ddfeadc2c8d78fa3425... record old: [191] 010000bb0303904b535cf8161fa74f96c68fd9dd7cdf81edc7a82ddfeadc2c8d... record new: [190] 010000ba0303904b535cf8161fa74f96c68fd9dd7cdf81edc7a82ddfeadc2c8d... client: Filtered packet: [195] 16030100be010000ba0303904b535cf8161fa74f96c68fd9dd7cdf81edc7a82d... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0302a80a49ffb75dfe6c0eb395396a03a41dfcb430829a5f1beac3d5cba414cd... handshake new: [116] 0302a80a49ffb75dfe6c0eb395396a03a41dfcb430829a5f1beac3d5cba414cd... record old: [121] 010000750302a80a49ffb75dfe6c0eb395396a03a41dfcb430829a5f1beac3d5... record new: [120] 010000740302a80a49ffb75dfe6c0eb395396a03a41dfcb430829a5f1beac3d5... client: Filtered packet: [125] 1603010078010000740302a80a49ffb75dfe6c0eb395396a03a41dfcb430829a... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 03010938616e49b2df27189cae6c3f95ea4a52ce60133c6b2854af2ac9a0d6f7... handshake new: [116] 03010938616e49b2df27189cae6c3f95ea4a52ce60133c6b2854af2ac9a0d6f7... record old: [121] 0100007503010938616e49b2df27189cae6c3f95ea4a52ce60133c6b2854af2a... record new: [120] 0100007403010938616e49b2df27189cae6c3f95ea4a52ce60133c6b2854af2a... client: Filtered packet: [125] 16030100780100007403010938616e49b2df27189cae6c3f95ea4a52ce60133c... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [184] 010000b403039e5a3b7ebf61280729874d178924f526d3cfaa70103d32dcfc24... max: [90] 0200005603038f5efd1c5bad782cc8ef9938e097b56de5ce3c4ac6bc81e14213... max: [674] c2769a176772acbc728c46241fc1464b780fdd03dc69914bba0b0f69fa9589a1... max: [53] d08d56f9656a81e6a083f986959c7ff60c39c78805db88af62c95aab95c9062c... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [16401] 6962b619ec1b03cefb7e862bf1055ab35f10e633e08880c76715173fb4dc4162... max: [18] 14f7e26d189778c30fccd45e53d2a4f1d385 max: [16401] e7750b6b4107b4af082adbf19e30785c564c0712aec3abb5f837836e1e3512a3... max: [18] bfff48ade1c5474f427d172bffc6afd21ee3 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb03037c1e1c4e8283faabf435d11f59de2c622e3a294b1cc68b4e31e9... max: [715] 0200005d03030965d23aaa8ce820e2be15d0391277cae98c2bd9986e1575f106... max: [37] 1000002120ff26e68dea746f2d1c1ed7a41d656f4731d14cb8b5c008f3784e8b... max: [1] 01 max: [40] 00000000000000001b561fa06aa13a0f7e54359cb6d7e541ca0960fbcef22197... max: [1] 01 max: [40] 00000000000000002ac5f05d8484290353d4fae5400ca999e4a840606c093105... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [16408] 000000000000000191fc89469e3484ead59be410b3f67fa621549dd60de12665... max: [25] 00000000000000027200005e4f1e8aae670c553db175fb8540 max: [16408] 00000000000000018daec8f171d7fb6aab425c1c0610ffeb43427d588497667a... max: [25] 000000000000000273a24da6c20287c788a09319e31bf21ab7 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 01000075030222da37101eb8944a0e529885b548bed2ce1683bff6909f5e86de... max: [713] 0200005d030243ab49d12e4cc9bb33bb67b801170601fe843fbb6dcc87d12985... max: [37] 1000002120484f6885f669848181e66d0ca7b85790eb6c503cfe11b54014a6dc... max: [1] 01 max: [64] e77a7fb2e6dbf9edf5628370501b6e3578405ea25e982e152982460fbc07d2b8... max: [1] 01 max: [64] 52de4b98617dc11c76900579dbe3735a5ddc076cc6f6a9aec63f4547c766d9ed... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [16432] c3456e29dd7b0baf1b5b8d25877daec89e6a5e6587dc932716e79aafb839edc5... max: [48] 92ae993386950d0256f1731da31ebf0fa8bde7adb9c76961db13452f53f186e3... max: [16432] d315b6b7aa8632fead0ee085608b7fa78e3b53832eca0e7af4887873acd33e85... max: [48] 6b025e75337b02d1db9320bceaab05dfb3de8514bc06b03dfa6339576e600f74... client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750301e30f0377110d767ea1d0cead9d10e2ecea881e1ad391ac4d331e... max: [713] 0200005d030140a6fc4ea86212a98186157f6488b6eccae28eb72fd444827c11... max: [37] 1000002120ceccbcc1dfe7236f3450e4b5465bbaf51d0bae4d8c440cd6dc9116... max: [1] 01 max: [48] 55fa7be2d3614deb4b8f0e0a148eeb0b6f946a483efda2cb008678b8970f5ea3... max: [1] 01 max: [48] 461f9ad2df950ded70f6bef13e125f3d94e72543bb2b35863e17f7ca7e81b24c... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 468cb9d11e195dee28550b0afdf15597f580884dc86cbcafe664344b661ea2b4 max: [16416] d475c0d3819861f52ee64998243a8c1c79f5fe56fbbdaf3cfab44068c66d5352... max: [32] b5b9a51f6410e572a67d62846eb8b56d7f68f5ff647401b1c5e5a1315894afdc max: [16416] 65c2e8e87451c7fc4cabed84be420ea0608f91a66bb34a35af8e72f9cd388121... client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [90] 02000056030387c8bcd25b64f86369f4b005b9a3967d9d4e356978e6b27fec3e... max: [80] 5bc770fc6dde3ff99d014d4a0a5e5d5f3098c625fcc27f16f07d1bca75333c13... max: [80] 3081a72b63b8ac17196781cf2cb520a3e3614f50b1153c2348271446245d0dc9... max: [80] 65254728ad2d8e2748f5daa8f536e3064e91b27372f2e8bca859cae7ed6b9c3c... max: [80] c8a6475a0629680f53c42eaeed1df9b821926339d5f3efaadb070883cd841c25... max: [80] 5b60863dc8586c062982b3d13bead6a8d6f694669d757dd5c416ab583a2efd90... max: [80] dafae734155a25b5ad75d00676fe721c7bbd7fc960d1a0a2c96d56713e789499... max: [80] 78d1dd9a232691ae43e0fa2ef14a01f72358d479614d35e970909de96279055c... max: [80] e6bb02af4c3b08da83d3eadfb08221af734e1f1d5af74c59a90e6609cdb0145e... max: [80] 7d249d5d8fb0dfc0f2631f278dc60f73ec8a8a5072d4b90dc32d1a3c3e858135... max: [80] 502b55387711bdb953de687a8bd14800b6a10bdc44f3997f82263cde3fe6bd54... max: [44] 4fcc9708233dfa409bce91816c4ef974b1cdcd5f9a375cb37eb474a611462e91... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] d0a788b5381f5b2cb52bca491323381e1d802ea6fa4c96d48a8d87224b4e1eaa... max: [80] 296a82ba10a68484b2d7e406845d13069d629ae27e4b343e62fe11ea8304e41c... max: [18] 4361f207710488ca087689a4235fd9ea5805 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [715] 0200005d03035eb0b1e06b7ba46d8052a5555e486202d032614cfcb79ccbf06a... max: [1] 01 max: [40] 00000000000000000ace2048c06cbb016ce5c0bb87aac2ea5782bfc5afe19908... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 00000000000000013b8e7383de68d70a35aaab3304efdf32561ea6ae990ac314... max: [87] 0000000000000002ff12a8414fd89d7ccb4a58e9cd0c377f738d1ae59b285f62... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [713] 0200005d03028b40f3df966f11e9a314a634e7c8dea0bd920c295b199c75683f... max: [1] 01 max: [64] 30150f67499eba51b1f1934e626ce76b2507f4b3ccb976a91751d2d334ffd335... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 96e714f017929fcfc149af95f22f54a9f558a6db3a92d6101b8b3806c95b46a0... max: [112] 313ba47ff8dd227f5d1e54fd280afef8b5d3b46c8215e61a5611a401d9035e3d... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [713] 0200005d03011c7f04fa5c7288c367b178e318b66d1c20aa2b396f372801ff02... max: [1] 01 max: [48] 58200d32d90a18f3e1df0e4b3e2a6f303948b38456e1c46246a77c9fc68c03c6... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] ad20c8cd65d1cf3173848651f65ebdac07ca19240bf190eda0776dfdbccb3143 max: [96] beb0ad200db80ae1300dd8c0160e48c5fa01f0e50f65168dce02753dfda534b0... max: [96] be86ddce6c15093371e46f2defcac7f0b9cc07013f69341afeaef0fd61e7852f... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [184] 010000b4030355556788cd3237b47d6997957839a25777cbecc65ce035f4d126... max: [53] 52da9adadb923238331b4c648ad61796e527d7b10672d83a9516b3998f56e24b... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 6ec0be421c0c4e41a07b388a214c2715052acd75068b927aa810d5b836fc2abb... max: [80] d445922c3aa6c1207e15746d75ae95ce137eb2f7db0fab6b2d40c1f3dc777743... max: [18] 1712d1322f7678948a7ddfa5f3e984e2684a client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb030349c8889c6829fd7ebb9581adcb8f0042179b10b69b18283d145d... max: [37] 1000002120fb835240bee9210195f43bb0ca4eddcb83d95e82214c19b561065b... max: [1] 01 max: [40] 0000000000000000e99bccf70902b50f23d92993c42daff9ae91196fdb1ff52d... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 00000000000000011cf1a03c48b67a422f545aeacc562459331a481a49cb2cbf... max: [87] 0000000000000002c3e440f4db9473c946e7e2c07d841eb92d6705bfcdbdb168... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 01000075030294ac9db830d45ac07da57596dcbe670943893bfeae1edefd3747... max: [37] 100000212014f64db7a109d2c2657320cfe1b0a57a709420f67258002f333b29... max: [1] 01 max: [64] ee1aa32b02926b18385cdcf2a0675459f870bb3711a25697416b0bae8d035534... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] c971d710b2cdd35f89a1ff188e0b325ab862776848f2368c040312ac96b64a5b... max: [112] dfd5c03864b287e8ae484076bce7ffd4475c46bb574f0f54e9604dcd0fa08ca7... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 01000075030177d44fac9447dd2a9fcdcd449da0333894e611506bb9f8d79fe9... max: [37] 1000002120d19ab0d7e14130a380036cee925b0721c76f2916911f47bc64645a... max: [1] 01 max: [48] d7a92fab7e1af21849e3a33e559205f755c36adbbbb758ed026c17321b69ab12... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 50a3784d6007ec11e23f7f3ba0d26f5a92cdd052c974e2f325052c9977d0a53e max: [96] a4083bcd374866d0a2b1bee4831cbab8fe2faf33faf4d7de78b18308de2fadf0... max: [96] bb843056c01dfc1c62fd8005d0798227cace562f7c06a1c2a5e33fd15007bc32... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [184] 010000b40303974676de89b1f2bf88a77e3438a135e42e09bb0514dcb669ba54... max: [90] 020000560303cf7f3afe59c28b3a4561ed8f7d0fdabf29099b77a1d759a9759c... max: [80] a2d80689da3b21f5d6f920a209a9729068d904b6cd79a396d0f7daf604308c20... max: [80] 6c34c30e299866b82685a4c1e45a86ae74fd36e3069d5e9fc052986121b6335f... max: [80] ddbe687229431321dc8633a0a4fa5d5f6bba49e52e0b4a3ff3966754d7b72970... max: [80] 979440c6a9cddc8a2159540ded32f7428553608af78fcd001516828e15aad3c1... max: [80] 5900eec3b25e4f5e51027ae637dd868ef817785bda80d662c8ea0c356b2f486c... max: [80] 2451a702b50d519488beab5bed922720b263185aea60369dc9360c7084c973ae... max: [80] 3285ae827ec00cb47e18a9d1007bca8ec2c41cc661849ab48c4d8d3c76cc1716... max: [80] 46e28fd39868fa3f04d7a0286c681f90c8fcfb2221b483008af3b62c9a6bc2f9... max: [80] bf3ff580828e1c8f01d90630c60de430ae9b340aef2155ee466caaba412b39b2... max: [80] 3a4c842346f32e67174f025861c237d89fd150b0921784463b03d8386374d88a... max: [44] 290bea3dcc12591c9129cd71c523fb90791e72c4e2c7e6fc4c46162984e79e5b... max: [53] c00ce72d76899027977f7fe407faaa90966850c8be732d26c27c27083f3d2864... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [116] 82700426cb48e01f48cb353d6ab768373c1324535c7f6c2f57faa51251425770... max: [45] 3e62f0f6f052ef1a7e320f91fb4cbebff131bb039eafb6995ba6ddd399304ceb... max: [80] 6c3206b9475f794f4b844da033ae3f7dc59934889c7a288210b45fb15dd42f9e... max: [80] ef665b5e027ff1c6de0b6c259860e3106e0c100ecfa8996bb047651797a77ff3... max: [18] 049ffc6f785cca945c7c8b8fe747e1a10c84 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb0303ac950c6ef1d9b3f020242c5f55faffd651bfdf786fb2a8e349f0... max: [715] 0200005d03033f91696120f4ea99695d6d08369b2b90081e0b51c1733d80ca43... max: [37] 10000021207f8237f4c7f6b8de71732b5b46dfd34928d00a74c52a4784037299... max: [1] 01 max: [40] 0000000000000000223d2f94516f40db48ca6e032d1f108ca823ea014a35dc99... max: [1] 01 max: [40] 00000000000000006113a19b37e7937205f9a6802058f8bdd383ab04ead9b353... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [124] 0000000000000001a502ea9f481dffb181b0a2b87dbadf2c5b63b864810c3ad1... max: [51] 000000000000000206677aa85e1b86f1e54f640d14e39b852969a8daab58fd3f... max: [88] 00000000000000019c533d5a0dbd61967a8ff7ee5125244ed4219abcf97c445a... max: [87] 0000000000000002056d714842e9206d579ca12bde0d2da10cf77ca567c6c462... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 0100007503023e57b544bf87dba06b18beae86e7af72b1ec8162139ac0437f0e... max: [713] 0200005d0302650d24b0bdb604f10afc160b555f43636e0dd0a108f01585f45a... max: [37] 10000021203b6c06bee0bbc5e6973022cb19c9ed9d3b6292a8b89ea24837382f... max: [1] 01 max: [64] 9683f238e02925da1d65dfff5af138f91ab15b3098dcb1cdb325be1ad9d1c816... max: [1] 01 max: [64] 7aaeade932cc83a1a7c1c87974c99919d19f045d29761171b8b55a214e840e39... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [144] 48207a9cfbfc8d0775ff59bec33ad586359609ed5deb1821ae0c3aa5885e96ee... max: [64] 5561a09413233530fccc9b4b415a7a806b36b74f9048b1cdd7d088209eebd823... max: [112] 1d889d5776d52c93bea085f383323b3c4f718b40aa58114d305ddbb045f10623... max: [112] 851a54d891284b4135cf61ea072022acd2c105902e380921ff8010dce5e7c19a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 0100007503014c7e51a102c4cc9876a36bb0b7719becc47be230dbdf1c12e29d... max: [713] 0200005d03012c8836f407a8af75ca9e2e5c0629bdc0d503d466cc9eb14f18a0... max: [37] 10000021204ed5b0f3a47d7d9dbdf0a495e575b8963a1d26cda8cc28f4710332... max: [1] 01 max: [48] d22aab719a15fb4ce0810ef9aa238897feaa1aecd9b7eee196f7a66e66c052fb... max: [1] 01 max: [48] bba6144bae4312df1d090a14a494b12edd5517d49f3f1add8e72036bcf5d9d72... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 1c2d2dbf9459c2d25af49fe2ee87ea44ca9aa1dbc7de79230b851071acb5fa99 max: [128] 47e99fde74dda623a467a20a6b0ffd09c840f31b81ec856016e9d0862dfb4e46... max: [48] 1c53164b02de6921004273b2698c97519a64209f67ca0685a20c8161e01f620c... max: [32] 68a4335d15632419804d0ae214ba839de7f7d5d9dc0d1fa37b9d7df19f5d00c3 max: [96] de7d17ef6169706243440347bd36a447081178bec9b4ee7dd2af5911dff51b8b... max: [96] 72e2b632d4a163525913b649cba92b4b6b56b8fb8297084c3c0a488902434303... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [36] 0022000a00140012001d00170018001901000101010201030104001c0002f41f... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a020000560303060b6b02f5678691a42b7e4ce8a0ca813e68c4ed94... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 0303b48a4ac9b6abc399db2cd8eda108d94967593d95e50a840b5eb54e0ebf42... handshake new: [93] 0303b48a4ac9b6abc399db2cd8eda108d94967593d95e50a840b5eb54e0ebf42... record old: [715] 0200005d0303b48a4ac9b6abc399db2cd8eda108d94967593d95e50a840b5eb5... record new: [715] 0200005d0303b48a4ac9b6abc399db2cd8eda108d94967593d95e50a840b5eb5... server: Filtered packet: [720] 16030302cb0200005d0303b48a4ac9b6abc399db2cd8eda108d94967593d95e5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 0302429821abb748603ffa78486c1e0e1a822bf1491484307b585019b8765a6d... handshake new: [93] 0302429821abb748603ffa78486c1e0e1a822bf1491484307b585019b8765a6d... record old: [713] 0200005d0302429821abb748603ffa78486c1e0e1a822bf1491484307b585019... record new: [713] 0200005d0302429821abb748603ffa78486c1e0e1a822bf1491484307b585019... server: Filtered packet: [718] 16030202c90200005d0302429821abb748603ffa78486c1e0e1a822bf1491484... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 03016eef1e20e0aa55cee3448128f1aabf7dadc05b93672d1fcd210b3a47cad3... handshake new: [93] 03016eef1e20e0aa55cee3448128f1aabf7dadc05b93672d1fcd210b3a47cad3... record old: [713] 0200005d03016eef1e20e0aa55cee3448128f1aabf7dadc05b93672d1fcd210b... record new: [713] 0200005d03016eef1e20e0aa55cee3448128f1aabf7dadc05b93672d1fcd210b... server: Filtered packet: [718] 16030102c90200005d03016eef1e20e0aa55cee3448128f1aabf7dadc05b9367... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [37] 0023000a00140012001d00170018001901000101010201030104001c00030100... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [658] 080000250023000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [775] 160303005a020000560303e4b8bbff2da1c21b5840c8b3080df8cc5f9ba0147b... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 0303fa35081d0f0a39b40109bb3bf8b94430187f1c868cd22be23b1a44565cca... handshake new: [94] 0303fa35081d0f0a39b40109bb3bf8b94430187f1c868cd22be23b1a44565cca... record old: [715] 0200005d0303fa35081d0f0a39b40109bb3bf8b94430187f1c868cd22be23b1a... record new: [716] 0200005e0303fa35081d0f0a39b40109bb3bf8b94430187f1c868cd22be23b1a... server: Filtered packet: [721] 16030302cc0200005e0303fa35081d0f0a39b40109bb3bf8b94430187f1c868c... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 0302a18054ecc1567a7873620fb40261be059c41db121d127b3f14d630d802b5... handshake new: [94] 0302a18054ecc1567a7873620fb40261be059c41db121d127b3f14d630d802b5... record old: [713] 0200005d0302a18054ecc1567a7873620fb40261be059c41db121d127b3f14d6... record new: [714] 0200005e0302a18054ecc1567a7873620fb40261be059c41db121d127b3f14d6... server: Filtered packet: [719] 16030202ca0200005e0302a18054ecc1567a7873620fb40261be059c41db121d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 0301edd5e55a7dd79cbbd6abc4b8dee1114a41c9a8af820f733beed381d9d3d0... handshake new: [94] 0301edd5e55a7dd79cbbd6abc4b8dee1114a41c9a8af820f733beed381d9d3d0... record old: [713] 0200005d0301edd5e55a7dd79cbbd6abc4b8dee1114a41c9a8af820f733beed3... record new: [714] 0200005e0301edd5e55a7dd79cbbd6abc4b8dee1114a41c9a8af820f733beed3... server: Filtered packet: [719] 16030102ca0200005e0301edd5e55a7dd79cbbd6abc4b8dee1114a41c9a8af82... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/3 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/3 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (10 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/3 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/0 Version: TLS 1.3 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/0 (139 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/1 Version: TLS 1.2 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/1 (102 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/2 Version: TLS 1.1 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/2 (103 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/3 Version: TLS 1.0 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/3 (103 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 Version: TLS 1.0 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 Version: TLS 1.1 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 Version: TLS 1.0 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/3 (3 ms) [----------] 292 tests from GenericStream/TlsConnectGeneric (2010 ms total) [----------] 219 tests from GenericDatagram/TlsConnectGeneric [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/0 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/1 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/2 Version: DTLS 1.0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/0 Version: DTLS 1.3 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/1 Version: DTLS 1.2 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/2 Version: DTLS 1.0 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/0 Version: DTLS 1.3 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/1 Version: DTLS 1.2 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/2 Version: DTLS 1.0 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 Version: DTLS 1.3 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 Version: DTLS 1.2 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 Version: DTLS 1.0 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuth/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuth/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/0 Version: DTLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/1 Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/2 Version: DTLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (21 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008054f1cd75b62c1f5d0719297b8b30cba166c57f05a231d91c89231c7b... handshake new: [132] 0804008054f1cd75b62c1f5d0719297b8b30cba166c57f05a231d91c89231c7b... record old: [144] 0f00008400020000000000840804008054f1cd75b62c1f5d0719297b8b30cba1... record new: [144] 0f00008400020000000000840804008054f1cd75b62c1f5d0719297b8b30cba1... client: Filtered packet: [713] 2eb3f301dc55545669b37b58be3b38677d66932713bd990cb1305915840cef0c... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 020100801cede4e8ce91387cd37db20859029f00a55c7d3a47bf14222f7fe0b5... handshake new: [132] 020100801cede4e8ce91387cd37db20859029f00a55c7d3a47bf14222f7fe0b5... record old: [144] 0f0000840003000000000084020100801cede4e8ce91387cd37db20859029f00... record new: [144] 0f0000840003000000000084020100801cede4e8ce91387cd37db20859029f00... client: Filtered packet: [759] 16fefd000000000000000101c80b0001bc00010000000001bc0001b90001b630... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080a37934e9cfd38f00cdf58b5ce46ae95e15b486e8b57f699d6265384015c4... handshake new: [130] 0080a37934e9cfd38f00cdf58b5ce46ae95e15b486e8b57f699d6265384015c4... record old: [142] 0f00008200030000000000820080a37934e9cfd38f00cdf58b5ce46ae95e15b4... record new: [142] 0f00008200030000000000820080a37934e9cfd38f00cdf58b5ce46ae95e15b4... client: Filtered packet: [773] 16feff000000000000000101c80b0001bc00010000000001bc0001b90001b630... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 (15 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/0 (17 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/0 (18 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 Version: DTLS 1.3 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 Version: DTLS 1.2 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/2 Version: DTLS 1.0 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/2 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd4e1cb8a647efd687a326e6dc4968e4b7d16223026fe84187e1bf4f42b159... handshake new: [180] fefd4e1cb8a647efd687a326e6dc4968e4b7d16223026fe84187e1bf4f42b159... record old: [193] 010000b500000000000000b5fefd4e1cb8a647efd687a326e6dc4968e4b7d162... record new: [192] 010000b400000000000000b4fefd4e1cb8a647efd687a326e6dc4968e4b7d162... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefd4e1cb8a647... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefdc7f8b9fae6e741ced9f236eeae0fd32f24530110c0f7970420dfa4ad5cb3... handshake new: [183] fefdc7f8b9fae6e741ced9f236eeae0fd32f24530110c0f7970420dfa4ad5cb3... record old: [196] 010000b800000000000000b8fefdc7f8b9fae6e741ced9f236eeae0fd32f2453... record new: [195] 010000b700000000000000b7fefdc7f8b9fae6e741ced9f236eeae0fd32f2453... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefdc7f8b9fae6... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [114] feff35d6e62180e491a30af6147c88d92ac5eb2772c94dee6453925f55a0b04f... handshake new: [113] feff35d6e62180e491a30af6147c88d92ac5eb2772c94dee6453925f55a0b04f... record old: [126] 010000720000000000000072feff35d6e62180e491a30af6147c88d92ac5eb27... record new: [125] 010000710000000000000071feff35d6e62180e491a30af6147c88d92ac5eb27... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feff35d6e62180... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [193] 010000b500000000000000b5fefd90f916580a2ec854702bb7af09e2e57355f1... max: [98] 020000560000000000000056fefddce4350392e1c25d859ed233a9ec71530f46... max: [65] 46ec36390c778129af0c76fafa18c4eb24303efe90abc3ebb4de82f47ba1d5f9... max: [470] 8b436cd57637eeb921fa8c05ae56c4fb5b812311fde839e77ab0e186d0846602... max: [161] 022c0a25f885b7687a09b62ed2dbfcad0dab83b1f27dda30d327b4a572713c98... max: [61] 621f5f2d36e76be964e2b93fc91e3522c0eaf993d7714e0884c799b48c6347e5... max: [61] 1494f71512a59d8562ca2c21a55a2039f0fe5ef15f573c5efceedce718294da6... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] 5eebbc3a98e1a2a186b9a44d902f88cb63d9fcdda1c26211abff2d client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [16401] 437448054820ab565d11b62be57b0699ffd6dd36dd2211c92c89051368029e96... max: [18] 7778c7cfd8539f0711c78115983e9619f193 max: [16401] 5145f55404739ac3e7e52fee8fd9d923309581e34395f2d3a675d7723e2f500b... max: [18] f3c9784be49efd6ad0a42533316f187307da client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefd1672164002488a24b6f4a482c14b6c603681... max: [105] 0200005d000000000000005dfefd9f74c18131f6a1eaed30c1bf006b6779d2cc... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... max: [12] 0e0000000003000000000000 max: [45] 1000002100010000000000212009ca2785a968e757ec43bb3a88967ccdd660bc... max: [1] 01 max: [48] 0001000000000000c39c84f99d8195db0656dca3a5eaee17f525526f9a950b6c... max: [1] 01 max: [48] 0001000000000000484297b6bf3af573e174797dfa2866e81109b5b5008a038c... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [16408] 0001000000000001f3cce3a9c8a321613f8e6ba6f3f289f22ce3254a349f667e... max: [25] 00010000000000027ba2d79454dc72e4d925722dc572b708be max: [16408] 00010000000000014f4c67755a83219728a9f1b8ec9e750badbb7675a1e532c7... max: [25] 00010000000000021fb3cbaaf744954de6a7c8e8d622ad8c96 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feffff1a2b8d886588a9e8974a8e169220573348... max: [105] 0200005d000000000000005dfeffdaa047040bd2ce8fbfcdf07722419deda7ea... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... max: [12] 0e0000000003000000000000 max: [45] 100000210001000000000021201123839cfee9a783da3bda5d6b74f880ce3cba... max: [1] 01 max: [64] faa20f368fbc2d89485d3d2be6ffb9773623894f539dd80d54ea77ff30c1dc53... max: [1] 01 max: [64] c14817419e3e0a826f684ff583bf960ad27d1f32a98fe64402b3efdd27cad113... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [16432] 418517dee79be1f78161b5e5a19e42ae201e5f671e5a2e15dc78f7c9d79cc7ec... max: [48] bd4488bd86e0139bc220d13048823af021db39bcbbc3b0b5dc1cb6adb68e49e6... max: [16432] 205ba732cbc3e9f0b30f5310b9a2750f6d1263becec8e807a7aa6597cb633d0e... max: [48] ed7fa59ec2114ec94faefbfe94ca17bc905bebe59934af2a259d435840c9d0be... client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [98] 020000560000000000000056fefd6bea5f30528d2e7f87b5b2f244a46f1ec32a... max: [65] c3b0fd340dccf40df12b653bfd116beab836576997f80423c5fb3e963f7e1ce2... max: [80] f7550c68237564af9da2af26b289d71da270ec351a7afd6bac6a7db5538d5ea9... max: [80] 5a9062bcde970f48482ed9ee24aaf03329cbb0122218ed7f4971510027625d0b... max: [80] 54cfaa0e6c28219ec327f3cf5162b222475155cccf11503b756029b938e0425c... max: [80] f216259101d338dc94eb62f30613f160326b426ab3415e221fbab70cf807ebf7... max: [80] 6ce6e8285af4645c0063aec2b70d81252a0f7865011f14b63508fdb1f1f1314d... max: [80] 787da56c661de38171f920e37253ee8b8b63752c57a7d9ba31fbb686ec48a0f9... max: [80] 920e27a41ccb413fd18df630ef6a00df300b395c7e019922e45ac0e451b31f5e... max: [80] 89a7cfcb829c2eae54047a76adbdd79ca1ef0b9210fc667d36b1428d47b0a8eb... max: [62] 3e2f11ac14c902d4ecb0fb951be4abce42f798fedecab2dfbc885a1ffd2325fb... max: [80] c62b61524428af947cf9bfb902beb972f5b0d303ab4950a68c2619bf1ce8296e... max: [80] a4c719f47d09b8aeda71e56434ae0d8a5ad6b8997b49417a4086f573636af1cf... max: [59] e391deff321d85259162fb3f65d1c1c9cb43ea599059af10fd1b65b0f519a54b... max: [61] f67aae21744836dd30427866b3a5c3a016ec17f02a018994115d335c61f21c17... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] 9bf7ff4ff97e5c3203045f72b782fb7850d3a7f6be8eb2d2cd4b66 Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] d2630c7b4da9db0edb5fcccdcaa091e5e450bc352f0285c11576364d681063f9... max: [80] 8f2ffb003f01cd99af2e64f9f47ecabe0be7d871e1d8a94cbf11050550912797... max: [18] 4316bad4b3b1423d9be4a93928e54fc8dbf7 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [105] 0200005d000000000000005dfefd494268b9d539cf8dd91f9e92713c2f3749f6... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... max: [12] 0e0000000003000000000000 max: [1] 01 max: [48] 000100000000000077f6001901d6403a7f0bea6a612198e01f6b8ee9883958b8... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 00010000000000012136fc715b05467f2bae8d106e5abdc5e1ab5eb8dc833211... max: [87] 000100000000000251ef9c931568c0dc82e2ec151bdc7be9e5672b397b90a194... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [105] 0200005d000000000000005dfeff16a924af7a4e8da0ac48b8f912c68ddf3c0c... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... max: [12] 0e0000000003000000000000 max: [1] 01 max: [64] f117313b1421e8d14498d3a9bd864fa1b62e70309d5664b25b0f3ae16eba5f0f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] b10594507ad162ff559c01d1dfb681d7093f2c94668e92ed7827349019b1bf08... max: [112] 47828ba9b91907d0c4c60852897b34e915452045aa8b9eab662cef123c9acfc7... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [193] 010000b500000000000000b5fefd3573c5bd569c1f22894eeb3d191186d7d857... max: [61] 44ae07eea955ef11e169da232e8b60551489d660fa2e54a4c39a9954c95ceca6... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 9bfdea16ccd824ddaa6f02b42138d3b695329beef9845b64cfd82a53ac089bcf... max: [80] 31707531b157e447e3411cf0f3ddab41d8171a5fe063f69e33a6e8ea3af5945f... max: [18] bac137dbb15fd45b1ed3e54c8a4ea739c108 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefdb1a5f0fbc34af57c16089fc585bb795f39fb... max: [45] 100000210001000000000021203bf79a2c5964c0d40074f220f59f9cf1db6452... max: [1] 01 max: [48] 0001000000000000df251f43778502527fccdf55da51a43ad6bc59ccee59e573... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 0001000000000001a394c7c82140e2186e848ff2d1e3d1fb68b9245543f17bd1... max: [87] 0001000000000002deb67a35cf648bfff2c9e0babc4d4e82f10ee7d77d85952b... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feff3a75583dd47484d66335d66259b991c861ec... max: [45] 10000021000100000000002120aa655a8cf83b8e5ab95d72b15c6ee7dfdbaf65... max: [1] 01 max: [64] e370cfab854e649abefc860fb30585da9a38525c055d8240b8d896b929721a90... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 62762b2f84f13ec38909f6fb49123c3e5f209287f3588c239ec8005ed8a12338... max: [112] bed3d2446a41063f7fe55efbfc90fd2bc6aa1f04148a071962a51db14b2c383f... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [193] 010000b500000000000000b5fefd8c8f9550124abb52b4e0b156c11a4314aa76... max: [98] 020000560000000000000056fefd7628d7ee9ee7aca646f8407a5aacf96556e2... max: [65] 9b6d4f8aefb43f0be2d0eb16fbb71f47cb323267f1e50d36aaff25bb3d7b4c05... max: [80] 97e188f5bbf865cbe3bfa6b5fb63807668385d10b33f8c874e02a7b35164e4ca... max: [80] ca1bedca8514d5fe01946d24e2246302951887b5b4784541a7b57299695fdb7e... max: [80] 22c1b1ac932fdcfb76f43d003aaa9c4f4501af22d1df766d596634e58a65c782... max: [80] bb44fbad031f8e1bed85160d63299abad3d7b3272961ef4db5c88db0e3d8b708... max: [80] 3e83ea7d7b400d1f71696182d55c0fcb6291d4b2ca4b5a7067f054bd0750504e... max: [80] c68d69edbc01d9491a01df53e0570a4c2b30f349d749971358c9ee045be6042d... max: [80] d5c9441209afe440a8daff2ddaba784c24f314d0ace1a787a2710e86bd133a5a... max: [80] fb521f1875ec77944c98adac551880c5118a8cae9f870c061b18638a7c7066cc... max: [62] 83596d28782ecbeddc584cf59a227e967278a35b02fb2e1307cb36f37b9ae34d... max: [80] 94b4966df32b20d88d21cbe141b788e02cd6cd619569df669d6ee1d6711e2869... max: [80] 2f65fafd329d24d434a7f638dc807d4e8c0296c9ca3cb1aefef1a7bb884db577... max: [59] 2a6c33e4c6bb8cb99a0a87ba0fba281d907dea845a5a4817abf70f60531db46b... max: [61] 3cd7489ce8b15b98c81ba5a4dc94292fea92f1c6013ca101741862fabd5027d1... max: [61] 42bd50a9827fe2053cbacdae589de1d56c1b1ab9dbe86580c1a7ef71f7f356da... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] 0a3863c456fc77786aa0b4381fdcf3d1ef63110919ff6cf0fb02e4 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [116] 319d317f467b9f2cc03ce0e45cd292db59773d14fe02f551d93a71ea514b4542... max: [45] 3355502f29c6e19663acc7957b336c4464ed61289ac1ff3273596d67cd015c9a... max: [80] e285a4f4b28c5659424b04dbfbad8687c7be9c7a3954c4b7b6224bcbd0403d1c... max: [80] 307ec7d12e6f4f91b2663c91e5d49341ffa751cac8285e85df61ba05f54f6a86... max: [18] ff0476f9fda1baad454c8c7ff4d701773e50 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefd4845c37b82e3b744565c8631c0a553cee6b6... max: [105] 0200005d000000000000005dfefdeed9fc63fc4a77788aef49b6e5ade5c0bba7... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... max: [12] 0e0000000003000000000000 max: [45] 1000002100010000000000212002cf9d2394661858d25a0b73527e2310a6fc63... max: [1] 01 max: [48] 00010000000000009f6ac3ded0598bcf0d97e7d26b6753ce85195e88717f8fc3... max: [1] 01 max: [48] 0001000000000000df477e3068bf85036b4f9cd8c2750fe88797b8ae80605d7e... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [124] 00010000000000010820ecbba47c7cc0b5a9145cb50ec0a250c6a291669f4e53... max: [51] 0001000000000002056bf1229cebd40dad358403f04d56ca4509e11b622cf622... max: [88] 0001000000000001530dee9e9c03c0a4509307dce0ce6bbf2e5c5158a34f5cf0... max: [87] 00010000000000024f98ff413be2a0e8c86cc69e64919c899cbe6f1446959040... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feffee5ec449d7df27448b5289b0598252823790... max: [105] 0200005d000000000000005dfeffb1327ab848c85e4f73f026dfa10164490a96... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... max: [12] 0e0000000003000000000000 max: [45] 100000210001000000000021200d5301e2fa7c4ae44c98001a778b805703cb8a... max: [1] 01 max: [64] 8e126245ecb8f9c6e846d054df295c6de06069b18f0e9fdcb678aeab764a6a54... max: [1] 01 max: [64] eae730f547d15de66c4752fa6b491b5107449a5b18fd528bbaced76242012e42... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [144] 7d04dab4cfee17e37282859817396aef73947ed2bcc629c579ec8b5ced7fadf4... max: [64] d1d5d332fe9599a65cf7944ff407655fabedc61b8c57c2e79764bad1ca14df65... max: [112] 83d58b59b5b71875f365e90308fd4ae840d81edad4c32f623f08876c9084a1d7... max: [112] 355cd98f0129d54056fa3addc97472e9beb6b4ed0ad810bad76aa58bcdaf53e5... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [36] 0022000a00140012001d00170018001901000101010201030104001c0002f41f... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefd02db182315... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] fefdb11a747a1dabb37f78bad9b93aa2f69bbbfb3427b0df345d65e80ee4e0c1... handshake new: [93] fefdb11a747a1dabb37f78bad9b93aa2f69bbbfb3427b0df345d65e80ee4e0c1... record old: [105] 0200005d000000000000005dfefdb11a747a1dabb37f78bad9b93aa2f69bbbfb... record new: [105] 0200005d000000000000005dfefdb11a747a1dabb37f78bad9b93aa2f69bbbfb... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefdb11a747a1d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] feff513551ce0736d0257cc9daec7e81edfe91a5e4e0b0c4686a79a426d4ef47... handshake new: [93] feff513551ce0736d0257cc9daec7e81edfe91a5e4e0b0c4686a79a426d4ef47... record old: [105] 0200005d000000000000005dfeff513551ce0736d0257cc9daec7e81edfe91a5... record new: [105] 0200005d000000000000005dfeff513551ce0736d0257cc9daec7e81edfe91a5... server: Filtered packet: [797] 16feff000000000000000000690200005d000000000000005dfeff513551ce07... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [37] 0023000a00140012001d00170018001901000101010201030104001c00030100... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [49] 0800002500010000000000250023000a00140012001d00170018001901000101... server: Filtered packet: [889] 16fefd00000000000000000062020000560000000000000056fefdfe62f777eb... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] fefde21ec1b8bd73e606847c98231a68b415340b658a0a61ce467b91bf7daca7... handshake new: [94] fefde21ec1b8bd73e606847c98231a68b415340b658a0a61ce467b91bf7daca7... record old: [105] 0200005d000000000000005dfefde21ec1b8bd73e606847c98231a68b415340b... record new: [106] 0200005e000000000000005efefde21ec1b8bd73e606847c98231a68b415340b... server: Filtered packet: [800] 16fefd0000000000000000006a0200005e000000000000005efefde21ec1b8bd... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] feff9dc5b48a314bd99890377f3938c2bdb0091ac1a0b37e887bf634073b6411... handshake new: [94] feff9dc5b48a314bd99890377f3938c2bdb0091ac1a0b37e887bf634073b6411... record old: [105] 0200005d000000000000005dfeff9dc5b48a314bd99890377f3938c2bdb0091a... record new: [106] 0200005e000000000000005efeff9dc5b48a314bd99890377f3938c2bdb0091a... server: Filtered packet: [798] 16feff0000000000000000006a0200005e000000000000005efeff9dc5b48a31... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (11 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/0 Version: DTLS 1.3 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/0 (103 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/1 Version: DTLS 1.2 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/1 (103 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/2 Version: DTLS 1.0 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/2 (103 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 Version: DTLS 1.0 [ SKIPPED ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/0 (54 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/1 (53 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/2 (55 ms) [----------] 219 tests from GenericDatagram/TlsConnectGeneric (1637 ms total) [----------] 16 tests from AgentTests/TlsAgentTest [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/0 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/0 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/1 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/1 (1 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/2 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/2 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/3 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/3 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/4 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/4 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/5 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/5 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/6 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/6 (3 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/7 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/7 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/2 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/2 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/3 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/3 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/4 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/4 (3 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/5 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/5 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/6 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/6 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/7 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/7 (2 ms) [----------] 16 tests from AgentTests/TlsAgentTest (19 ms total) [----------] 4 tests from ClientTests13/TlsAgentTestClient13 [ RUN ] ClientTests13/TlsAgentTestClient13.CannedHello/0 client: Changing state from INIT to CONNECTING Process message: [95] 160304005a0200005603039cbc149b0e2efa0df3f05c707ae0d19b3e5a446bdf... [ OK ] ClientTests13/TlsAgentTestClient13.CannedHello/0 (1 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.CannedHello/1 client: Changing state from INIT to CONNECTING Process message: [111] 16030400000000000000000062020000560000000000000056fefd9cbc149b0e... [ OK ] ClientTests13/TlsAgentTestClient13.CannedHello/1 (0 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/0 client: Changing state from INIT to CONNECTING Process message: [99] 160304005e0200005603039cbc149b0e2efa0df3f05c707ae0d19b3e5a446bdf... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/0 (1 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/1 client: Changing state from INIT to CONNECTING Process message: [123] 1603040000000000000000006e020000560000000000000056fefd9cbc149b0e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/1 (0 ms) [----------] 4 tests from ClientTests13/TlsAgentTestClient13 (2 ms total) [----------] 20 tests from Version12Plus/TlsConnectTls12Plus [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/0 Version: TLS 1.3 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/0 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/1 Version: TLS 1.2 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/1 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/2 Version: DTLS 1.3 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/2 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/3 Version: DTLS 1.2 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/3 (3 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/0 Version: TLS 1.3 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/0 (9 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/1 Version: TLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/1 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/2 Version: DTLS 1.3 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/2 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/3 Version: DTLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/3 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/0 (5 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/1 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/2 (5 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/3 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/0 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/1 (1 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/2 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/3 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/0 Version: TLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/0 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/1 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/1 (1 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/2 Version: DTLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/2 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/3 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/3 (2 ms) [----------] 20 tests from Version12Plus/TlsConnectTls12Plus (74 ms total) [----------] 10 tests from Pre12Stream/TlsConnectPre12 [ RUN ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/0 Version: TLS 1.0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/0 (2 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/1 Version: TLS 1.1 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/1 (3 ms) [ RUN ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (6 ms) [ RUN ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 (6 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 (4 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/1 (4 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/0 (9 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/1 (9 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 (8 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/1 (8 ms) [----------] 10 tests from Pre12Stream/TlsConnectPre12 (59 ms total) [----------] 5 tests from Pre12Datagram/TlsConnectPre12 [ RUN ] Pre12Datagram/TlsConnectPre12.ServerAuthRsaPssFails/0 Version: DTLS 1.0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Datagram/TlsConnectPre12.ServerAuthRsaPssFails/0 (3 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (6 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 (4 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ResumeWithHigherVersionTls12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ResumeWithHigherVersionTls12/0 (9 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 (8 ms) [----------] 5 tests from Pre12Datagram/TlsConnectPre12 (30 ms total) [----------] 171 tests from Pre13Stream/TlsConnectGenericPre13 [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140301000101 record drop: TLS 1.0 CCS 1000000000000:[1] 01 server: Filtered packet: [53] 1603010030aaa43845d50567afed1ef5dd061471c3f8ba591542427b5e5df945... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [37] 1703010020be56ca96241701b8d02ed452fa03ee9dbc98a41d0153acbdebe0c3... server: Filtered packet: [37] 170301002081096ebe043090f441dbb3e788a6effbc608cd24ec617dab4ffd10... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140302000101 record drop: TLS 1.1 CCS 1000000000000:[1] 01 server: Filtered packet: [69] 16030200405efa29c62c95ae531d23b9f13ee4be815b804c5edaf14a72bf6af0... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [53] 17030200301e21ce9ef1242894c2b214688226ae397fb4b3c2ecb670c00eb3c8... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140303000101 record drop: TLS 1.2 CCS 1000000000000:[1] 01 server: Filtered packet: [45] 160303002800000000000000005ead85017e81d5aa95a539e3399fb898ca778a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [39] 170303002200000000000000013510f786d614cce82f4b15934414ed9e58c4de... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140301000101 record drop: TLS 1.0 CCS 1000000000000:[1] 01 server: Filtered packet: [53] 1603010030afd14727b868d18fe04d7eae49b90580f5bd2f6218c86e8a548eec... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [37] 1703010020f0a50a940fb8d719c47f35c62136edb2883526bb22061c31f117a9... server: Filtered packet: [37] 17030100200bc3bb05bae31a73d8ec9d97980ae8bd1a4da05466b8f341f72d2a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140302000101 record drop: TLS 1.1 CCS 1000000000000:[1] 01 server: Filtered packet: [69] 1603020040ea853c53000bc109a1d6f3402fc2a3c582458559175adb36bce314... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [53] 1703020030c472c38650e58cc04a9d7902e2888fb2f04e5c8c007246a6fce5d2... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140303000101 record drop: TLS 1.2 CCS 1000000000000:[1] 01 server: Filtered packet: [45] 1603030028000000000000000051e64b9bf72b747cab12029d5005edf7455ccf... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [39] 17030300220000000000000001cbd5833d91a6c0c59fa4ef7421f083c02d7d10... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 03017a0c7e9a3e8ac26376fcd1f6ca4e042dddfea91b393b72570d7c4760a488... handshake new: [98] 03017a0c7e9a3e8ac26376fcd1f6ca4e042dddfea91b393b72570d7c4760a488... record old: [731] 0200006103017a0c7e9a3e8ac26376fcd1f6ca4e042dddfea91b393b72570d7c... record new: [732] 0200006203017a0c7e9a3e8ac26376fcd1f6ca4e042dddfea91b393b72570d7c... server: Filtered packet: [737] 16030102dc0200006203017a0c7e9a3e8ac26376fcd1f6ca4e042dddfea91b39... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 03027bce90e07f1f3de930d878b07b394c6c3ffaa94e90415ce85acd80dc1baa... handshake new: [98] 03027bce90e07f1f3de930d878b07b394c6c3ffaa94e90415ce85acd80dc1baa... record old: [731] 0200006103027bce90e07f1f3de930d878b07b394c6c3ffaa94e90415ce85acd... record new: [732] 0200006203027bce90e07f1f3de930d878b07b394c6c3ffaa94e90415ce85acd... server: Filtered packet: [737] 16030202dc0200006203027bce90e07f1f3de930d878b07b394c6c3ffaa94e90... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 0303ec1d026213fc1eb99c1bf1f2abecf772edfb40f4501ecd35a1a97b97ff52... handshake new: [98] 0303ec1d026213fc1eb99c1bf1f2abecf772edfb40f4501ecd35a1a97b97ff52... record old: [733] 020000610303ec1d026213fc1eb99c1bf1f2abecf772edfb40f4501ecd35a1a9... record new: [734] 020000620303ec1d026213fc1eb99c1bf1f2abecf772edfb40f4501ecd35a1a9... server: Filtered packet: [739] 16030302de020000620303ec1d026213fc1eb99c1bf1f2abecf772edfb40f450... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... record old: [713] 0200005d030177c724994f281218ab393eeaf454f71f4dc7a5f950bc28b4df97... record new: [713] 0200005d030177c724994f281218ab393eeaf454f71f4dc7a5f950bc28b4df97... server: Filtered packet: [718] 16030102c90200005d030177c724994f281218ab393eeaf454f71f4dc7a5f950... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... record old: [713] 0200005d03027343f8d44cad78ea310f2c7fe6d293fbf763e6ed4b8c641da3aa... record new: [713] 0200005d03027343f8d44cad78ea310f2c7fe6d293fbf763e6ed4b8c641da3aa... server: Filtered packet: [718] 16030202c90200005d03027343f8d44cad78ea310f2c7fe6d293fbf763e6ed4b... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... record old: [715] 0200005d03031141d8a3ac15d835639f480c02020d6a58e193dd9a2dfd0d752e... record new: [715] 0200005d03031141d8a3ac15d835639f480c02020d6a58e193dd9a2dfd0d752e... server: Filtered packet: [720] 16030302cb0200005d03031141d8a3ac15d835639f480c02020d6a58e193dd9a... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301cea36ae2d2081e3032636904291f0425c2f03df7005a3afa47b8... record new: [1190] 020000570301cea36ae2d2081e3032636904291f0425c2f03df7005a3afa47b8... server: Filtered packet: [1195] 16030104a6020000570301cea36ae2d2081e3032636904291f0425c2f03df700... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703028db925067b94ac1739f0672e695adca06db5551249961fa112b6... record new: [1190] 0200005703028db925067b94ac1739f0672e695adca06db5551249961fa112b6... server: Filtered packet: [1195] 16030204a60200005703028db925067b94ac1739f0672e695adca06db5551249... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703030e896d0b7438cd9554e4c03c038798ecceef7f51a423805dad2e... record new: [1192] 0200005703030e896d0b7438cd9554e4c03c038798ecceef7f51a423805dad2e... server: Filtered packet: [1197] 16030304a80200005703030e896d0b7438cd9554e4c03c038798ecceef7f51a4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030149b8b4e12b26fcf87c65dd890d04dfa93dfa00d1f33205805c40... record new: [1190] 02000057030149b8b4e12b26fcf87c65dd890d04dfa93dfa00d1f33205805c40... server: Filtered packet: [1195] 16030104a602000057030149b8b4e12b26fcf87c65dd890d04dfa93dfa00d1f3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302e30318c93d0a293bf0ae908032e08f4822fb00488fcb8d820008... record new: [1190] 020000570302e30318c93d0a293bf0ae908032e08f4822fb00488fcb8d820008... server: Filtered packet: [1195] 16030204a6020000570302e30318c93d0a293bf0ae908032e08f4822fb00488f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303ab60d4fcc69be4e35f6fc539916ce8a16e9c5c59ee467d31de9f... record new: [1192] 020000570303ab60d4fcc69be4e35f6fc539916ce8a16e9c5c59ee467d31de9f... server: Filtered packet: [1197] 16030304a8020000570303ab60d4fcc69be4e35f6fc539916ce8a16e9c5c59ee... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1190] 020000570301dd76e4c9803bad2a2a4bc17c488c59fd33d4b91c1701f8e58da9... record new: [1191] 020000570301dd76e4c9803bad2a2a4bc17c488c59fd33d4b91c1701f8e58da9... server: Filtered packet: [1196] 16030104a7020000570301dd76e4c9803bad2a2a4bc17c488c59fd33d4b91c17... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1190] 020000570302523232e825a753edefb9cc7fdde4368cba7e4ffe515a1fa06303... record new: [1191] 020000570302523232e825a753edefb9cc7fdde4368cba7e4ffe515a1fa06303... server: Filtered packet: [1196] 16030204a7020000570302523232e825a753edefb9cc7fdde4368cba7e4ffe51... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1192] 02000057030394b8e28f7d70a5b8c88d90e217377eb1336fbd47b6dbe2380840... record new: [1193] 02000057030394b8e28f7d70a5b8c88d90e217377eb1336fbd47b6dbe2380840... server: Filtered packet: [1198] 16030304a902000057030394b8e28f7d70a5b8c88d90e217377eb1336fbd47b6... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 (3325 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/2 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1190] 020000570301512d40cfe1b1ef5ff464a0198b19a300a299b8b9f87c5dc3c773... record new: [3622] 020000570301512d40cfe1b1ef5ff464a0198b19a300a299b8b9f87c5dc3c773... server: Filtered packet: [3627] 1603010e26020000570301512d40cfe1b1ef5ff464a0198b19a300a299b8b9f8... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1190] 0200005703028bdd6121cd156a1dd41d6ddee5d57609f76241b2584ade4190b5... record new: [3622] 0200005703028bdd6121cd156a1dd41d6ddee5d57609f76241b2584ade4190b5... server: Filtered packet: [3627] 1603020e260200005703028bdd6121cd156a1dd41d6ddee5d57609f76241b258... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1192] 0200005703039b9154d3faaf52abc6bbca3d7a8b0b8348989b64d587a4a0387e... record new: [3622] 0200005703039b9154d3faaf52abc6bbca3d7a8b0b8348989b64d587a4a0387e... server: Filtered packet: [3627] 1603030e260200005703039b9154d3faaf52abc6bbca3d7a8b0b8348989b64d5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 (15 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 Version: TLS 1.0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1738] 0200005d0301004d35c694ab45017f2822924eebf9e5011ae38fe7398f195a84... record new: [1736] 0200005d0301004d35c694ab45017f2822924eebf9e5011ae38fe7398f195a84... server: Filtered packet: [1741] 16030106c80200005d0301004d35c694ab45017f2822924eebf9e5011ae38fe7... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 Version: TLS 1.1 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1736] 0200005d0302761cdb7e645c4e041fbc9e3b19819fcaa8b0ed6914ba16189e38... record new: [1736] 0200005d0302761cdb7e645c4e041fbc9e3b19819fcaa8b0ed6914ba16189e38... server: Filtered packet: [1741] 16030206c80200005d0302761cdb7e645c4e041fbc9e3b19819fcaa8b0ed6914... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/2 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1738] 0200005d03031d0fbf9f024beee9bb6ff36120c0c608b5af390388382cbcdb32... record new: [1738] 0200005d03031d0fbf9f024beee9bb6ff36120c0c608b5af390388382cbcdb32... server: Filtered packet: [1743] 16030306ca0200005d03031d0fbf9f024beee9bb6ff36120c0c608b5af390388... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 Version: TLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 Version: TLS 1.1 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 Version: TLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 Version: TLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 Version: TLS 1.1 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 Version: TLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/0 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/1 (13 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/2 (13 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/2 (15 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 0301b0cb1789550ffbe961135af588cd24c5180dccc8491d20ceded49013e111... handshake new: [103] 0301b0cb1789550ffbe961135af588cd24c5180dccc8491d20ceded49013e111... record old: [121] 010000750301b0cb1789550ffbe961135af588cd24c5180dccc8491d20ceded4... record new: [107] 010000670301b0cb1789550ffbe961135af588cd24c5180dccc8491d20ceded4... client: Filtered packet: [112] 160301006b010000670301b0cb1789550ffbe961135af588cd24c5180dccc849... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 0302ad2bf2e36ec5f2ac8408c6649c2ffc64be8cde632c619bf3ed0834e7ebdb... handshake new: [103] 0302ad2bf2e36ec5f2ac8408c6649c2ffc64be8cde632c619bf3ed0834e7ebdb... record old: [121] 010000750302ad2bf2e36ec5f2ac8408c6649c2ffc64be8cde632c619bf3ed08... record new: [107] 010000670302ad2bf2e36ec5f2ac8408c6649c2ffc64be8cde632c619bf3ed08... client: Filtered packet: [112] 160301006b010000670302ad2bf2e36ec5f2ac8408c6649c2ffc64be8cde632c... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [187] 030330a6ac3f8524401016a93c65fe70d83dad35b599b2217e98188639dbb256... handshake new: [173] 030330a6ac3f8524401016a93c65fe70d83dad35b599b2217e98188639dbb256... record old: [191] 010000bb030330a6ac3f8524401016a93c65fe70d83dad35b599b2217e981886... record new: [177] 010000ad030330a6ac3f8524401016a93c65fe70d83dad35b599b2217e981886... client: Filtered packet: [182] 16030100b1010000ad030330a6ac3f8524401016a93c65fe70d83dad35b599b2... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [4] 03001d00 record old: [713] 0200005d03016a1244fa374df7d710191468c75bf647af5cf96e512944007182... record new: [551] 0200005d03016a1244fa374df7d710191468c75bf647af5cf96e512944007182... server: Filtered packet: [556] 16030102270200005d03016a1244fa374df7d710191468c75bf647af5cf96e51... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [4] 03001d00 record old: [713] 0200005d030214b71a0c85321be1e3af1277bcc34b30f730118f746df21bb3b0... record new: [551] 0200005d030214b71a0c85321be1e3af1277bcc34b30f730118f746df21bb3b0... server: Filtered packet: [556] 16030202270200005d030214b71a0c85321be1e3af1277bcc34b30f730118f74... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [4] 03001d00 record old: [715] 0200005d0303eb9e8306d62b60007ae3254d4f1f32768d5c8f2970f498673002... record new: [551] 0200005d0303eb9e8306d62b60007ae3254d4f1f32768d5c8f2970f498673002... server: Filtered packet: [556] 16030302270200005d0303eb9e8306d62b60007ae3254d4f1f32768d5c8f2970... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 20fa5968a2878d4dcc8123bd210fb96086dbcabf073bf1f84cae9401c5f0247d... handshake new: [1] 00 record old: [37] 1000002120fa5968a2878d4dcc8123bd210fb96086dbcabf073bf1f84cae9401... record new: [5] 1000000100 client: Filtered packet: [69] 1603010005100000010014030100010116030100304be7462911c3a0bf5d936c... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 2036ea8327bcf442bbcb21463df1f6c6fad41fd2cfe3489d3a14116b80a6dc19... handshake new: [1] 00 record old: [37] 100000212036ea8327bcf442bbcb21463df1f6c6fad41fd2cfe3489d3a14116b... record new: [5] 1000000100 client: Filtered packet: [85] 1603020005100000010014030200010116030200409e973104075fbbe53edef8... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 20acb9551239e34ccb176d99e5c1e87280698793871f3b35c356207a9680bb59... handshake new: [1] 00 record old: [37] 1000002120acb9551239e34ccb176d99e5c1e87280698793871f3b35c356207a... record new: [5] 1000000100 client: Filtered packet: [61] 1603030005100000010014030300010116030300280000000000000000d5dd8a... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0100010102 record old: [713] 0200005d03019999e4d74cc21db455a4c8bd616a2d7e366851dcbe2c49af2dcf... record new: [552] 0200005d03019999e4d74cc21db455a4c8bd616a2d7e366851dcbe2c49af2dcf... server: Filtered packet: [557] 16030102280200005d03019999e4d74cc21db455a4c8bd616a2d7e366851dcbe... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0100010102 record old: [713] 0200005d0302ac85d6917e69697a85decfc45dc52d4ae1c0c919bcab161be4e8... record new: [552] 0200005d0302ac85d6917e69697a85decfc45dc52d4ae1c0c919bcab161be4e8... server: Filtered packet: [557] 16030202280200005d0302ac85d6917e69697a85decfc45dc52d4ae1c0c919bc... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0100010102 record old: [715] 0200005d030342c2078d754270f3adefb0f071a94bb6e0fc220b0b25beefe094... record new: [552] 0200005d030342c2078d754270f3adefb0f071a94bb6e0fc220b0b25beefe094... server: Filtered packet: [557] 16030302280200005d030342c2078d754270f3adefb0f071a94bb6e0fc220b0b... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0301000102 record old: [713] 0200005d0301d4b99be482539e676bf179bbcf88a3e7daf986b928413c301671... record new: [552] 0200005d0301d4b99be482539e676bf179bbcf88a3e7daf986b928413c301671... server: Filtered packet: [557] 16030102280200005d0301d4b99be482539e676bf179bbcf88a3e7daf986b928... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0301000102 record old: [713] 0200005d03028411580ffeefdc24190e573d718644c34c964853747bc9c45339... record new: [552] 0200005d03028411580ffeefdc24190e573d718644c34c964853747bc9c45339... server: Filtered packet: [557] 16030202280200005d03028411580ffeefdc24190e573d718644c34c96485374... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0301000102 record old: [715] 0200005d0303e7cd9b640a24bdef6cfad665884ab98f7dfd2abe10b1fe38954a... record new: [552] 0200005d0303e7cd9b640a24bdef6cfad665884ab98f7dfd2abe10b1fe38954a... server: Filtered packet: [557] 16030302280200005d0303e7cd9b640a24bdef6cfad665884ab98f7dfd2abe10... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0300170102 record old: [713] 0200005d0301fde13297e8776351ffd3c366526f11e42c3b3308d493e0c94f57... record new: [552] 0200005d0301fde13297e8776351ffd3c366526f11e42c3b3308d493e0c94f57... server: Filtered packet: [557] 16030102280200005d0301fde13297e8776351ffd3c366526f11e42c3b3308d4... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0300170102 record old: [713] 0200005d0302ffed3ae475b519b06dce19639376c4839659ae95497416f036e9... record new: [552] 0200005d0302ffed3ae475b519b06dce19639376c4839659ae95497416f036e9... server: Filtered packet: [557] 16030202280200005d0302ffed3ae475b519b06dce19639376c4839659ae9549... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0300170102 record old: [715] 0200005d0303f8c018800d077124613a69332884843f6657b9f17d704616dd72... record new: [552] 0200005d0303f8c018800d077124613a69332884843f6657b9f17d704616dd72... server: Filtered packet: [557] 16030302280200005d0303f8c018800d077124613a69332884843f6657b9f17d... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0301ba950850d4f923382100876db49d15110eab862199e86aa762f6eb723064... handshake new: [92] 0301ba950850d4f923382100876db49d15110eab862199e86aa762f6eb723064... record old: [713] 0200005d0301ba950850d4f923382100876db49d15110eab862199e86aa762f6... record new: [712] 0200005c0301ba950850d4f923382100876db49d15110eab862199e86aa762f6... server: Filtered packet: [717] 16030102c80200005c0301ba950850d4f923382100876db49d15110eab862199... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03024db690e4dee453fd2d4f48bd2102049d07a826f0ffc18d4a193311a08242... handshake new: [92] 03024db690e4dee453fd2d4f48bd2102049d07a826f0ffc18d4a193311a08242... record old: [713] 0200005d03024db690e4dee453fd2d4f48bd2102049d07a826f0ffc18d4a1933... record new: [712] 0200005c03024db690e4dee453fd2d4f48bd2102049d07a826f0ffc18d4a1933... server: Filtered packet: [717] 16030202c80200005c03024db690e4dee453fd2d4f48bd2102049d07a826f0ff... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03030109ffd0780c754841a450039dd3fcda4a2701d33a0ee481e0f118da97eb... handshake new: [92] 03030109ffd0780c754841a450039dd3fcda4a2701d33a0ee481e0f118da97eb... record old: [715] 0200005d03030109ffd0780c754841a450039dd3fcda4a2701d33a0ee481e0f1... record new: [714] 0200005c03030109ffd0780c754841a450039dd3fcda4a2701d33a0ee481e0f1... server: Filtered packet: [719] 16030302ca0200005c03030109ffd0780c754841a450039dd3fcda4a2701d33a... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [117] 0301eeff736838e7a78cb6f0a32ec291213b88fb1ea1fb365fa3d6dbcca3e49d... handshake new: [117] 0301eeff736838e7a78cb6f0a32ec291213b88fb1ea1fb365fa3d6dbcca3e49d... record old: [121] 010000750301eeff736838e7a78cb6f0a32ec291213b88fb1ea1fb365fa3d6db... record new: [121] 010000750301eeff736838e7a78cb6f0a32ec291213b88fb1ea1fb365fa3d6db... client: Filtered packet: [126] 1603010079010000750301eeff736838e7a78cb6f0a32ec291213b88fb1ea1fb... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [117] 03027a68b6767a52892fb1d08f4a7db52078597fd3c8f3b7f7e5fe0828cdc789... handshake new: [117] 03027a68b6767a52892fb1d08f4a7db52078597fd3c8f3b7f7e5fe0828cdc789... record old: [121] 0100007503027a68b6767a52892fb1d08f4a7db52078597fd3c8f3b7f7e5fe08... record new: [121] 0100007503027a68b6767a52892fb1d08f4a7db52078597fd3c8f3b7f7e5fe08... client: Filtered packet: [126] 16030100790100007503027a68b6767a52892fb1d08f4a7db52078597fd3c8f3... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [187] 0303bfb330631cdb007a6326115b08d54d3868b817e8f50dd01d3d09f3be467e... handshake new: [187] 0303bfb330631cdb007a6326115b08d54d3868b817e8f50dd01d3d09f3be467e... record old: [191] 010000bb0303bfb330631cdb007a6326115b08d54d3868b817e8f50dd01d3d09... record new: [191] 010000bb0303bfb330631cdb007a6326115b08d54d3868b817e8f50dd01d3d09... client: Filtered packet: [196] 16030100bf010000bb0303bfb330631cdb007a6326115b08d54d3868b817e8f5... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/2 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/2 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 Version: TLS 1.0 [ SKIPPED ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 (0 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 030283ffc0f3ff7bc86d60c609c1124c3e2f5666b7c4a51c53653991eb6c2469... handshake new: [89] 030183ffc0f3ff7bc86d60c609c1124c3e2f5666b7c4a51c53653991eb6c2469... record old: [93] 02000059030283ffc0f3ff7bc86d60c609c1124c3e2f5666b7c4a51c53653991... record new: [93] 02000059030183ffc0f3ff7bc86d60c609c1124c3e2f5666b7c4a51c53653991... server: Filtered packet: [173] 160302005d02000059030183ffc0f3ff7bc86d60c609c1124c3e2f5666b7c4a5... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03039bb230b2ccd1c7908790aab7937cac4ce260f8d284e1853e4e7b9b7a28c3... handshake new: [89] 03029bb230b2ccd1c7908790aab7937cac4ce260f8d284e1853e4e7b9b7a28c3... record old: [93] 0200005903039bb230b2ccd1c7908790aab7937cac4ce260f8d284e1853e4e7b... record new: [93] 0200005903029bb230b2ccd1c7908790aab7937cac4ce260f8d284e1853e4e7b... server: Filtered packet: [173] 160303005d0200005903029bb230b2ccd1c7908790aab7937cac4ce260f8d284... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 020000570301dd6f9a3fdbe4023ed582f7fa47b213e4d606dcf3b2413c9434d7... record new: [2510] 020000570301dd6f9a3fdbe4023ed582f7fa47b213e4d606dcf3b2413c9434d7... server: Filtered packet: [2515] 16030109ce020000570301dd6f9a3fdbe4023ed582f7fa47b213e4d606dcf3b2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 020000570302a0fadeac258afd5f2192844bf9a08c704c5487d778d311f19f37... record new: [2510] 020000570302a0fadeac258afd5f2192844bf9a08c704c5487d778d311f19f37... server: Filtered packet: [2515] 16030209ce020000570302a0fadeac258afd5f2192844bf9a08c704c5487d778... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 020000570303898b651aefad6bcd68167ba2ec23dbe27d5d8a8d2f2f9a3eb32a... record new: [2510] 020000570303898b651aefad6bcd68167ba2ec23dbe27d5d8a8d2f2f9a3eb32a... server: Filtered packet: [2515] 16030309ce020000570303898b651aefad6bcd68167ba2ec23dbe27d5d8a8d2f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/2 (2 ms) [----------] 171 tests from Pre13Stream/TlsConnectGenericPre13 (4193 ms total) [----------] 114 tests from Pre13Datagram/TlsConnectGenericPre13 [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [14] 14feff0000000000000004000101 record drop: DTLS 1.0 CCS 4:[1] 01 server: Filtered packet: [77] 16feff00010000000000000040a2a9a8a89eacdf6be5461d37c822607c989c39... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [14] 14fefd0000000000000004000101 record drop: DTLS 1.2 CCS 4:[1] 01 server: Filtered packet: [61] 16fefd0001000000000000003000010000000000003ce8656017277d6d5a20c3... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [14] 14feff0000000000000004000101 record drop: DTLS 1.0 CCS 4:[1] 01 server: Filtered packet: [77] 16feff00010000000000000040b169726fffc12d2ceafbc843816c4f74ec5989... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [14] 14fefd0000000000000004000101 record drop: DTLS 1.2 CCS 4:[1] 01 server: Filtered packet: [61] 16fefd00010000000000000030000100000000000057e9ce054266add1b78616... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] fefffd7c635b499567d6bdce41f0b9e4a85b3be3d6ceaabab856cd31c4bf5574... handshake new: [98] fefffd7c635b499567d6bdce41f0b9e4a85b3be3d6ceaabab856cd31c4bf5574... record old: [109] 020000610000000000000061fefffd7c635b499567d6bdce41f0b9e4a85b3be3... record new: [110] 020000620000000000000062fefffd7c635b499567d6bdce41f0b9e4a85b3be3... server: Filtered packet: [837] 16feff0000000000000000006e020000620000000000000062fefffd7c635b49... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] fefd856e08d3f2b7028246bdb3da885714c72867e67861ffd80009daa8b9e283... handshake new: [98] fefd856e08d3f2b7028246bdb3da885714c72867e67861ffd80009daa8b9e283... record old: [109] 020000610000000000000061fefd856e08d3f2b7028246bdb3da885714c72867... record new: [110] 020000620000000000000062fefd856e08d3f2b7028246bdb3da885714c72867... server: Filtered packet: [839] 16fefd0000000000000000006e020000620000000000000062fefd856e08d3f2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... record old: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... server: Filtered packet: [797] 16feff000000000000000000690200005d000000000000005dfeffed70e1e1c6... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefd2968fe1712... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffb6ffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff469ab20606... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffb6ffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd3f4425005a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff28a4531618... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdfd028f621a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a010100ffffffffffffffffadf85458a2bb4a9aaf... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff44cca68353... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c010100ffffffffffffffffadf85458a2bb4a9aaf... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd5270392230... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 (15 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [3093] 0c000c090002000000000c090401800000000000000000000000000000000000... server: Filtered packet: [3706] 16feff00000000000000000063020000570000000000000057feffaa9b13173f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [3093] 0c000c090002000000000c090401800000000000000000000000000000000000... server: Filtered packet: [3706] 16fefd00000000000000000063020000570000000000000057fefd02d23b2fc9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 Version: DTLS 1.0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 2:[208] 0c00024900020000000000c40100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1187] 16feff000000000000000000690200005d000000000000005dfeffb3fd973b89... handshake old: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [401] 0c00024900020000c4000185fe9ce98583ff8e4f1232eef28183c3fe3b1b4c6f... record new: [595] 0c00024700020000000002470100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [633] 16feff000000000000000202530c00024700020000000002470100ffffffffff... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 2:[208] 0c00024900020000000000c40100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1187] 16fefd000000000000000000690200005d000000000000005dfefd8d478d8468... handshake old: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [401] 0c00024900020000c4000185fe9ce98583ff8e4f1232eef28183c3fe3b1b4c6f... record new: [597] 0c00024900020000000002490100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [635] 16fefd000000000000000202550c00024900020000000002490100ffffffffff... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 Version: DTLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 Version: DTLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 Version: DTLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 Version: DTLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/0 (13 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/1 (13 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [114] feffe50ce23370230db6a7951ca0b1a49d78c5159f08b154d7c219709d003fc6... handshake new: [100] feffe50ce23370230db6a7951ca0b1a49d78c5159f08b154d7c219709d003fc6... record old: [126] 010000720000000000000072feffe50ce23370230db6a7951ca0b1a49d78c515... record new: [112] 010000640000000000000064feffe50ce23370230db6a7951ca0b1a49d78c515... client: Filtered packet: [125] 16feff00000000000000000070010000640000000000000064feffe50ce23370... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [184] fefd67e67e08e37b653ec8cc1fd095293862ff3cbfc7c2efbef20e3f0b96003f... handshake new: [170] fefd67e67e08e37b653ec8cc1fd095293862ff3cbfc7c2efbef20e3f0b96003f... record old: [196] 010000b800000000000000b8fefd67e67e08e37b653ec8cc1fd095293862ff3c... record new: [182] 010000aa00000000000000aafefd67e67e08e37b653ec8cc1fd095293862ff3c... client: Filtered packet: [195] 16feff000000000000000000b6010000aa00000000000000aafefd67e67e08e3... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [4] 03001d00 record old: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [16] 0c000004000200000000000403001d00 server: Filtered packet: [635] 16feff000000000000000000690200005d000000000000005dfeffb2ab100ec0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [4] 03001d00 record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [16] 0c000004000200000000000403001d00 server: Filtered packet: [635] 16fefd000000000000000000690200005d000000000000005dfefd3f645e8fe8... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 207cbdd2a5690dcc24ba9ea65ca2213ba5d2cce03375f03dd3bfeeb88c0824ac... handshake new: [1] 00 record old: [45] 100000210001000000000021207cbdd2a5690dcc24ba9ea65ca2213ba5d2cce0... record new: [13] 10000001000100000000000100 client: Filtered packet: [117] 16feff0000000000000001000d1000000100010000000000010014feff000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 20754fdea2cb5c6026114cc06bfeb3ed277cb46e4e56bd9a3511bb480e6b1328... handshake new: [1] 00 record old: [45] 10000021000100000000002120754fdea2cb5c6026114cc06bfeb3ed277cb46e... record new: [13] 10000001000100000000000100 client: Filtered packet: [101] 16fefd0000000000000001000d1000000100010000000000010014fefd000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0100010102 record old: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [17] 0c00000500020000000000050100010102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeffb678656008... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0100010102 record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [17] 0c00000500020000000000050100010102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefd616f99e972... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0301000102 record old: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [17] 0c00000500020000000000050301000102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff88f5342543... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0301000102 record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [17] 0c00000500020000000000050301000102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefd2fb441543f... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0300170102 record old: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [17] 0c00000500020000000000050300170102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff12d25b5526... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [5] 0300170102 record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [17] 0c00000500020000000000050300170102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefde2fb689776... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] feff85a7fcbaa16d6f564b4810cb443ddd6d723ccd3000d4422c68182e3e81bb... handshake new: [92] feff85a7fcbaa16d6f564b4810cb443ddd6d723ccd3000d4422c68182e3e81bb... record old: [105] 0200005d000000000000005dfeff85a7fcbaa16d6f564b4810cb443ddd6d723c... record new: [104] 0200005c000000000000005cfeff85a7fcbaa16d6f564b4810cb443ddd6d723c... server: Filtered packet: [796] 16feff000000000000000000680200005c000000000000005cfeff85a7fcbaa1... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] fefdd5206feaf967c67dcf9df60bd650cd8b37c05d1d514fcaf2bde7533e358b... handshake new: [92] fefdd5206feaf967c67dcf9df60bd650cd8b37c05d1d514fcaf2bde7533e358b... record old: [105] 0200005d000000000000005dfefdd5206feaf967c67dcf9df60bd650cd8b37c0... record new: [104] 0200005c000000000000005cfefdd5206feaf967c67dcf9df60bd650cd8b37c0... server: Filtered packet: [798] 16fefd000000000000000000680200005c000000000000005cfefdd5206feaf9... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [114] feff99803483c59ae9ae52b8013717d87be0f7a51db9858793eb849067a6d9d4... handshake new: [114] feff99803483c59ae9ae52b8013717d87be0f7a51db9858793eb849067a6d9d4... record old: [126] 010000720000000000000072feff99803483c59ae9ae52b8013717d87be0f7a5... record new: [126] 010000720000000000000072feff99803483c59ae9ae52b8013717d87be0f7a5... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff99803483c5... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [184] fefdb16529e6b1e0413381191ee0d835382d668edff93c3bcbaed6931525ab77... handshake new: [184] fefdb16529e6b1e0413381191ee0d835382d668edff93c3bcbaed6931525ab77... record old: [196] 010000b800000000000000b8fefdb16529e6b1e0413381191ee0d835382d668e... record new: [196] 010000b800000000000000b8fefdb16529e6b1e0413381191ee0d835382d668e... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefdb16529e6b1... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 Version: DTLS 1.0 [ SKIPPED ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 (0 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] fefd6d9462893d87d1ff2917516852de7de5479b71d04be781a38946c9159aa7... handshake new: [89] feff6d9462893d87d1ff2917516852de7de5479b71d04be781a38946c9159aa7... record old: [101] 020000590000000000000059fefd6d9462893d87d1ff2917516852de7de5479b... record new: [101] 020000590000000000000059feff6d9462893d87d1ff2917516852de7de5479b... server: Filtered packet: [205] 16fefd00000000000000000065020000590000000000000059feff6d9462893d... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [2423] 0b00096b000100000000096b0009680009653082096130820548a00302010202... server: Filtered packet: [2573] 16feff00000000000000000063020000570000000000000057feffb947d0862a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [2423] 0b00096b000100000000096b0009680009653082096130820548a00302010202... server: Filtered packet: [2573] 16fefd00000000000000000063020000570000000000000057fefd0962b703f6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 (2 ms) [----------] 114 tests from Pre13Datagram/TlsConnectGenericPre13 (583 ms total) [----------] 40 tests from Version12Only/TlsConnectTls12 [ RUN ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/0 Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/0 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/1 Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/1 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/0 Version: TLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08090080a00fdd89b3003b6c4d4e3bd987cbae50f53832169f37c684d0edd9f2... handshake new: [132] 08040080a00fdd89b3003b6c4d4e3bd987cbae50f53832169f37c684d0edd9f2... record old: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... record new: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... client: Filtered packet: [835] 160303030b0b00025a0002570002543082025030820185a00302010202010630... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/1 Version: DTLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080900805c5bbc926e2bc072626af7f1703e41426e14d927fe3c914e9b3cb0f0... handshake new: [132] 080400805c5bbc926e2bc072626af7f1703e41426e14d927fe3c914e9b3cb0f0... record old: [144] 0f0000840003000000000084080900805c5bbc926e2bc072626af7f1703e4142... record new: [144] 0f0000840003000000000084080400805c5bbc926e2bc072626af7f1703e4142... client: Filtered packet: [917] 16fefd000000000000000102660b00025a000100000000025a00025700025430... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/0 Version: TLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008029327109d3a1dbef87bbd7676cefbfb8fefab19351db2fa76af141d4... handshake new: [132] 0809008029327109d3a1dbef87bbd7676cefbfb8fefab19351db2fa76af141d4... record old: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... record new: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... client: Filtered packet: [671] 16030302670b0001b60001b30001b0308201ac30820115a00302010202010230... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/1 Version: DTLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400809894f3edb0f89ce5837c8b52625e5e0e5091d7b0e0e97be42ceab240... handshake new: [132] 080900809894f3edb0f89ce5837c8b52625e5e0e5091d7b0e0e97be42ceab240... record old: [144] 0f0000840003000000000084080400809894f3edb0f89ce5837c8b52625e5e0e... record new: [144] 0f0000840003000000000084080900809894f3edb0f89ce5837c8b52625e5e0e... client: Filtered packet: [753] 16fefd000000000000000101c20b0001b600010000000001b60001b30001b030... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [757] 0200005d030375b28be6ca56ad1380a84289179eac43c6a3ec01fb12ce245348... record new: [727] 0200005d030375b28be6ca56ad1380a84289179eac43c6a3ec01fb12ce245348... server: Filtered packet: [732] 16030302d70200005d030375b28be6ca56ad1380a84289179eac43c6a3ec01fb... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [20] 0d00000800030000000000080301400200000000 server: Filtered packet: [832] 16fefd000000000000000000690200005d000000000000005dfefd4189737957... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/0 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [32] 001e040305030603020308040805080604010501060102010402050206020202 handshake old: [187] 03035253a5637b9f65511674baed7ab935f91b4e4a2df95ae55ff6544730c5cb... handshake new: [151] 03035253a5637b9f65511674baed7ab935f91b4e4a2df95ae55ff6544730c5cb... record old: [191] 010000bb03035253a5637b9f65511674baed7ab935f91b4e4a2df95ae55ff654... record new: [155] 0100009703035253a5637b9f65511674baed7ab935f91b4e4a2df95ae55ff654... client: Filtered packet: [160] 160301009b0100009703035253a5637b9f65511674baed7ab935f91b4e4a2df9... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [32] 001e040305030603020308040805080604010501060102010402050206020202 handshake old: [184] fefd905974b9e97bafc0fbe7e0013abbd206786c3fde18e75f3e584240e50b71... handshake new: [148] fefd905974b9e97bafc0fbe7e0013abbd206786c3fde18e75f3e584240e50b71... record old: [196] 010000b800000000000000b8fefd905974b9e97bafc0fbe7e0013abbd206786c... record new: [160] 010000940000000000000094fefd905974b9e97bafc0fbe7e0013abbd206786c... client: Filtered packet: [173] 16feff000000000000000000a0010000940000000000000094fefd905974b9e9... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/0 (1 ms) [ RUN ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/1 (2 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303de9484359c82319165948efb14eca4d1f3837d69e4849f5824f4... record new: [1192] 020000570303de9484359c82319165948efb14eca4d1f3837d69e4849f5824f4... server: Filtered packet: [1197] 16030304a8020000570303de9484359c82319165948efb14eca4d1f3837d69e4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/0 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd2ac6ad31a1... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/0 (8 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/1 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/0 (8 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/1 (8 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectEcdheP384/0 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectEcdheP384/0 (22 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectEcdheP384/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectEcdheP384/1 (22 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... record old: [715] 0200005d03032fff1fe0d8591c71619d88a19276b0711dd71754c711b93e0ee3... record new: [715] 0200005d03032fff1fe0d8591c71619d88a19276b0711dd71754c711b93e0ee3... server: Filtered packet: [720] 16030302cb0200005d03032fff1fe0d8591c71619d88a19276b0711dd71754c7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefd744347189a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... record old: [715] 0200005d03039bf774de8f1265b1bf6a5056d5a3dd9fbd642e20e9f8d29149a4... record new: [715] 0200005d03039bf774de8f1265b1bf6a5056d5a3dd9fbd642e20e9f8d29149a4... server: Filtered packet: [720] 16030302cb0200005d03039bf774de8f1265b1bf6a5056d5a3dd9fbd642e20e9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... handshake new: [168] 03001d20f3d89d7d2b1b48983c5500a0354c7f5026883fa30ddd795b53797b25... record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefda04b6fd3c3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/1 (4 ms) [----------] 40 tests from Version12Only/TlsConnectTls12 (217 ms total) [----------] 30 tests from SignatureSchemeRsa/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/4 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/5 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/6 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/7 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/8 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/9 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/4 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/5 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/6 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/7 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/8 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/9 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/4 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/5 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/6 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/7 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/8 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/9 (4 ms) [----------] 30 tests from SignatureSchemeRsa/TlsSignatureSchemeConfiguration (106 ms total) [----------] 12 tests from SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (4 ms) [----------] 12 tests from SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration (48 ms total) [----------] 12 tests from SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (6 ms) [----------] 12 tests from SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration (72 ms total) [----------] 6 tests from SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (3 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (4 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (3 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (4 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (3 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (4 ms) [----------] 6 tests from SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration (21 ms total) [----------] 12 tests from SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (5 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (7 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (7 ms) [----------] 12 tests from SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration (63 ms total) [----------] 12 tests from SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (12 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (7 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (12 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (13 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (13 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (13 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (13 ms) [----------] 12 tests from SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration (113 ms total) [----------] 12 tests from SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (9 ms) [----------] 12 tests from SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration (86 ms total) [----------] 12 tests from SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (14 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (13 ms) [----------] 12 tests from SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration (115 ms total) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 (13 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 (5 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 (3 ms) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest (405 ms total) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 (10 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 (10 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 (10 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 (4 ms) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (264 ms total) [----------] 72 tests from CipherSuiteAEAD/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 (12 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/12 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/13 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/14 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/15 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/16 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/17 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/12 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/13 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/14 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/15 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/16 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/17 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/12 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/13 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/14 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/15 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/16 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/17 (8 ms) [----------] 72 tests from CipherSuiteAEAD/TlsCipherSuiteTest (476 ms total) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 (11 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 (12 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 (11 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 (9 ms) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest (403 ms total) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 (4 ms) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (1438 ms total) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 (4 ms) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (726 ms total) [----------] 3520 tests from CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/2 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/3 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/4 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/5 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/6 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/7 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/8 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/9 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/10 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/11 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/12 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/13 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/14 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/15 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/16 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/17 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/18 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/19 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/20 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/21 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/22 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/23 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/24 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/25 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/26 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/27 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/28 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/29 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/30 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/31 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/32 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/33 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/34 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/35 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/36 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/37 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/38 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/39 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/40 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/41 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/42 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/43 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/44 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/45 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/46 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/47 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/48 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/49 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/50 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/51 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/52 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/53 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/54 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/55 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/56 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/57 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/58 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/59 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/60 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/61 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/62 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/63 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/64 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/65 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/66 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/67 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/68 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/69 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/70 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/71 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/72 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/73 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/74 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/75 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/76 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/77 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/78 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/79 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/80 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/81 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/82 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/83 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/84 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/85 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/86 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/87 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/88 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/89 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/90 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/91 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/92 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/93 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/94 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/95 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/96 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/97 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/98 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/99 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/100 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/101 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/102 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/103 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/104 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/105 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/106 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/107 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/108 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/109 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/111 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/112 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/113 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/114 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/115 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/116 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/117 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/118 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/119 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/120 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/121 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/122 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/123 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/124 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/125 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/126 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/127 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/128 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/129 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/130 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/131 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/132 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/133 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/134 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/135 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/136 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/137 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/138 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/139 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/140 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/141 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/142 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/143 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/144 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/145 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/146 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/147 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/148 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/149 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/150 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/151 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/152 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/153 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/154 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/155 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/156 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/157 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/158 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/159 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/160 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/161 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/162 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/163 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/164 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/165 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/166 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/167 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/168 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/169 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/170 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/171 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/172 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/173 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/174 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/175 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/176 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/177 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/178 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/179 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/180 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/181 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/182 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/183 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/184 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/185 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/186 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/187 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/188 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/189 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/190 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/191 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/192 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/193 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/194 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/195 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/196 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/197 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/198 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/199 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/200 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/201 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/202 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/203 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/204 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/205 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/206 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/207 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/208 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/209 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/210 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/211 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/212 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/213 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/214 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/215 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/216 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/217 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/218 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/219 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/220 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/221 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/222 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/223 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/224 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/225 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/226 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/227 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/228 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/229 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/230 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/231 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/232 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/233 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/234 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/235 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/236 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/237 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/238 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/239 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/240 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/241 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/242 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/243 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/244 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/245 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/246 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/247 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/248 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/249 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/250 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/251 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/252 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/253 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/254 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/255 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/256 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/257 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/258 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/259 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/260 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/261 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/262 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/263 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/264 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/265 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/266 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/267 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/268 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/269 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/270 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/271 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/272 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/273 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/274 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/275 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/276 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/277 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/278 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/279 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/280 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/281 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/282 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/283 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/284 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/285 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/286 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/287 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/288 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/289 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/290 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/291 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/292 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/293 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/294 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/295 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/296 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/297 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/298 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/299 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/300 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/301 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/302 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/303 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/304 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/305 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/306 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/307 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/308 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/309 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/310 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/311 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/312 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/313 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/314 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/315 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/316 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/317 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/318 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/319 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/320 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/321 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/322 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/323 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/324 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/325 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/326 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/327 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/328 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/329 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/330 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/331 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/332 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/333 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/334 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/335 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/336 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/337 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/338 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/339 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/340 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/341 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/342 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/343 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/344 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/345 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/346 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/347 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/348 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/349 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/350 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/351 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/352 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/353 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/354 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/355 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/356 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/357 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/358 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/359 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/360 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/361 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/362 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/363 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/364 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/365 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/366 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/367 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/368 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/369 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/370 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/371 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/372 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/373 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/374 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/375 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/376 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/377 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/378 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/379 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/380 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/381 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/382 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/383 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/384 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/385 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/386 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/387 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/388 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/389 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/390 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/391 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/392 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/393 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/394 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/395 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/396 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/397 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/398 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/399 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/400 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/401 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/402 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/403 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/404 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/405 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/406 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/407 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/408 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/409 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/410 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/411 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/412 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/413 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/414 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/415 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/416 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/417 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/418 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/419 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/420 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/421 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/422 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/423 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/424 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/425 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/426 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/427 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/428 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/429 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/430 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/431 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/432 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/433 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/434 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/435 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/436 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/437 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/438 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/439 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/440 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/441 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/442 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/443 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/444 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/445 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/446 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/447 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/448 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/449 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/450 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/451 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/452 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/453 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/454 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/455 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/456 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/457 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/458 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/459 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/460 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/461 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/462 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/463 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/464 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/465 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/466 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/467 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/468 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/469 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/470 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/471 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/472 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/473 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/474 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/475 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/476 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/477 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/478 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/479 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/480 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/481 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/482 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/483 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/484 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/485 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/486 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/487 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/488 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/489 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/490 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/491 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/492 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/493 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/494 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/495 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/496 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/497 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/498 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/499 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/500 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/501 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/502 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/503 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/504 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/505 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/506 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/507 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/508 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/509 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/510 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/511 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/512 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/513 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/514 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/515 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/516 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/517 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/518 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/519 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/520 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/521 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/522 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/523 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/524 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/525 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/526 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/527 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/528 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/529 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/530 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/531 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/532 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/533 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/534 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/535 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/536 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/537 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/538 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/539 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/540 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/541 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/542 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/543 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/544 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/545 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/546 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/547 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/548 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/549 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/550 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/551 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/552 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/553 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/554 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/555 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/556 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/557 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/558 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/559 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/560 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/561 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/562 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/563 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/564 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/565 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/566 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/567 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/568 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/569 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/570 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/571 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/572 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/573 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/574 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/575 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/576 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/577 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/578 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/579 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/580 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/581 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/582 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/583 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/584 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/585 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/586 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/587 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/588 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/589 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/590 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/591 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/592 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/593 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/594 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/595 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/596 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/597 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/598 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/599 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/601 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/602 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/603 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/606 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/607 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/608 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/609 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/610 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/611 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/612 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/613 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/614 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/616 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/617 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/618 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/619 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/620 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/621 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/622 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/623 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/624 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/626 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/627 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/628 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/629 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/631 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/632 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/633 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/634 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/635 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/637 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/638 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/639 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/640 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/642 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/644 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/645 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/646 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/647 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/649 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/650 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/651 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/652 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/653 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/654 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/655 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/656 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/658 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/659 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/660 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/661 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/662 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/663 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/664 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/665 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/666 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/667 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/668 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/669 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/670 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/671 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/672 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/673 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/674 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/675 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/676 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/677 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/678 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/679 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/680 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/681 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/682 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/683 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/684 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/685 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/686 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/687 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/688 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/689 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/690 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/691 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/692 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/693 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/694 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/695 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/696 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/697 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/698 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/699 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/700 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/701 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/702 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/703 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/704 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/705 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/706 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/707 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/708 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/709 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/710 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/711 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/712 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/713 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/714 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/715 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/716 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/717 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/718 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/719 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/720 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/721 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/722 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/723 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/724 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/725 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/726 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/727 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/728 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/729 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/730 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/731 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/732 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/733 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/734 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/735 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/736 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/737 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/738 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/739 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/740 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/741 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/742 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/743 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/744 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/745 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/746 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/747 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/748 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/749 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/750 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/751 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/752 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/753 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/754 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/755 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/756 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/757 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/758 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/759 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/760 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/761 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/762 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/763 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/764 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/765 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/766 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/767 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/768 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/769 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/770 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/771 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/772 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/773 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/774 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/776 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/777 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/778 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/779 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/780 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/781 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/782 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/784 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/785 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/786 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/787 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/788 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/789 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/790 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/791 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/792 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/793 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/794 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/795 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/796 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/797 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/798 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/799 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/800 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/801 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/802 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/803 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/804 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/805 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/806 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/807 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/808 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/809 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/810 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/811 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/812 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/813 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/814 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/815 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/816 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/817 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/818 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/819 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/820 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/821 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/822 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/823 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/824 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/825 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/826 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/827 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/828 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/829 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/830 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/831 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/832 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/833 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/834 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/835 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/836 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/837 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/838 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/839 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/840 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/841 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/842 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/843 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/844 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/845 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/846 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/847 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/848 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/849 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/850 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/851 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/852 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/853 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/854 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/855 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/856 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/857 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/858 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/859 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/860 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/861 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/862 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/863 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/864 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/865 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/866 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/867 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/868 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/869 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/870 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/871 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/872 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/873 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/874 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/875 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/876 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/877 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/878 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/879 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/2 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/3 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/4 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/5 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/6 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/7 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/8 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/9 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/10 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/11 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/12 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/13 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/14 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/15 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/16 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/17 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/18 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/19 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/20 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/21 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/22 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/23 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/24 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/25 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/26 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/27 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/28 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/29 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/30 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/31 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/32 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/33 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/34 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/35 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/36 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/37 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/38 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/39 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/40 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/41 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/42 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/43 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/44 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/45 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/46 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/47 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/48 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/49 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/50 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/51 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/52 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/53 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/54 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/55 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/56 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/57 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/58 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/59 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/60 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/61 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/62 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/63 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/64 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/65 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/66 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/67 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/68 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/69 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/70 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/71 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/72 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/73 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/74 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/75 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/76 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/77 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/78 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/79 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/80 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/81 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/82 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/83 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/84 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/85 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/86 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/87 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/88 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/89 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/90 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/91 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/92 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/93 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/94 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/95 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/96 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/97 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/98 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/99 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/100 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/101 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/102 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/103 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/104 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/105 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/106 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/107 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/108 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/109 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/110 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/111 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/112 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/113 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/114 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/115 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/116 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/117 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/118 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/119 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/120 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/121 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/122 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/123 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/124 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/125 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/126 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/127 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/128 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/129 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/130 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/131 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/132 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/133 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/134 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/135 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/136 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/137 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/138 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/139 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/140 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/141 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/142 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/143 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/144 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/145 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/146 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/147 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/148 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/149 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/150 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/151 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/152 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/153 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/154 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/155 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/156 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/157 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/158 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/159 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/160 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/161 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/162 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/163 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/164 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/165 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/166 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/167 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/168 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/169 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/170 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/171 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/172 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/173 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/174 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/175 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/176 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/177 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/178 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/179 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/180 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/181 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/182 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/183 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/184 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/185 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/186 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/187 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/188 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/189 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/190 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/191 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/192 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/193 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/194 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/195 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/196 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/197 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/198 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/199 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/200 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/201 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/202 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/203 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/204 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/205 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/206 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/207 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/208 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/209 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/210 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/211 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/212 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/213 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/214 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/215 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/216 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/217 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/218 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/219 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/220 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/221 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/222 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/223 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/224 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/225 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/226 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/227 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/228 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/229 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/230 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/231 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/232 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/233 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/234 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/235 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/236 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/237 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/238 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/239 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/240 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/241 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/242 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/243 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/244 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/245 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/246 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/247 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/248 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/249 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/250 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/251 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/252 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/253 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/254 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/255 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/256 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/257 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/258 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/259 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/260 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/261 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/262 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/263 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/264 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/265 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/266 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/267 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/268 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/269 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/270 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/271 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/272 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/273 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/274 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/275 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/276 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/277 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/278 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/279 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/280 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/281 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/282 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/283 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/284 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/285 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/286 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/287 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/288 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/289 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/290 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/291 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/292 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/293 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/294 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/295 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/296 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/297 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/298 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/299 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/300 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/301 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/302 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/303 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/304 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/305 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/306 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/307 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/308 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/309 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/310 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/311 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/312 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/313 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/314 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/315 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/316 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/317 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/318 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/319 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/320 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/321 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/322 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/323 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/324 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/325 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/326 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/327 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/328 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/329 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/440 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/441 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/442 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/443 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/444 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/445 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/446 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/447 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/448 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/449 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/450 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/451 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/452 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/453 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/454 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/455 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/456 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/457 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/458 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/459 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/460 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/461 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/462 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/463 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/464 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/465 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/466 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/467 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/468 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/469 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/470 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/471 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/472 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/473 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/474 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/475 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/476 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/477 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/478 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/479 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/480 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/481 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/482 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/483 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/484 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/485 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/486 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/487 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/488 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/489 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/490 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/491 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/492 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/493 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/494 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/495 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/496 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/497 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/498 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/499 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/500 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/501 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/502 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/503 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/504 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/505 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/506 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/507 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/508 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/509 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/510 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/511 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/512 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/513 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/514 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/515 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/516 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/517 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/518 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/519 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/520 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/521 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/522 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/523 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/524 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/525 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/526 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/527 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/528 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/529 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/530 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/531 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/532 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/533 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/534 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/535 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/536 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/537 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/538 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/539 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/540 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/541 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/542 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/543 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/544 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/545 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/546 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/547 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/548 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/549 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/550 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/551 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/552 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/553 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/554 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/555 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/556 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/557 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/558 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/559 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/560 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/561 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/562 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/563 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/564 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/565 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/566 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/567 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/568 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/569 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/570 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/571 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/572 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/573 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/574 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/575 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/576 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/577 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/578 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/579 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/580 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/581 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/582 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/583 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/584 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/585 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/586 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/587 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/588 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/589 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/590 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/591 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/592 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/593 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/594 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/595 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/596 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/597 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/598 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/599 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/600 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/601 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/602 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/603 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/604 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/605 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/606 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/607 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/608 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/609 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/610 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/611 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/612 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/613 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/614 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/615 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/616 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/617 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/618 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/619 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/620 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/621 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/622 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/623 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/624 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/625 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/626 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/627 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/628 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/629 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/630 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/631 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/632 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/633 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/634 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/635 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/636 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/637 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/638 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/639 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/640 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/641 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/642 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/643 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/644 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/645 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/646 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/647 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/648 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/649 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/650 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/651 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/652 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/653 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/654 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/655 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/656 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/657 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/658 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/659 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/660 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/661 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/662 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/663 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/664 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/665 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/666 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/667 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/668 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/669 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/670 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/671 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/672 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/673 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/674 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/675 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/676 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/677 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/678 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/679 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/680 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/681 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/682 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/683 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/684 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/685 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/686 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/687 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/688 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/689 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/690 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/691 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/692 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/693 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/694 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/695 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/696 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/697 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/698 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/699 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/700 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/701 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/702 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/703 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/704 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/705 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/706 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/707 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/708 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/709 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/710 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/711 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/712 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/713 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/714 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/715 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/716 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/717 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/718 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/719 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/720 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/721 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/722 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/723 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/724 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/725 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/726 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/727 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/728 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/729 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/730 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/731 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/732 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/733 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/734 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/735 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/736 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/737 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/738 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/739 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/740 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/741 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/742 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/743 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/744 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/745 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/746 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/747 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/748 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/749 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/750 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/751 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/752 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/753 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/754 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/755 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/756 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/757 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/758 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/759 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/760 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/761 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/762 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/763 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/764 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/765 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/766 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/767 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/768 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/769 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/0 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/2 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/3 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/4 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/5 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/6 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/7 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/8 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/9 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/10 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/11 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/12 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/13 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/14 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/15 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/16 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/17 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/18 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/19 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/20 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/21 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/22 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/23 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/24 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/25 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/26 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/27 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/28 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/29 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/30 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/31 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/32 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/33 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/34 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/35 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/36 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/37 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/38 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/39 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/40 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/41 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/42 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/43 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/44 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/45 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/46 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/47 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/48 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/49 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/50 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/51 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/52 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/53 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/54 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/55 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/56 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/57 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/58 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/59 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/60 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/61 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/62 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/63 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/64 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/65 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/66 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/67 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/68 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/69 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/70 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/71 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/72 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/73 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/74 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/75 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/76 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/77 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/78 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/79 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/80 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/81 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/82 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/83 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/84 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/85 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/86 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/87 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/88 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/89 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/90 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/91 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/92 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/93 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/94 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/95 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/96 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/97 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/98 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/99 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/100 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/101 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/102 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/103 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/104 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/105 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/106 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/107 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/108 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/109 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/111 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/112 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/113 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/114 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/115 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/116 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/117 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/118 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/119 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/120 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/121 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/122 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/123 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/124 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/125 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/126 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/127 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/128 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/129 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/130 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/131 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/132 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/133 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/134 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/135 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/136 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/137 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/138 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/139 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/140 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/141 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/142 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/143 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/144 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/145 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/146 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/147 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/148 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/149 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/150 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/151 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/152 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/153 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/154 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/155 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/156 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/157 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/158 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/159 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/160 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/161 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/162 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/163 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/164 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/165 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/166 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/167 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/168 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/169 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/170 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/171 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/172 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/173 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/174 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/175 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/176 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/177 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/178 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/179 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/180 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/181 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/182 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/183 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/184 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/185 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/186 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/187 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/188 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/189 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/190 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/191 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/192 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/193 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/194 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/195 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/196 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/197 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/198 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/199 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/200 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/201 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/202 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/203 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/204 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/205 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/206 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/207 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/208 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/209 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/210 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/211 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/212 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/213 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/214 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/215 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/216 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/217 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/218 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/219 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/220 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/221 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/222 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/223 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/224 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/225 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/226 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/227 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/228 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/229 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/230 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/231 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/232 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/233 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/234 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/235 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/236 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/237 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/238 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/239 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/240 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/241 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/242 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/243 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/244 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/245 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/246 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/247 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/248 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/249 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/250 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/251 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/252 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/253 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/254 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/255 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/256 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/257 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/258 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/259 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/260 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/261 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/262 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/263 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/264 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/265 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/266 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/267 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/268 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/269 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/270 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/271 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/272 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/273 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/274 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/275 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/276 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/277 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/278 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/279 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/280 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/281 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/282 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/283 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/284 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/285 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/286 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/287 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/288 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/289 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/290 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/291 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/292 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/293 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/294 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/295 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/296 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/297 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/298 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/299 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/300 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/301 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/302 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/303 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/304 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/305 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/306 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/307 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/308 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/309 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/310 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/311 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/312 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/313 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/314 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/315 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/316 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/317 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/318 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/319 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/320 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/321 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/322 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/323 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/324 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/325 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/326 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/327 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/328 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/329 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/330 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/331 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/332 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/333 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/334 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/335 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/336 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/337 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/338 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/339 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/340 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/341 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/342 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/343 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/344 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/345 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/346 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/347 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/348 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/349 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/350 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/351 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/352 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/353 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/354 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/355 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/356 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/357 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/358 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/359 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/360 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/361 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/362 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/363 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/364 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/365 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/366 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/367 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/368 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/369 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/370 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/371 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/372 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/373 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/374 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/375 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/376 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/377 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/378 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/379 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/380 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/381 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/382 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/383 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/384 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/385 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/386 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/387 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/388 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/389 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/390 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/391 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/392 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/393 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/394 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/395 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/396 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/397 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/398 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/399 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/400 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/401 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/402 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/403 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/404 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/405 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/406 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/407 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/408 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/409 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/410 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/411 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/412 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/413 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/414 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/415 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/416 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/417 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/418 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/419 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/420 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/421 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/422 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/423 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/424 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/425 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/426 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/427 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/428 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/429 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/430 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/431 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/432 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/433 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/434 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/435 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/436 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/437 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/438 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/439 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/440 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/441 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/442 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/443 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/444 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/445 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/446 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/447 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/448 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/449 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/450 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/451 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/452 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/453 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/454 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/455 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/456 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/457 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/458 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/459 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/460 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/461 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/462 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/463 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/464 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/465 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/466 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/467 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/468 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/469 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/470 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/471 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/472 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/473 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/474 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/475 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/476 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/477 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/478 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/479 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/480 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/481 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/482 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/483 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/484 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/485 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/486 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/487 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/488 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/489 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/490 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/491 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/492 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/493 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/494 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/495 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/496 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/497 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/498 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/499 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/500 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/501 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/502 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/503 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/504 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/505 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/506 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/507 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/508 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/509 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/510 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/511 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/512 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/513 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/514 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/515 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/516 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/517 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/518 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/519 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/520 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/521 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/522 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/523 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/524 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/525 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/526 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/527 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/528 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/529 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/530 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/531 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/532 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/533 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/534 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/535 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/536 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/537 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/538 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/539 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/540 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/541 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/542 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/543 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/544 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/545 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/546 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/547 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/548 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/549 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/550 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/551 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/552 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/553 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/554 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/555 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/556 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/557 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/558 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/559 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/560 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/561 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/562 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/563 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/564 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/565 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/566 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/567 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/568 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/569 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/570 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/571 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/572 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/573 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/574 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/575 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/576 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/577 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/578 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/579 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/580 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/581 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/582 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/583 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/584 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/585 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/586 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/587 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/588 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/589 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/590 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/591 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/592 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/593 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/594 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/595 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/596 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/597 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/598 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/599 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/601 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/602 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/603 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/606 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/607 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/608 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/609 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/610 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/611 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/612 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/613 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/614 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/616 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/617 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/618 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/619 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/620 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/621 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/622 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/623 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/624 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/626 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/628 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/629 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/631 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/633 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/634 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/635 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/636 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/637 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/638 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/639 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/640 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/642 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/644 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/645 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/646 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/647 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/649 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/650 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/651 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/652 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/653 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/654 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/655 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/656 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/658 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/659 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/660 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/661 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/662 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/663 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/664 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/665 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/666 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/667 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/668 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/669 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/670 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/671 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/672 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/673 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/674 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/675 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/676 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/677 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/678 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/679 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/680 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/681 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/682 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/683 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/684 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/685 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/686 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/687 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/688 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/689 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/690 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/691 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/692 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/693 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/694 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/695 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/696 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/697 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/698 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/699 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/700 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/701 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/702 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/703 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/704 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/705 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/706 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/707 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/708 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/709 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/710 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/711 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/712 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/713 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/714 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/715 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/716 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/717 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/718 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/719 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/720 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/721 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/722 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/723 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/724 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/725 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/726 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/727 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/728 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/729 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/730 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/731 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/732 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/733 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/734 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/735 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/736 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/737 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/738 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/739 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/740 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/741 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/742 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/743 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/744 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/745 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/746 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/747 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/748 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/749 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/750 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/751 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/752 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/753 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/754 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/755 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/756 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/757 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/758 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/759 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/760 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/761 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/762 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/763 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/764 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/765 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/766 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/767 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/768 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/769 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/770 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/771 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/772 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/773 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/774 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/776 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/777 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/778 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/779 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/780 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/781 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/782 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/784 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/785 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/786 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/787 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/788 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/789 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/790 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/791 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/792 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/793 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/794 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/795 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/796 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/797 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/798 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/799 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/800 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/801 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/802 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/803 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/804 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/805 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/806 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/807 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/808 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/809 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/810 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/811 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/812 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/813 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/814 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/815 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/816 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/817 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/818 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/819 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/820 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/821 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/822 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/823 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/824 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/825 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/826 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/827 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/828 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/829 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/830 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/831 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/832 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/833 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/834 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/835 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/836 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/837 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/838 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/839 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/840 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/841 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/842 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/843 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/844 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/845 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/846 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/847 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/848 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/849 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/850 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/851 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/852 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/853 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/854 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/855 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/856 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/857 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/858 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/859 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/860 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/861 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/862 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/863 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/864 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/865 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/866 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/867 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/868 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/869 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/870 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/871 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/872 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/873 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/874 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/875 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/876 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/877 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/878 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/879 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/2 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/3 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/4 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/5 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/6 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/7 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/8 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/9 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/10 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/11 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/12 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/13 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/14 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/15 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/16 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/17 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/18 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/19 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/20 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/21 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/22 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/23 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/24 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/25 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/26 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/27 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/28 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/29 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/30 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/31 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/32 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/33 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/34 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/35 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/36 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/37 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/38 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/39 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/40 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/41 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/42 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/43 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/44 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/45 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/46 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/47 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/48 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/49 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/50 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/51 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/52 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/53 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/54 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/55 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/56 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/57 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/58 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/59 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/60 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/61 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/62 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/63 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/64 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/65 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/66 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/67 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/68 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/69 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/70 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/71 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/72 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/73 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/74 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/75 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/76 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/77 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/78 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/79 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/80 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/81 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/82 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/83 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/84 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/85 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/86 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/87 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/88 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/89 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/90 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/91 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/92 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/93 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/94 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/95 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/96 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/97 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/98 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/99 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/100 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/101 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/102 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/103 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/104 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/105 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/106 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/107 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/108 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/109 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/111 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/112 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/113 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/114 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/115 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/116 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/117 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/118 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/119 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/120 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/121 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/122 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/123 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/124 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/125 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/126 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/127 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/128 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/129 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/130 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/131 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/132 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/133 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/134 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/135 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/136 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/137 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/138 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/139 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/140 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/141 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/142 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/143 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/144 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/145 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/146 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/147 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/148 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/149 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/150 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/151 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/152 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/153 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/154 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/155 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/156 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/157 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/158 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/159 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/160 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/161 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/162 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/163 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/164 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/165 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/166 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/167 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/168 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/169 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/170 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/171 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/172 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/173 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/174 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/175 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/176 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/177 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/178 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/179 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/180 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/181 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/182 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/183 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/184 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/185 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/186 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/187 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/188 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/189 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/190 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/191 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/192 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/193 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/194 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/195 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/196 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/197 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/198 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/199 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/200 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/201 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/202 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/203 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/204 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/205 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/206 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/207 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/208 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/209 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/210 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/211 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/212 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/213 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/214 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/215 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/216 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/217 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/218 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/219 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/220 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/221 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/222 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/223 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/224 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/225 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/226 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/227 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/228 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/229 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/230 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/231 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/232 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/233 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/234 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/235 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/236 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/237 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/238 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/239 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/240 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/241 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/242 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/243 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/244 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/245 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/246 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/247 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/248 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/249 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/250 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/251 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/252 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/253 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/254 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/255 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/256 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/257 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/258 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/259 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/260 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/261 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/262 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/263 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/264 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/265 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/266 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/267 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/268 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/269 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/270 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/271 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/272 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/273 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/274 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/275 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/276 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/277 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/278 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/279 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/280 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/281 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/282 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/283 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/284 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/285 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/286 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/287 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/288 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/289 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/290 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/291 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/292 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/293 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/294 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/295 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/296 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/297 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/298 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/299 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/300 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/301 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/302 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/303 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/304 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/305 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/306 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/307 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/308 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/309 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/310 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/311 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/312 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/313 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/314 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/315 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/316 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/317 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/318 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/319 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/320 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/321 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/322 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/323 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/324 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/325 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/326 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/327 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/328 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/329 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/330 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/331 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/332 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/333 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/334 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/335 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/336 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/337 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/338 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/339 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/340 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/341 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/342 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/343 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/344 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/345 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/346 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/347 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/348 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/349 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/350 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/351 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/352 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/353 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/354 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/355 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/356 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/357 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/358 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/359 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/360 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/361 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/362 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/363 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/364 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/365 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/366 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/367 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/368 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/369 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/370 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/371 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/372 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/373 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/374 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/375 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/376 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/377 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/378 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/379 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/380 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/381 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/382 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/383 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/384 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/385 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/386 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/387 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/388 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/389 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/390 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/391 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/392 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/393 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/394 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/395 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/396 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/397 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/398 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/399 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/400 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/401 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/402 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/403 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/404 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/405 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/406 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/407 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/408 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/409 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/410 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/411 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/412 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/413 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/414 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/415 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/416 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/417 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/418 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/419 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/420 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/421 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/422 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/423 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/424 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/425 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/426 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/427 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/428 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/429 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/430 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/431 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/432 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/433 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/434 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/435 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/436 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/437 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/438 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/439 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/440 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/441 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/442 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/443 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/444 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/445 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/446 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/447 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/448 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/449 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/450 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/451 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/452 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/453 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/454 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/455 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/456 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/457 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/458 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/459 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/460 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/461 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/462 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/463 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/464 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/465 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/466 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/467 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/468 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/469 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/470 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/471 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/472 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/473 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/474 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/475 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/476 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/477 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/478 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/479 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/480 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/481 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/482 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/483 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/484 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/485 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/486 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/487 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/488 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/489 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/490 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/491 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/492 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/493 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/494 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/495 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/496 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/497 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/498 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/499 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/500 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/501 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/502 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/503 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/504 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/505 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/506 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/507 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/508 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/509 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/510 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/511 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/512 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/513 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/514 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/515 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/516 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/517 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/518 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/519 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/520 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/521 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/522 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/523 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/524 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/525 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/526 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/527 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/528 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/529 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/530 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/531 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/532 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/533 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/534 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/535 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/536 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/537 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/538 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/539 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/540 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/541 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/542 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/543 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/544 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/545 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/546 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/547 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/548 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/549 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/550 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/551 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/552 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/553 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/554 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/555 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/556 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/557 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/558 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/559 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/560 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/561 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/562 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/563 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/564 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/565 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/566 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/567 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/568 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/569 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/570 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/571 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/572 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/573 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/574 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/575 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/576 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/577 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/578 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/579 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/580 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/581 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/582 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/583 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/584 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/585 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/586 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/587 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/588 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/589 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/590 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/591 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/592 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/593 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/594 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/595 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/596 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/597 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/598 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/599 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/601 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/602 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/603 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/606 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/607 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/608 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/609 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/610 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/611 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/612 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/613 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/614 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/615 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/616 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/617 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/618 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/619 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/620 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/621 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/622 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/623 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/624 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/626 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/628 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/629 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/631 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/633 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/634 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/635 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/637 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/638 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/639 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/640 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/642 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/644 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/645 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/646 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/647 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/649 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/650 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/651 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/652 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/653 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/654 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/655 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/656 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/658 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/659 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/660 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/661 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/662 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/663 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/664 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/665 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/666 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/667 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/668 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/669 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/670 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/671 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/672 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/673 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/674 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/675 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/676 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/677 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/678 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/679 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/680 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/681 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/682 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/683 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/684 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/685 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/686 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/687 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/688 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/689 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/690 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/691 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/692 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/693 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/694 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/695 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/696 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/697 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/698 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/699 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/700 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/701 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/702 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/703 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/704 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/705 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/706 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/707 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/708 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/709 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/710 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/711 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/712 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/713 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/714 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/715 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/716 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/717 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/718 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/719 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/720 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/721 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/722 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/723 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/724 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/725 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/726 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/727 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/728 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/729 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/730 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/731 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/732 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/733 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/734 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/735 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/736 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/737 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/738 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/739 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/740 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/741 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/742 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/743 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/744 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/745 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/746 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/747 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/748 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/749 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/750 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/751 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/752 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/753 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/754 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/755 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/756 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/757 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/758 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/759 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/760 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/761 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/762 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/763 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/764 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/765 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/766 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/767 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/768 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/769 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/770 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/771 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/772 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/773 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/774 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/776 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/777 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/778 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/779 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/780 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/781 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/782 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/784 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/785 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/786 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/787 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/788 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/789 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/790 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/791 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/792 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/793 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/794 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/795 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/796 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/797 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/798 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/799 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/800 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/801 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/802 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/803 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/804 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/805 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/806 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/807 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/808 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/809 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/810 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/811 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/812 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/813 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/814 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/815 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/816 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/817 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/818 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/819 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/820 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/821 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/822 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/823 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/824 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/825 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/826 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/827 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/828 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/829 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/830 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/831 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/832 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/833 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/834 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/835 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/836 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/837 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/838 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/839 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/840 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/841 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/842 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/843 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/844 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/845 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/846 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/847 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/848 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/849 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/850 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/851 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/852 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/853 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/854 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/855 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/856 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/857 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/858 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/859 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/860 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/861 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/862 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/863 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/864 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/865 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/866 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/867 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/868 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/869 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/870 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/871 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/872 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/873 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/874 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/875 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/876 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/877 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/878 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/879 (10 ms) [----------] 3520 tests from CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest (22063 ms total) [----------] 960 tests from CipherSuiteTLS13/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/0 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/1 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/2 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/3 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/6 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/7 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/8 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/9 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/10 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/11 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/12 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/13 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/14 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/15 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/16 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/17 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/18 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/19 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/20 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/21 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/22 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/23 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/24 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/25 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/26 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/27 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/28 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/29 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/30 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/31 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/32 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/33 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/34 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/35 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/36 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/37 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/38 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/39 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/40 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/41 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/42 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/43 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/44 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/45 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/46 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/47 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/48 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/49 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/50 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/51 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/52 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/53 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/54 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/55 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/56 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/57 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/58 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/59 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/60 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/61 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/62 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/63 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/64 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/65 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/66 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/67 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/68 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/69 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/70 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/71 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/72 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/73 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/74 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/75 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/76 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/77 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/78 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/79 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/80 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/81 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/82 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/83 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/84 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/85 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/86 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/87 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/88 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/89 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/90 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/91 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/92 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/93 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/94 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/95 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/96 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/97 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/98 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/99 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/100 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/101 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/102 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/103 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/104 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/105 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/106 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/107 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/108 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/109 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/110 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/111 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/112 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/113 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/114 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/115 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/116 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/117 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/118 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/119 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/120 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/121 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/122 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/123 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/124 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/125 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/126 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/127 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/128 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/129 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/130 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/131 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/132 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/133 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/134 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/135 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/136 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/137 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/138 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/139 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/140 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/141 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/142 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/143 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/144 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/145 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/146 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/147 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/148 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/149 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/150 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/151 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/152 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/153 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/154 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/155 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/156 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/157 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/158 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/159 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/160 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/161 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/162 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/163 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/164 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/165 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/166 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/167 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/168 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/169 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/170 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/171 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/172 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/173 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/174 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/175 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/176 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/177 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/178 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/179 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/180 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/181 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/182 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/183 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/184 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/185 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/186 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/187 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/188 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/189 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/190 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/191 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/192 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/193 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/194 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/195 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/196 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/197 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/198 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/199 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/200 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/201 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/202 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/203 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/204 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/205 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/206 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/207 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/208 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/209 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/210 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/211 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/212 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/213 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/214 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/215 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/216 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/217 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/218 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/219 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/220 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/221 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/222 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/223 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/224 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/225 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/226 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/227 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/228 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/229 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/230 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/231 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/232 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/233 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/234 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/235 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/236 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/237 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/238 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/239 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/0 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/1 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/2 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/3 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/4 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/5 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/6 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/7 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/8 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/9 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/10 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/11 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/12 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/13 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/14 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/15 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/16 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/17 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/18 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/19 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/20 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/21 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/22 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/23 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/24 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/25 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/26 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/27 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/28 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/29 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/30 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/31 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/32 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/33 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/34 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/35 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/36 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/37 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/38 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/39 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/40 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/41 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/42 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/43 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/44 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/45 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/46 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/47 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/48 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/49 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/50 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/51 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/52 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/53 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/54 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/55 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/56 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/57 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/58 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/59 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/60 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/61 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/62 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/63 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/64 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/65 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/66 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/67 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/68 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/69 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/70 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/71 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/72 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/73 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/74 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/75 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/76 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/77 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/78 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/79 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/80 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/81 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/82 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/83 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/84 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/85 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/86 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/87 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/88 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/89 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/90 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/91 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/92 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/93 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/94 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/95 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/96 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/97 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/98 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/99 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/100 (39 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/101 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/102 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/103 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/104 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/105 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/106 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/107 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/108 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/109 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/110 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/111 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/112 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/113 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/114 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/115 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/116 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/117 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/118 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/119 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/120 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/121 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/122 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/123 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/124 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/125 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/126 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/127 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/128 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/129 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/130 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/131 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/132 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/133 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/134 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/135 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/136 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/137 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/138 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/139 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/140 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/141 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/142 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/143 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/144 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/145 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/146 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/147 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/148 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/149 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/150 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/151 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/152 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/153 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/154 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/155 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/156 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/157 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/158 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/159 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/160 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/161 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/162 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/163 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/164 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/165 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/166 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/167 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/168 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/169 (27 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/170 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/171 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/172 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/173 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/174 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/175 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/176 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/177 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/178 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/179 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/180 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/181 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/182 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/183 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/184 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/185 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/186 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/187 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/188 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/189 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/190 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/191 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/192 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/193 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/194 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/195 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/196 (33 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/197 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/198 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/199 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/200 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/201 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/202 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/203 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/204 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/205 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/206 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/207 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/208 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/209 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/210 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/211 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/212 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/213 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/214 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/215 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/216 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/217 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/218 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/219 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/220 (39 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/221 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/222 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/223 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/224 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/225 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/226 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/227 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/228 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/229 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/230 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/231 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/232 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/233 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/234 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/235 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/236 (33 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/237 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/238 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/239 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/0 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/1 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/2 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/3 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/4 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/6 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/7 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/9 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/10 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/11 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/12 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/13 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/14 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/15 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/16 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/17 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/18 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/19 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/20 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/21 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/22 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/23 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/24 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/25 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/26 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/27 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/28 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/29 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/30 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/31 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/32 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/33 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/34 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/35 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/36 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/37 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/38 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/39 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/40 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/41 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/42 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/43 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/44 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/45 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/46 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/47 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/48 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/49 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/50 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/51 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/52 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/53 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/54 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/55 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/56 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/57 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/58 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/59 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/60 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/61 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/62 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/63 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/64 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/65 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/66 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/67 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/68 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/69 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/70 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/71 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/72 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/73 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/74 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/75 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/76 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/77 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/78 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/79 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/80 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/81 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/82 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/83 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/84 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/85 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/86 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/87 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/88 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/89 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/90 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/91 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/92 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/93 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/94 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/95 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/96 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/97 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/98 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/99 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/100 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/101 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/102 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/103 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/104 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/105 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/106 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/107 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/108 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/109 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/110 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/111 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/112 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/113 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/114 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/115 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/116 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/117 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/118 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/119 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4a240030a793b60a55dc0903d5efa359e0850f087d000808c501bf4965d9b9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/120 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f47290030a03f8ccd5681d70dd03e2476857179b516297663ae85c59d6e84a6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/121 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2edf0030c986541630053e84beb962cd423a5ec4f54d0352ae4242693adf3e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/122 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2d2f00300c83d31e6074268e22af0f213aae7fde6a5b997448693b22d620bd... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/123 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fab390030288c9ba06a88bdce561728ab2fecc2f0b709514a647b702c7f05f8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/124 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f53cc00301067d018c6a9085c4721dc9b831f19a7fae7397637abbda87c97dc... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/125 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0fc30030eee48a40e41c753ae4d1e05dbd602c436c740c67616e9c3bfe727e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/126 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2faff8003034d5cb5f61f0d9540f76197255c0ee86e25764ebb3b6837938d49b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/127 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f56b00030a31cae05a8b5e80cece53b3c9c3243d9f65428c3356cfae4c96562... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/128 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f306c00308a8d3ba0017171bb4b8f4e943ce252912b6b3268d485413b674386... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/129 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f48f00030b915d97528bb29df8a32ec39f16ab2e1ff839a748e016d70082fd3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/130 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f65e000304619c8cfb61071fafda643e743f8076e66a84107a3b00cba383f44... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/131 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd6b30030d88d5fb5fdeb8df5fdc48c9c43128e3daa76e0ad64e4874d92ee6a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/132 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff0600030c5a61e33fc4b419869e9783b2199a7b3cf81e09413c029fa32287c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/133 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9f5f00309c75449aa2d68e3560ddc815a31b9aba3624e4e33709b7edd2092e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/134 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb5af00300ba40bc725c793068e3184f14f5ee7be1abdd644730e9920c66f4a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/135 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4e480030a77f0502a86d8df1aa3f81ea3fc6c7f1c4e00a80a1108d91ad828f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/136 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd1330030c1d632cecad727b600a9dbdd77027040bb2433f1ad4a27993d2e45... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/137 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe39b0030e83e492fb4e7bab38239a17aa26009af837e0abcce1ac6b0c2ee0a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/138 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff27400303b0cdccb5a9c5dcf4adabdf6d8370e151de9e2520436b38fac1fdd... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/139 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f39ac0030c79a5933ac9a20252dca6dbd41b2f4c39a2e0b7390793ba0b82545... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/140 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2e180030bac66cf36cb417ddf57e1886701f8ddf624b83c0ad7d7b51c726fc... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/141 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fccbe00308d66dc570860746f6099b158fd9310ce35e8ae2982639a41a0eacf... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/142 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9d6d0030551634766ee04c5de7d0caae0edbb372e8f557287bf9a99e1dbdb2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/143 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f86c800308d613dae8e63a9ab8654306f61fb6ac3fe6ea68a310d6dbc80e2b6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/144 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2d7a0030dd6cceaa68a2ce4354d4433dce6e5817c7d421e6ede4eeb8cae67b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/145 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f672b0030f9052a855afedc25a795e3fd45a16af0404da6a60e993e10a28ec0... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/146 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f737800309523b69531a8c54f7da8fdff399ca555053b4546a064575640d3fe... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/147 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff860003055f61e8056a2598abe8a120cbf84bcfdde7ddaacd9dcfb74acacde... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/148 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe8df003056e97bc76f6807edd707d183bd146636c074d884d83e03a562216e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/149 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f01c00030eb2f44cabcbda6a79f618a41202140364f460a57a007b18c82ac38... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/150 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f772e00301df000ed648c689d7fb9673ccdc91c5e19397c8a30b8f11177c213... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/151 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1aa90030726d4c4336b312c90c2866e93ed5422a77d282049c26346d3eaaad... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/152 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f41360030829d741ee1162af024ffe920ac4e190a9cefe1b0315632ad8affed... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/153 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f221a003049128de22be640bb19b7a4435a70a4d5f45d070c42920882ff7ba2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/154 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f193700305765f98fe007c078ce5dfe3d57133943f6e869e352077af6120387... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/155 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f24cd0030bf04936b3d5ab6ab410d8600401738c87840486c2fb76b36a7d2dc... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/156 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f748a0030e9b43315d82ae917e043a8459616d7a70c34371eabdba1efd7084b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/157 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f26ab0030ff967d723156adc7dc15611a861e243e2f9c58a0dbbcdc5b44ae3d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/158 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f906e00305b03652851110cf46d0dda7809f381dabad44da77254742072c23c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/159 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5db10030e7074519ef9c38c423ba3dc2efcb3ac3f58d6d6c2760e1d47980b1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/160 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe285003010ee57a5743a30f88abcd7e61436b5218ab258c7e10135e46a74a7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/161 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f31a900307bfa17ad5209d1c7301c6bd6c604e76c9f7a1a908c127505eecb6a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/162 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ffc4b003042dde1fdc06093dc6616a1780a7646bbc058eb6ad6656d7b5350f1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/163 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f980200300f54d44b3ed5733177f036d0ff818802ce86b16c30fbc8260c5d32... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/164 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8f7d0030f5a4b51380bd73c412c74c677cac6db6495e6fdd42a8658208bab7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/165 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f56890030167ba49b124476f2ea008a0e16848beff624b19eb11f6a9b98bf95... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/166 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fab6200303a82e8d67b4518f2e265e2ebcb7812265b24c262ddd3854c5b976a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/167 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6d760030e0f733390d304778e2d3091f5c1167d5301785e4800ef6e8765b07... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/168 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc8580030494b08b9f9cfb07527d717c869f360bbcaabda74c5368e51289767... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/169 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f12c30030554a943e8a2fb49d5060c0ab86725a8573917ab20580098d77c676... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/170 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa5ee0030d802c3158f01868ccaa4007505974cd38f3c0baf4e82eed4f6c9e9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/171 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f818f0030cb96fd573d5abb316d1e3039b2ccc19783353c1a8b7304439103f7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/172 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f85a80030eee7b892ec59e035459b47a734912817b9c907194236602a7be735... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/173 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8d20003073e32290448a81ddabe0c65d93c01f8fac4c0038134161ab328547... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/174 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f16610030fab4d63e9996067735a52d43d5bfb8563fce6b0e5b667a9aec2711... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/175 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd41100309de2f6deac98af3ea958b488d1074d577f7fab6e0c7a6aba82cc87... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/176 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f29e6003009b7e18b56b4fdfabd05621248011866b0079aaf5858cf89cbe212... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/177 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4cd70030b314ad387e1c291a8a20e8b84f98bbaa0ed53460992f6f14d6e697... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/178 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9db30030668f14c1437032135a7604fc4572efc5f51815db29a2ab8307d16c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/179 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fcc3f003088469b500f743dffe22d68a435987c2cb0e99f0f1a8f04ed7747c3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/180 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6c100030e3afd3eb1649fd51fbf4c93609132697d2a03c6d40751cf60bcb22... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/181 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f72d7003011788805d3d1a1793bdad9d790b6cd65ac13b35ad9eaff872cebf2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/182 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f30cb0030320e3497eac7e139b5a204ffd733ed79a31292ad0bef843cb24792... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/183 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc9a900301056a9605c37377851eaffbfebb1af2d90c71a5c372b4059459d59... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/184 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f37e4003063c21e73960982d11cc9cbfefd52b47b5e6467b3b540d6d82d7ff1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/185 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa75500305e6a67d5f73014ee709cc8f8e4e87b43094c85bf6579824dedab87... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/186 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f645b003000c0798a2e286ec6b32aeaafeda7ff117dc0ab27e0a1f8f525a447... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/187 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd8f60030ac71c7cc1058411f0d3c2cf1dd1b288309c0b9cad87a29dd89a360... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/188 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f252c00306f8c1fa2e9b9e94333c2eb80ea1d09672a53c859931390d71089e9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/189 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2b040030cb1388278ba16003f1b288e3ad8fb9773d93f95b014ad7e43fa4f1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/190 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fade80030145131806e3bc8ef76b5e5a544da9000198b01269d87fd5c92141a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/191 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7e08003026164c67deb7571a23b13170094a5619b54ea7b2cf543068b39a04... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/192 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2555003054fdc2e02e052156b063d09cf3d456c51a86d58cf7e20387d38509... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/193 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f27050030b441c0bd92e471db76a0c961f413fb05bc3079dfc363f2bfe75ba6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/194 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0b5c0030baa065b374c16c0483b020d6055b3999b0fec66b28a2f2fafc32e1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/195 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f11ed0030135f84ec90a4a64af4f64a774916be7fba7395752d40e52adc8e57... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/196 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3d22003074f541688bb44e117a610e73c583d724759d8a69844444314626ef... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/197 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fdca50030a4187401eb7c7e43cfd98e3d273b60fcee75feb503aaee86854475... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/198 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8391003034914f6544312c797aa20355888b8be39d4a66ff339d95f5ad4e28... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/199 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2facac0030d9b781cb99611fe1efeb55a6f5d3e3542f7e9ad5cc7125a03955ba... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/200 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb85c0030f08d49fabef3d0385035fc67f01a408be93443ab7237a9522fa41b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/201 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f22d8003020ebcf7675720be7a58fd63bae066eeb1f97e7822b837db4ef5bc8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/202 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f97e8003085da2943846f93404a25c2c0048f2da474c354f339b61ca87142c5... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/203 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f62b10030520209c193d45b2463fbd9e13f6595c5b364d7c332ba8a3521fd49... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/204 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9bb30030c6ddf5f4ed0aba8c80dfd8f0c9f97e420aa46261c57404bace6280... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/205 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb6110030703764ebeb53b6a93b510496a7b0b9ed855df036a8f2548fca2d4a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/206 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f984e0030c3cceecb62aa1425b2a24ae5b97e52d2faaed06155fe3e8e49cf62... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/207 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff03100308ded010589d6d1ded00b11e9242b852f25aea45688a02af4e14d0e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/208 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fdb9e0030314f1d58fa3a0fb96c78d96c458e8d0675e29c10658658f35b0eb2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/209 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff524003084f6306de15342669f9414dcb5d30610016a8486968afe47185943... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/210 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe67e0030a3b006ca13d1131470bd5228fbf6bc7bf0dac5a570abc1be6a2189... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/211 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7dfe0030d9ed88a438e094360be5ed5e2720c6e0b40c73bf4ae9cefe00c85d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/212 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0f950030fa91c59b65a3a8395b57b51a9387c2ac1d1c8efe849b058a6003bb... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/213 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa89d0030b94374827c025feddba14152df0644db1bca00aa7e97bd7eb619ba... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/214 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f50f30030076d12bd11381d5c844ca641e8793906e586f47b2ad868e2244b0b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/215 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f67c60030c2960431cb7d1eeb5ded1be1cafc4177853ad49cf56aeb0106eaeb... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/216 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f02a200308794767d3892354e64b8556d7c2e763471d3315d7fab302682a7d9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/217 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5c7800303545f2362d061e01c7256421895726b4b1bac6fffd852a93db25d7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/218 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc8460030642948cd77fefedbc092892f98c755216d88bfe22d211ec4d82da3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/219 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fafbb0030acbe63690af04a9e4918000eca03c8cd3197104d59e3f2213aa199... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/220 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0a3b0030c554d5c1753ddeeb6581f6f9aeb2503b9acad91da649da9dbaa738... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/221 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6a090030e03458d614f07ac142270a705b6dc3458fc3eee2f080a028892bf8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/222 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4c260030f287bdcf59dfccd162677685b257f7c0836941c7d25bfbcec9f022... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/223 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd6950030a826db715cf29b8524a5f1c03894e76d9facce62b6881f7653ad20... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/224 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc2b400307e5af0508b5430fc17a341e8175f8bcc24ddd1452be97c5cfb437c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/225 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc55a00301bfe67690f5341bed96b739ca54572462426645dac2a13caab24b6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/226 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6d46003032cf4390d39633482cda0ca035cab6dd5c62a2e5dd1d7ef5bcdc0f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/227 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f889800302d04b2046755f7e0c92966f5f8b0976b5ef5e8cac3c7ba1f9c2e96... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/228 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f43ed0030e30cc210797be85a5d2b21d2e1538917823fef7cd4a5b8f286129a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/229 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe1990030a3eef07e0f4803705828c9ae9180f6130172d22a203b1b39c5de6a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/230 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f53c2003049f53eae3196a149fa9695aa2aca1432587e3d8ef29a2ed2e787c4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/231 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fbb890030dcd0ae459e118831c810c17ce31eb641c0c1cff467989b5b0ab906... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/232 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f594b00301be8b1a533401171e92798c7a5e9b409f1ebc577310ac826af1f71... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/233 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ffb220030b7ca261e42b01895bc8c5913e9411e73ba5655440f8e76b498aee9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/234 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f76c80030c2e3866eeda968ba0efd342b7fcbf231844a51138f4380ef5e7360... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/235 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f31cd0030dded518b55b4cb5326d2971a6949da97bac33f2b126762b51188d5... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/236 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5ed80030a5b5118c834d46e7d37ad72f8f5f537095844544a881181a052ecb... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/237 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fdc700030052783f3510bfacee232a91c7728005646453881a65567aceb5e2f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/238 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f03bf0030032191f7f81c4751f233f165b28d7bf587849d5d337f482698e820... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/239 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 (1 ms) [----------] 960 tests from CipherSuiteTLS13/TlsCipherSuiteTest (11089 ms total) [----------] 72 tests from CipherSuiteTLS13AllGroups/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/0 (6 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/1 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/2 (20 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/3 (14 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/4 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/5 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/6 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/7 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/8 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/9 (6 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/10 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/11 (19 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/12 (15 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/13 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/14 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/15 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/16 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/17 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/0 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/1 (26 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/2 (44 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/3 (33 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/4 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/5 (38 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/6 (53 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/7 (94 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/8 (216 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/9 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/10 (26 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/11 (44 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/12 (34 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/13 (25 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/14 (38 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/15 (53 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/16 (94 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/17 (218 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/0 (6 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/1 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/2 (19 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/3 (15 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/4 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/5 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/6 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/7 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/8 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5d5c003002270a7d36854c4f02c7498e8fb634878fdbe8249f495b59c9d771... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/9 (6 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa2e80030cfa1b153752005573d1ba32933032c97d03be6fbf90ff23117fe2e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/10 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fabaa00305834c7daaea56e884eea8a9f08e2f46117b6b9806930384d549a71... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/11 (20 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f33a70030636c39be923603ab3427ca4839cb969007760f198193dd4c32621a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/12 (15 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f81110030097c7698ac5d34c48fb899a3c436afc616fd8900fc28c7ee80412f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/13 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1f91003022465427226de218c56b9beeeca849cafa019055414248ba08cb87... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/14 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f803e00300db45cc8a6a6ecdbaa343730877455a9e680eea6a3e7311d5a0c97... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/15 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f795a0030bbf5cea89a8335025190040f3574ee85d0dc1022e5582e8dfe337d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/16 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f642e0030e9950522fe1b5bd31bde685a8923ee20b7eeeae75c5721126347d8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/17 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 (1 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 (0 ms) [----------] 72 tests from CipherSuiteTLS13AllGroups/TlsCipherSuiteTest (2107 ms total) [----------] 8 tests from TestSecurityStatus/SecurityStatusTest [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/7 (4 ms) [----------] 8 tests from TestSecurityStatus/SecurityStatusTest (27 ms total) [----------] 72 tests from DamageYStream/TlsDamageDHYTest [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703019ab536809662b9320589c04f1c2aaab37645b3d6dd5e61abe1b1... record new: [1190] 0200005703019ab536809662b9320589c04f1c2aaab37645b3d6dd5e61abe1b1... server: Filtered packet: [1195] 16030104a60200005703019ab536809662b9320589c04f1c2aaab37645b3d6dd... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703018c251800dbf0caeb415b36b576eedb08fb7ff935f98a55001665... record new: [1190] 0200005703018c251800dbf0caeb415b36b576eedb08fb7ff935f98a55001665... server: Filtered packet: [1195] 16030104a60200005703018c251800dbf0caeb415b36b576eedb08fb7ff935f9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301c45bf64642e32939a569d6da7bb446b74250f0d26edbaddeee1b... record new: [1190] 020000570301c45bf64642e32939a569d6da7bb446b74250f0d26edbaddeee1b... server: Filtered packet: [1195] 16030104a6020000570301c45bf64642e32939a569d6da7bb446b74250f0d26e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703012c2bdc7738c6e786c6840573cadb0dce27ac829a965ad17cc2a8... record new: [1190] 0200005703012c2bdc7738c6e786c6840573cadb0dce27ac829a965ad17cc2a8... server: Filtered packet: [1195] 16030104a60200005703012c2bdc7738c6e786c6840573cadb0dce27ac829a96... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301be658f22c7cff1eec07cf0bc6f83e123973f6ec0aba3f3322069... record new: [1190] 020000570301be658f22c7cff1eec07cf0bc6f83e123973f6ec0aba3f3322069... server: Filtered packet: [1195] 16030104a6020000570301be658f22c7cff1eec07cf0bc6f83e123973f6ec0ab... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703015fa14a3234b88d4ac11864cc65fee0fe2e938626e9529c1ec2ec... record new: [1190] 0200005703015fa14a3234b88d4ac11864cc65fee0fe2e938626e9529c1ec2ec... server: Filtered packet: [1195] 16030104a60200005703015fa14a3234b88d4ac11864cc65fee0fe2e938626e9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301ed7dc8383e9485239adb5a10c66b1b3afb2a60a51b5aa9043e90... record new: [1190] 020000570301ed7dc8383e9485239adb5a10c66b1b3afb2a60a51b5aa9043e90... server: Filtered packet: [1195] 16030104a6020000570301ed7dc8383e9485239adb5a10c66b1b3afb2a60a51b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301eb69467fb114480a02cf710d4824354f815ecefa377fa3cccfc1... record new: [1190] 020000570301eb69467fb114480a02cf710d4824354f815ecefa377fa3cccfc1... server: Filtered packet: [1195] 16030104a6020000570301eb69467fb114480a02cf710d4824354f815ecefa37... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703012cf60219b342566c601dc726ca078b7d7caa63c67a18dc8677af... record new: [1191] 0200005703012cf60219b342566c601dc726ca078b7d7caa63c67a18dc8677af... server: Filtered packet: [1196] 16030104a70200005703012cf60219b342566c601dc726ca078b7d7caa63c67a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301b791655025d3eea70e27b40a168d5743c39cb7157e32e07e7a75... record new: [1191] 020000570301b791655025d3eea70e27b40a168d5743c39cb7157e32e07e7a75... server: Filtered packet: [1196] 16030104a7020000570301b791655025d3eea70e27b40a168d5743c39cb7157e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703010144d65f06d336f471dc36441ac3addf2ee3a718c3383137b5c5... record new: [1191] 0200005703010144d65f06d336f471dc36441ac3addf2ee3a718c3383137b5c5... server: Filtered packet: [1196] 16030104a70200005703010144d65f06d336f471dc36441ac3addf2ee3a718c3... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301c5a8c92f77b05cc4537c1199224c556fae333db0f44a3b10fcff... record new: [1191] 020000570301c5a8c92f77b05cc4537c1199224c556fae333db0f44a3b10fcff... server: Filtered packet: [1196] 16030104a7020000570301c5a8c92f77b05cc4537c1199224c556fae333db0f4... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030201b871e620e45749762d22beb1cbdf4f01244a13f4b9e5f69d62... record new: [1190] 02000057030201b871e620e45749762d22beb1cbdf4f01244a13f4b9e5f69d62... server: Filtered packet: [1195] 16030204a602000057030201b871e620e45749762d22beb1cbdf4f01244a13f4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302e9e71d6d08aeff407f4fab66d7478b14acd54610e596dd26267b... record new: [1190] 020000570302e9e71d6d08aeff407f4fab66d7478b14acd54610e596dd26267b... server: Filtered packet: [1195] 16030204a6020000570302e9e71d6d08aeff407f4fab66d7478b14acd54610e5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703028e01343f651c32a73dd51c7dc15acb2a0ca5806882d814afa502... record new: [1190] 0200005703028e01343f651c32a73dd51c7dc15acb2a0ca5806882d814afa502... server: Filtered packet: [1195] 16030204a60200005703028e01343f651c32a73dd51c7dc15acb2a0ca5806882... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302284d1951011cb2ef26ea14eee151f265bc3d75c1bbc77caafd34... record new: [1190] 020000570302284d1951011cb2ef26ea14eee151f265bc3d75c1bbc77caafd34... server: Filtered packet: [1195] 16030204a6020000570302284d1951011cb2ef26ea14eee151f265bc3d75c1bb... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030226e2f5f3ad143f58b77ec8dc51af72ae795b16b82f37210f7f63... record new: [1190] 02000057030226e2f5f3ad143f58b77ec8dc51af72ae795b16b82f37210f7f63... server: Filtered packet: [1195] 16030204a602000057030226e2f5f3ad143f58b77ec8dc51af72ae795b16b82f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030293a56bbf8a5ce89e7cedd4c6d81a619346fe04d6ace432a5fed9... record new: [1190] 02000057030293a56bbf8a5ce89e7cedd4c6d81a619346fe04d6ace432a5fed9... server: Filtered packet: [1195] 16030204a602000057030293a56bbf8a5ce89e7cedd4c6d81a619346fe04d6ac... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302000f11706a84c4fe777b79f434caab5badaa3b2d0bdb12e20b07... record new: [1190] 020000570302000f11706a84c4fe777b79f434caab5badaa3b2d0bdb12e20b07... server: Filtered packet: [1195] 16030204a6020000570302000f11706a84c4fe777b79f434caab5badaa3b2d0b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302a9330c5cac3bcef52b1155a20d4f8d92eb4bb55b7e50e8cb5443... record new: [1190] 020000570302a9330c5cac3bcef52b1155a20d4f8d92eb4bb55b7e50e8cb5443... server: Filtered packet: [1195] 16030204a6020000570302a9330c5cac3bcef52b1155a20d4f8d92eb4bb55b7e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030241be250d307c1d974f98cf867ab8b93d3c4faca050b7e2f7c2c7... record new: [1191] 02000057030241be250d307c1d974f98cf867ab8b93d3c4faca050b7e2f7c2c7... server: Filtered packet: [1196] 16030204a702000057030241be250d307c1d974f98cf867ab8b93d3c4faca050... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703024e59bb4f0c8933fe7fac9442d717a781ebadb6185afea0ad4705... record new: [1191] 0200005703024e59bb4f0c8933fe7fac9442d717a781ebadb6185afea0ad4705... server: Filtered packet: [1196] 16030204a70200005703024e59bb4f0c8933fe7fac9442d717a781ebadb6185a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030266d928cd2408a107eaff9c926fc4eedd12143329a6d076ece0fc... record new: [1191] 02000057030266d928cd2408a107eaff9c926fc4eedd12143329a6d076ece0fc... server: Filtered packet: [1196] 16030204a702000057030266d928cd2408a107eaff9c926fc4eedd12143329a6... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703022c85ff2f62d292e08e239dbc6ac49f2b90211e60b26d2948ba59... record new: [1191] 0200005703022c85ff2f62d292e08e239dbc6ac49f2b90211e60b26d2948ba59... server: Filtered packet: [1196] 16030204a70200005703022c85ff2f62d292e08e239dbc6ac49f2b90211e60b2... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303d08993d75fb90cf6775d46c5e410121a041dc2e282d4bc768eb7... record new: [1192] 020000570303d08993d75fb90cf6775d46c5e410121a041dc2e282d4bc768eb7... server: Filtered packet: [1197] 16030304a8020000570303d08993d75fb90cf6775d46c5e410121a041dc2e282... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303178a0a58fb5df1595f6e395967cfc299e5fd3d5d84f06badfa94... record new: [1192] 020000570303178a0a58fb5df1595f6e395967cfc299e5fd3d5d84f06badfa94... server: Filtered packet: [1197] 16030304a8020000570303178a0a58fb5df1595f6e395967cfc299e5fd3d5d84... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703031d05432236b03e80cfab1f275fe0f983f3c160bb8622a2054d1a... record new: [1192] 0200005703031d05432236b03e80cfab1f275fe0f983f3c160bb8622a2054d1a... server: Filtered packet: [1197] 16030304a80200005703031d05432236b03e80cfab1f275fe0f983f3c160bb86... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030350215728165d9a0a72df7a1d6a437ec0afd8df72e35b1793ebcd... record new: [1192] 02000057030350215728165d9a0a72df7a1d6a437ec0afd8df72e35b1793ebcd... server: Filtered packet: [1197] 16030304a802000057030350215728165d9a0a72df7a1d6a437ec0afd8df72e3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703034869a40775c1616e511e992d266066caa0b99bf806b9f5ae3cc2... record new: [1192] 0200005703034869a40775c1616e511e992d266066caa0b99bf806b9f5ae3cc2... server: Filtered packet: [1197] 16030304a80200005703034869a40775c1616e511e992d266066caa0b99bf806... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303ea3291c3bc4f7ecc249d1c17906b585ea6add2ebf99f9f6b5af1... record new: [1192] 020000570303ea3291c3bc4f7ecc249d1c17906b585ea6add2ebf99f9f6b5af1... server: Filtered packet: [1197] 16030304a8020000570303ea3291c3bc4f7ecc249d1c17906b585ea6add2ebf9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303ce866966b973d776769503cbf8053bc3fafb4db1cc5068125cfb... record new: [1192] 020000570303ce866966b973d776769503cbf8053bc3fafb4db1cc5068125cfb... server: Filtered packet: [1197] 16030304a8020000570303ce866966b973d776769503cbf8053bc3fafb4db1cc... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030330bf2a98642af581e5ea7950bbf58c727e674208f7338ab3dbd3... record new: [1192] 02000057030330bf2a98642af581e5ea7950bbf58c727e674208f7338ab3dbd3... server: Filtered packet: [1197] 16030304a802000057030330bf2a98642af581e5ea7950bbf58c727e674208f7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030388a7f4bd19a1bcfaaedba4ad38b32e387dd095768c34d048bef6... record new: [1193] 02000057030388a7f4bd19a1bcfaaedba4ad38b32e387dd095768c34d048bef6... server: Filtered packet: [1198] 16030304a902000057030388a7f4bd19a1bcfaaedba4ad38b32e387dd095768c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703039a5e80fde8ecb23e74027e2bdcf4400367c5ec3cb5a4d980a403... record new: [1193] 0200005703039a5e80fde8ecb23e74027e2bdcf4400367c5ec3cb5a4d980a403... server: Filtered packet: [1198] 16030304a90200005703039a5e80fde8ecb23e74027e2bdcf4400367c5ec3cb5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703034b61135ff85b364157b34f5ee7bdc458361f40462855cb491b9c... record new: [1193] 0200005703034b61135ff85b364157b34f5ee7bdc458361f40462855cb491b9c... server: Filtered packet: [1198] 16030304a90200005703034b61135ff85b364157b34f5ee7bdc458361f404628... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030398308121a20809928a7dfcad684b4c8e9ecb874ce69a29c4b52d... record new: [1193] 02000057030398308121a20809928a7dfcad684b4c8e9ecb874ce69a29c4b52d... server: Filtered packet: [1198] 16030304a902000057030398308121a20809928a7dfcad684b4c8e9ecb874ce6... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100830a6759f1482242a06b8c77e7d3c35fd3de08a840daccb649702c417e44... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100830a6759f1482242a06b8c77e7d3c35fd3de08a840daccb64970... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ad93af3ced99519f5eafcb315ea498e77e9c22921e1fd53f02bc1d0556f3... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100ad93af3ced99519f5eafcb315ea498e77e9c22921e1fd53f02bc... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d901312eb0b9ef746477c5261d048386eca45526fc8baa956b5c7a65cef1... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100d901312eb0b9ef746477c5261d048386eca45526fc8baa956b5c... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b8549b948c655018946f70ceb6b46aff387335242fc4d5adf57c252a573b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100b8549b948c655018946f70ceb6b46aff387335242fc4d5adf57c... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d08d9dbd84bf4106c0b2fb48e089e2bf2fb2568b80c24c015f4d874f41e1... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100d08d9dbd84bf4106c0b2fb48e089e2bf2fb2568b80c24c015f4d... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c848928065d1fdd2762ef9ef1ed70897548287795408f63f0532fbff3463... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100c848928065d1fdd2762ef9ef1ed70897548287795408f63f0532... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100437fff2e93c1e170e4b5cf6ccd6e2156d24a31ea7ba484cf2e374b87c263... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100437fff2e93c1e170e4b5cf6ccd6e2156d24a31ea7ba484cf2e37... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d8ab9c81c1327d2de0b5e162661cb35cbf15e64dc0fd051083e5fca46a51... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100d8ab9c81c1327d2de0b5e162661cb35cbf15e64dc0fd051083e5... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b893455e7512b3262c516a35a5ee11252889560bec841633efba80b177ba... handshake new: [259] 010101b893455e7512b3262c516a35a5ee11252889560bec841633efba80b177... record old: [262] 100001020100b893455e7512b3262c516a35a5ee11252889560bec841633efba... record new: [263] 10000103010101b893455e7512b3262c516a35a5ee11252889560bec841633ef... client: Filtered packet: [327] 160301010710000103010101b893455e7512b3262c516a35a5ee11252889560b... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100919247e4258d28f81f10c86afce0f921e95e391010a98958d20332a68c94... handshake new: [259] 010101919247e4258d28f81f10c86afce0f921e95e391010a98958d20332a68c... record old: [262] 100001020100919247e4258d28f81f10c86afce0f921e95e391010a98958d203... record new: [263] 10000103010101919247e4258d28f81f10c86afce0f921e95e391010a98958d2... client: Filtered packet: [327] 160301010710000103010101919247e4258d28f81f10c86afce0f921e95e3910... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007df78e3bd9caa32a26f4496de8d2366d9a20ad721920bdf1f01cb289da66... handshake new: [259] 0101007df78e3bd9caa32a26f4496de8d2366d9a20ad721920bdf1f01cb289da... record old: [262] 1000010201007df78e3bd9caa32a26f4496de8d2366d9a20ad721920bdf1f01c... record new: [263] 100001030101007df78e3bd9caa32a26f4496de8d2366d9a20ad721920bdf1f0... client: Filtered packet: [327] 1603010107100001030101007df78e3bd9caa32a26f4496de8d2366d9a20ad72... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (8 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ae3bb6fa1ce1ca0f82edb36d633e73d4da131504faa0d5324e37a9e79943... handshake new: [259] 010100ae3bb6fa1ce1ca0f82edb36d633e73d4da131504faa0d5324e37a9e799... record old: [262] 100001020100ae3bb6fa1ce1ca0f82edb36d633e73d4da131504faa0d5324e37... record new: [263] 10000103010100ae3bb6fa1ce1ca0f82edb36d633e73d4da131504faa0d5324e... client: Filtered packet: [327] 160301010710000103010100ae3bb6fa1ce1ca0f82edb36d633e73d4da131504... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (8 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100160b03211d6da3f13e9cae3d23ce0ee407626769dd3b43707c129b99a5cb... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100160b03211d6da3f13e9cae3d23ce0ee407626769dd3b43707c12... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010073a810de70fb0cd0c65212c708eb7dfebf0da80b963e893e5aff3a14f446... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010073a810de70fb0cd0c65212c708eb7dfebf0da80b963e893e5aff... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009f1de5bf1b2a828ec9bc22089f0bdd3c2dd54e9561b5988bd251969ea2ec... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201009f1de5bf1b2a828ec9bc22089f0bdd3c2dd54e9561b5988bd251... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003cf7a5763ff0bd5f8ed6d935442079e70ca4556535a607aa0ed391741521... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201003cf7a5763ff0bd5f8ed6d935442079e70ca4556535a607aa0ed3... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005421e2b560d8bf34fd36c49cbc83b3c1da7807f4c1c6a53a853f953ffd80... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201005421e2b560d8bf34fd36c49cbc83b3c1da7807f4c1c6a53a853f... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010043771accf6b3d8a33357686b4f441eb43a380527dc568fe4c4996fa1a5d8... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010043771accf6b3d8a33357686b4f441eb43a380527dc568fe4c499... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100905a22c90cd08d566fb435f782b317ed9193ebf9dc2d84180815c6d36827... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100905a22c90cd08d566fb435f782b317ed9193ebf9dc2d84180815... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100216503d4ea0f737106539a8c5db8c3a9cfc971b12370214f93aba062c5eb... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100216503d4ea0f737106539a8c5db8c3a9cfc971b12370214f93ab... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b65d0baf4b01896aae3813e48f61304cb41ac8b595de737612690f04e97b... handshake new: [259] 010101b65d0baf4b01896aae3813e48f61304cb41ac8b595de737612690f04e9... record old: [262] 100001020100b65d0baf4b01896aae3813e48f61304cb41ac8b595de73761269... record new: [263] 10000103010101b65d0baf4b01896aae3813e48f61304cb41ac8b595de737612... client: Filtered packet: [343] 160302010710000103010101b65d0baf4b01896aae3813e48f61304cb41ac8b5... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010044d22c0aa8a0908c3b6dc6deabfeba1d909cc31087a92d3cf9325444686e... handshake new: [259] 01010144d22c0aa8a0908c3b6dc6deabfeba1d909cc31087a92d3cf932544468... record old: [262] 10000102010044d22c0aa8a0908c3b6dc6deabfeba1d909cc31087a92d3cf932... record new: [263] 1000010301010144d22c0aa8a0908c3b6dc6deabfeba1d909cc31087a92d3cf9... client: Filtered packet: [343] 16030201071000010301010144d22c0aa8a0908c3b6dc6deabfeba1d909cc310... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010041eeffe2899cd03632dfbd7e6f248218f18e350017562cbbf4255e1b5a1c... handshake new: [259] 01010041eeffe2899cd03632dfbd7e6f248218f18e350017562cbbf4255e1b5a... record old: [262] 10000102010041eeffe2899cd03632dfbd7e6f248218f18e350017562cbbf425... record new: [263] 1000010301010041eeffe2899cd03632dfbd7e6f248218f18e350017562cbbf4... client: Filtered packet: [343] 16030201071000010301010041eeffe2899cd03632dfbd7e6f248218f18e3500... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005a2fcb17f1d8a66863bb31178a115b321eea317116360ac0bd5411c66d63... handshake new: [259] 0101005a2fcb17f1d8a66863bb31178a115b321eea317116360ac0bd5411c66d... record old: [262] 1000010201005a2fcb17f1d8a66863bb31178a115b321eea317116360ac0bd54... record new: [263] 100001030101005a2fcb17f1d8a66863bb31178a115b321eea317116360ac0bd... client: Filtered packet: [343] 1603020107100001030101005a2fcb17f1d8a66863bb31178a115b321eea3171... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (8 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100bcf9ea7c031fd66bbeb54a51ee61080c4b35955683ea34a2e1d3bb210aae... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100bcf9ea7c031fd66bbeb54a51ee61080c4b35955683ea34a2e1d3... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a6655efa246d478a65b6c069e4c41684727d1f4ef038921a2dd9844be59b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100a6655efa246d478a65b6c069e4c41684727d1f4ef038921a2dd9... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f69ce44db05d18e16f5d07a7fdd4fe1651f4c0a5d9a9f146c4c09c651915... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100f69ce44db05d18e16f5d07a7fdd4fe1651f4c0a5d9a9f146c4c0... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ad2a72f4288b1c6ffe527d069dffae25a985ba71bf8ef1564ac11af7faab... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100ad2a72f4288b1c6ffe527d069dffae25a985ba71bf8ef1564ac1... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001b90f078582580465f36cdcb2349a7398970f1fbcd15602681b7bb48036f... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201001b90f078582580465f36cdcb2349a7398970f1fbcd15602681b7... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010084de527632ce76151c0ec97e0c85090494534bcbd91b23b348ad2932c3fa... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010084de527632ce76151c0ec97e0c85090494534bcbd91b23b348ad... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100396e825b6237daba7c95e4340051e9e2ab0f6aff8c565d88e48fd6dc4262... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100396e825b6237daba7c95e4340051e9e2ab0f6aff8c565d88e48f... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d34d2634fdd19e095d109b3a74d5e3ea80f6063d538a26f9f0c300040595... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100d34d2634fdd19e095d109b3a74d5e3ea80f6063d538a26f9f0c3... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a5a8824baa754bf990a41528e1d8b5d125a3a6aca62c527ff00f3d1a0db7... handshake new: [259] 010101a5a8824baa754bf990a41528e1d8b5d125a3a6aca62c527ff00f3d1a0d... record old: [262] 100001020100a5a8824baa754bf990a41528e1d8b5d125a3a6aca62c527ff00f... record new: [263] 10000103010101a5a8824baa754bf990a41528e1d8b5d125a3a6aca62c527ff0... client: Filtered packet: [319] 160303010710000103010101a5a8824baa754bf990a41528e1d8b5d125a3a6ac... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010087d32c66ea86272ded8389a055e6736472d2ef10720cb4bf0feedcb10c1d... handshake new: [259] 01010187d32c66ea86272ded8389a055e6736472d2ef10720cb4bf0feedcb10c... record old: [262] 10000102010087d32c66ea86272ded8389a055e6736472d2ef10720cb4bf0fee... record new: [263] 1000010301010187d32c66ea86272ded8389a055e6736472d2ef10720cb4bf0f... client: Filtered packet: [319] 16030301071000010301010187d32c66ea86272ded8389a055e6736472d2ef10... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d6e79660501b30ac73224cd96fa5cad207c484642c5e39e7a5a1bd01fa1b... handshake new: [259] 010100d6e79660501b30ac73224cd96fa5cad207c484642c5e39e7a5a1bd01fa... record old: [262] 100001020100d6e79660501b30ac73224cd96fa5cad207c484642c5e39e7a5a1... record new: [263] 10000103010100d6e79660501b30ac73224cd96fa5cad207c484642c5e39e7a5... client: Filtered packet: [319] 160303010710000103010100d6e79660501b30ac73224cd96fa5cad207c48464... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (8 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a9f28cd96eabe3cfb55a49547c1f51ab16dd49010f1e7da328cec2d28c62... handshake new: [259] 010100a9f28cd96eabe3cfb55a49547c1f51ab16dd49010f1e7da328cec2d28c... record old: [262] 100001020100a9f28cd96eabe3cfb55a49547c1f51ab16dd49010f1e7da328ce... record new: [263] 10000103010100a9f28cd96eabe3cfb55a49547c1f51ab16dd49010f1e7da328... client: Filtered packet: [319] 160303010710000103010100a9f28cd96eabe3cfb55a49547c1f51ab16dd4901... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (7 ms) [----------] 72 tests from DamageYStream/TlsDamageDHYTest (409 ms total) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffd162f7ea69... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff7c1cd17c1a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff6989106140... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff856f42cbc4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffd2e3fa66ce... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff58a5d7aaf1... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff56dae7333c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffc76112ec8b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff6a5acb9830... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feffe83a7fa169... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feffca11bf513c... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feffcc6ff0c71a... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdda429b2522... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdc28a91b38b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdd9a6ffa840... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdab93889805... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd8040e97c0b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdbbcde8573c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefddbf8174c09... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd6a3bf7fe8e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefdac57d5a7a2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd2d97619f7b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd2e12553b29... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd759c39b175... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100cf91218143ec8b1a8d180de76b9af3162f0a4d9590c8e21ec1f91e8e29d5... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100cf91218143ec8b1a8d180de76b9af3162f0a... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100879619474d33c7b3583a9876aad32bc6ccb2db9676660eafc7ded0cccd59... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100879619474d33c7b3583a9876aad32bc6ccb2... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a5bdd5743870b67d3e6fd56007e76413442d8e33abe8d89ee1bc6c27d3e6... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100a5bdd5743870b67d3e6fd56007e76413442d... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b4c7a1e0beb0bd516288c794415655ba7c5b2e7c8f0f82c862d6f08ec271... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100b4c7a1e0beb0bd516288c794415655ba7c5b... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100aee3ab3d754c5013a5847d322ad086f1e7c30bf0ee76699f3f2c16dd4ed0... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100aee3ab3d754c5013a5847d322ad086f1e7c3... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d0febdf325c25a334bbef76ae376fa91a01da9f3e644156a9069eda38191... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100d0febdf325c25a334bbef76ae376fa91a01d... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100688cb0d212dbfeeec4d3917d6470afc5829f935a927d6b5188a04e9e822d... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100688cb0d212dbfeeec4d3917d6470afc5829f... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100022c5ef0ab36be5decef432f550a64603f02a432927bd40aa6f897cdd0fa... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100022c5ef0ab36be5decef432f550a64603f02... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010095ca4b526f7adcb980e0a371ee6886047b9cfc37144e2575f5c709c7934e... handshake new: [259] 01010195ca4b526f7adcb980e0a371ee6886047b9cfc37144e2575f5c709c793... record old: [270] 100001020001000000000102010095ca4b526f7adcb980e0a371ee6886047b9c... record new: [271] 10000103000100000000010301010195ca4b526f7adcb980e0a371ee6886047b... client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010195ca4b52... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100dd23386cfa6973699d4bd07a434db0936f742a9f95d53dfaf188481dca5a... handshake new: [259] 010101dd23386cfa6973699d4bd07a434db0936f742a9f95d53dfaf188481dca... record old: [270] 1000010200010000000001020100dd23386cfa6973699d4bd07a434db0936f74... record new: [271] 100001030001000000000103010101dd23386cfa6973699d4bd07a434db0936f... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101dd23386c... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010091641145b7255382c6a5ef205ce058c20c7f6996d3100fb50afa7e87ac7a... handshake new: [259] 01010091641145b7255382c6a5ef205ce058c20c7f6996d3100fb50afa7e87ac... record old: [270] 100001020001000000000102010091641145b7255382c6a5ef205ce058c20c7f... record new: [271] 10000103000100000000010301010091641145b7255382c6a5ef205ce058c20c... client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010091641145... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (8 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010060bd6f591adadd447dddb568e28e4ed62b8dbf5458466621b949d376d17f... handshake new: [259] 01010060bd6f591adadd447dddb568e28e4ed62b8dbf5458466621b949d376d1... record old: [270] 100001020001000000000102010060bd6f591adadd447dddb568e28e4ed62b8d... record new: [271] 10000103000100000000010301010060bd6f591adadd447dddb568e28e4ed62b... client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010060bd6f59... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (8 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010053a14d5336a01257cad11497961b4ceef126b78ff2966442174b769d6da8... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010053a14d5336a01257cad11497961b4ceef126... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e4fa67a896c4036b1b0d3b4aad62b8bc830147cb112e832cdc9397976cc8... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100e4fa67a896c4036b1b0d3b4aad62b8bc8301... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f25f49b760c9af50c81611a1cee860fdcfbf858e03a1554374ff01ad7034... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100f25f49b760c9af50c81611a1cee860fdcfbf... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010029098bbce5638f0c417821f3c6a0a36c701ebf6dd8835241071336298491... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010029098bbce5638f0c417821f3c6a0a36c701e... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100cc7b36ec99cb732ec00c73d1dc45433bdfa0b90054fcc0e2ae9bb69c9c6c... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100cc7b36ec99cb732ec00c73d1dc45433bdfa0... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f0f4b630b3cda27dd6a9c41511549b3c37274d384a8010bc38bd811e0ca1... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100f0f4b630b3cda27dd6a9c41511549b3c3727... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009d791d6a78c0fd4fac9ddfda6ef2abecb1ea850c65d15fe0bcd30e8ef28d... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201009d791d6a78c0fd4fac9ddfda6ef2abecb1ea... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f273ceb50aea99f760c72f7c8fef8edcbc9e007e03237617fa1350f114b4... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100f273ceb50aea99f760c72f7c8fef8edcbc9e... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e707de9ae1fcfb3ebf9f83cb8f8ccaba1e63c0ebe02a8025988f1a2d1440... handshake new: [259] 010101e707de9ae1fcfb3ebf9f83cb8f8ccaba1e63c0ebe02a8025988f1a2d14... record old: [270] 1000010200010000000001020100e707de9ae1fcfb3ebf9f83cb8f8ccaba1e63... record new: [271] 100001030001000000000103010101e707de9ae1fcfb3ebf9f83cb8f8ccaba1e... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101e707de9a... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010020d9230974618f94af67447d0a18363a2884923df98e9c4eafc78d218535... handshake new: [259] 01010120d9230974618f94af67447d0a18363a2884923df98e9c4eafc78d2185... record old: [270] 100001020001000000000102010020d9230974618f94af67447d0a18363a2884... record new: [271] 10000103000100000000010301010120d9230974618f94af67447d0a18363a28... client: Filtered packet: [359] 16fefd0000000000000001010f10000103000100000000010301010120d92309... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b61e910517deb8d8103590b3606f9ae66596a47e430a229e0ea4f30b32ce... handshake new: [259] 010100b61e910517deb8d8103590b3606f9ae66596a47e430a229e0ea4f30b32... record old: [270] 1000010200010000000001020100b61e910517deb8d8103590b3606f9ae66596... record new: [271] 100001030001000000000103010100b61e910517deb8d8103590b3606f9ae665... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010100b61e9105... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (8 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004ad9edb72ddb3a296e0b72bdab1c76074ee38716a77f5355223535824509... handshake new: [259] 0101004ad9edb72ddb3a296e0b72bdab1c76074ee38716a77f53552235358245... record old: [270] 10000102000100000000010201004ad9edb72ddb3a296e0b72bdab1c76074ee3... record new: [271] 1000010300010000000001030101004ad9edb72ddb3a296e0b72bdab1c76074e... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101004ad9edb7... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (8 ms) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (274 ms total) [----------] 14 tests from DatagramPre13/TlsConnectDatagramPre13 [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/0 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/1 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/0 (54 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/1 (54 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Drop packet client: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/0 (461 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Drop packet client: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/1 (461 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/0 (356 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/1 (358 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/0 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/1 (54 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/0 (356 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/1 (359 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/0 (357 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/1 (358 ms) [----------] 14 tests from DatagramPre13/TlsConnectDatagramPre13 (3394 ms total) [----------] 22 tests from DatagramDrop13/TlsDropDatagram13 [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 0:[187] 010000af00000000000000affefd6495701191937a2c1f2f6ee0bfa4f9769be6... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/0 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 0:[187] 010000af00000000000000affefd244dd4cdb69687978eeb754644cea641e132... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/1 (56 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd17f01e14a0ef3ecee337e467c089ab7dd047... record drop: DTLS 1.3 <46> 200000000faba:[65] 53d5c87b5b6a296126537cab6d9eb7b91deb57d4c65884ce81973e79df884b0d... record drop: DTLS 1.3 <46> 200000000eb55:[470] 2b14ec109de825fd86926c46c0c052d71a84f2179ca3d66da7346dc3bab8232d... record drop: DTLS 1.3 <46> 200000000e4ea:[161] 0f05b15ff5a9f3ebe41c7dae46f1b2206ee1f6020938c09711dad921eaced2eb... record drop: DTLS 1.3 <46> 200000000b819:[61] 8f15721ae5d6066ebadddf2963d6f408856006612054e84888044ddb720eb240... server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/0 (56 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd99b63ff2fa8f3926caaccb6593d368890172... record drop: DTLS 1.3 <46> 200000000179d:[65] 08f432ed18f4f887341a442046df1abf638863f2663cf7d68ac2883727053118... record drop: DTLS 1.3 <46> 200000000a498:[470] d664d9d6726e3e2bc94519d6c9feb212e7eac393c5fffe7c2201b2a93dfc89c6... record drop: DTLS 1.3 <46> 200000000e322:[161] 067d0648735a4cbcfe2225327f4d44042e2e977e104d98cbd626b346ae8b401a... record drop: DTLS 1.3 <46> 20000000067d2:[61] 1a7d1043a1dd8f6e5fe5695117ece74000fc1260387ca43220c943be5b65af21... server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/1 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd84a266ed3ae38b8bdecf53c8286225e435f3... server: Filtered packet: [777] 2e194c00414b3154f00ea32fd118ec7e5613f48ef54c6124752370b309fbe2b8... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/0 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefdb473d75e87fc974fe0b2e9b7d1b138ecf936... server: Filtered packet: [777] 2efcf80041503e6af5d94c353be1e242cdc531fe331dfae514dbec526461129c... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/1 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000001bc7:[65] dc676d4f6b41657dea434fd40ae181dbf31bc578ad79d21ca9b7c29fdc1eeea0... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefd60384c83c3... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000b3ee:[65] 56fdd9dd19b76bf65ca0bd75a456817f322fa2cb693def2552fa6645017b08d3... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefdb57173582e... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/1 (5 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED record drop: DTLS 1.3 <35> 300000000001a:[27] bd492839c38ddbc75546944693e9a3ca684730f30fa968f3205f9f server: Drop packet Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED record drop: DTLS 1.3 <47> 300000000d71a:[27] 65c168cf3441c461497bdf8df8622273d49e02bde70154c4b33db5 server: Drop packet Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/1 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000a3cf:[161] 82de42561a41f8eb67b72a65803ecbec1bbffbb24ee29de70867962ff214c744... client: Filtered packet: [547] 2e19ff01dc9e72c28f74385306b5cde3d56ae474585d6ecb398e711c9d420701... client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/0 (19 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000004e9d:[161] 2815740a383c6549d988907153b4a3a1a41a9ee85078fe0a37ccd52bf4b35afb... client: Filtered packet: [547] 2ecee801dc9aa42122159307a9e960959effc7daa4b5f2f3c1c8603d0e92d436... client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/1 (19 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000004b4e:[259] b2f947f9d283df0c458248c72bbfade68111aa8114eef02fc913f04521fd3327... server: Filtered packet: [181] 16fefd00000000000000000062020000560000000000000056fefd8666aca834... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/0 (5 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000da11:[259] 7d4ef5bbc31f82bd9f7f31d9407b80755fcac2d44eff9b1c6908411d785e3786... server: Filtered packet: [181] 16fefd00000000000000000062020000560000000000000056fefdfa241613cb... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/1 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000fd8e:[240] c84f8cc67da5eb0d414c4f660c6784bd0e3f9b56900dd164bbdc09cf6b2e421b... server: Filtered packet: [166] 2e01b400a1de10cba6cd1cfe1ab9c3069952d967466f092aadb8379998df414a... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000ccab:[240] bc053cf19b2ab8716f23a0da6c5cc3bf989c185fc4a7627694143eda9d244b95... server: Filtered packet: [166] 2ea78f00a1f9e08d30b6fb4b0cb25110177c74a45bc81f9af971608f9b72d61e... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/1 (5 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/0 (8 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/1 (8 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake record drop: DTLS 1.3 <46> 200000000326c:[69] 5bac18df3b4a6dff0fffa8b0f85e1cdbbda3fd3520dc9f720d2763100f74e414... server: Filtered packet: [183] 16fefd000000000000000000680200005c000000000000005cfefd0da04f9e8a... 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/0 (9 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake record drop: DTLS 1.3 <46> 2000000008cf7:[69] 33a20a9f696cd5da9441049aeba80a776812ec59aafa89df1334f360d14df370... server: Filtered packet: [183] 16fefd000000000000000000680200005c000000000000005cfefd1e8ab923f3... 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/1 (8 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000975c:[65] d5964e4d4226036046439f4f8b951cd3ab3353a9f8f3e151dbfb23e137781b54... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefd72697fc203... server: Send Direct [70] 2e975c0041d5964e4d4226036046439f4f8b951cd3ab3353a9f8f3e151dbfb23... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/0 (5 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000009f2e:[65] 70a958bbebe86b52eeca92e70b9b92557cb6ab0bde97bc035724be37d634f26d... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefd8d41619334... server: Send Direct [70] 2e9f2e004170a958bbebe86b52eeca92e70b9b92557cb6ab0bde97bc035724be... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/1 (4 ms) [----------] 22 tests from DatagramDrop13/TlsDropDatagram13 (447 ms total) [----------] 4 tests from DatagramFragment13/TlsFragmentationAndRecoveryTest [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000009e44:[470] 667ff2fc2e19853786915ebd57f091931270de988699d6bff2c46c3e21937158... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefd18d047e42a... record drop: DTLS 1.3 <46> 2000000008f55:[251] e21f580efe43141b79ea5306ff5be1e8688e08db1113a76eedb16f2c59053380... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000005 client: Drop packet record drop: DTLS 1.3 <46> 200000000a301:[177] 08413336543ff32ed63019f3663dcd99a9e56f65cf786c427e139361a4620358... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/0 (4 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 20000000092ab:[470] af3050c4bf14759c5906a7def7135d80384c188212a95bfe58b90bc643a09598... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefdfcc79d9023... record drop: DTLS 1.3 <46> 2000000004c55:[251] 58a8a7694b63c86a5c7028a42fe8ea582ff930fa7a3cc0b03c7f4e106e1fae71... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000005 client: Drop packet record drop: DTLS 1.3 <46> 2000000006113:[177] fbd4f255c995810ee63136d634a88574ae62febff168af1fb55357cabd3eeee1... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/1 (4 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000739b:[470] 9d2facc95532786fef5677e7889556559d88cc1bdfad41b8df8a638dadd0b7ca... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefd68287e5331... record drop: DTLS 1.3 <46> 2000000006a98:[248] de5376849035371102f9a1f95e673e63b39dcc5600e4a9f11351f61931ae8397... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000004 client: Drop packet record drop: DTLS 1.3 <46> 200000000c95e:[177] 82921acf212d6e67908c0ace9838bd052a27005199cd0c68ccadbfd741cf3695... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/0 (5 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000f756:[470] 55a60d66ef45b8fc2ee4657721ecc754066f11cdfac4e05000275d650fd0aff6... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefd2cb8336a61... record drop: DTLS 1.3 <46> 20000000066af:[248] d9979bc18c7c2100caec9416c74bcd9ebb76200ddaa9d2f43e48cf922b460407... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000004 client: Drop packet record drop: DTLS 1.3 <46> 200000000707d:[177] 80b0d956375a915cf8ac0ca5b06584602117e2c775b57ce9b472cf2144cea3ad... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/1 (4 ms) [----------] 4 tests from DatagramFragment13/TlsFragmentationAndRecoveryTest (18 ms total) [----------] 6 tests from DatagramReorder13/TlsReorderDatagram13 [ RUN ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd0f011604fe19bc3e99acc0ca38d591c145f6... record drop: DTLS 1.3 <46> 2000000003506:[65] 55fd361f05fcd3d24edb4bc0f9a6b5f45187c7804484f608f7aa18843781230e... record drop: DTLS 1.3 <46> 20000000014b5:[259] c1b547eb4ad66ed2580b0554527e58b2256173165e598cc811e163dc3d5a5263... server: Drop packet record drop: DTLS 1.3 <46> 20000000019d1:[240] 4ed98025dd3b3e2c888f72ff79e0382cc937221bd0e0908f2ad65d47e52e2fc6... record drop: DTLS 1.3 <46> 200000000a8eb:[161] 9d75326b1b63e3351c1f8d946320efcb690304422de7b3598bc37260d7bd56f6... server: Drop packet record drop: DTLS 1.3 <46> 2000000001f95:[61] 33c3ebc98c07e2caa232b91db0c571e0e53de8f532ea9d472652ec699a3745ea... server: Drop packet server: Send Direct [111] 16fefd00000000000000000062020000560000000000000056fefd0f011604fe... server: Send Direct [70] 2e3506004155fd361f05fcd3d24edb4bc0f9a6b5f45187c7804484f608f7aa18... server: Send Direct [245] 2e19d100f04ed98025dd3b3e2c888f72ff79e0382cc937221bd0e0908f2ad65d... server: Send Direct [264] 2e14b50103c1b547eb4ad66ed2580b0554527e58b2256173165e598cc811e163... server: Send Direct [166] 2ea8eb00a19d75326b1b63e3351c1f8d946320efcb690304422de7b3598bc372... server: Send Direct [66] 2e1f95003d33c3ebc98c07e2caa232b91db0c571e0e53de8f532ea9d472652ec... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/0 (5 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefdeebe3ce8bfaeb56fea224f2a93f4a5f98915... record drop: DTLS 1.3 <46> 2000000003438:[65] 77bf4eba26ddc5c7a80a157467206bab12a2529c73098c097f20a9fd49c094de... record drop: DTLS 1.3 <46> 2000000004b98:[259] 0aa93d2b1954c1e07b204d0aecaffa3aa81dce1fca5d7bef640d115c82587896... server: Drop packet record drop: DTLS 1.3 <46> 200000000a755:[240] a0506b9c9fbc69d2e48e041dc786d748c2ac0320b000350600a6960edbb5d0cd... record drop: DTLS 1.3 <46> 200000000d545:[161] 1d576cf234bd5ef20b4540ed269e9a9a8efc0e523f21f3086c79a9aa4f8cb318... server: Drop packet record drop: DTLS 1.3 <46> 20000000054e1:[61] 624b82cf809b62c0c109a82141467b80612f6348bf6bde22ce741918b3ede3b5... server: Drop packet server: Send Direct [111] 16fefd00000000000000000062020000560000000000000056fefdeebe3ce8bf... server: Send Direct [70] 2e3438004177bf4eba26ddc5c7a80a157467206bab12a2529c73098c097f20a9... server: Send Direct [245] 2ea75500f0a0506b9c9fbc69d2e48e041dc786d748c2ac0320b000350600a696... server: Send Direct [264] 2e4b9801030aa93d2b1954c1e07b204d0aecaffa3aa81dce1fca5d7bef640d11... server: Send Direct [166] 2ed54500a11d576cf234bd5ef20b4540ed269e9a9a8efc0e523f21f3086c79a9... server: Send Direct [66] 2e54e1003d624b82cf809b62c0c109a82141467b80612f6348bf6bde22ce7419... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/1 (4 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 100000000ee30:[23] b37927e0a78ddc6ccacef08ca90822f112be824d22c288 client: Drop packet record drop: DTLS 1.3 <45> 100000000324b:[29] ac9d62436616dc6da9c0a4eab9402803b8d26ed1482d4d0f9eb6404df3 record drop: DTLS 1.3 <46> 200000000891a:[61] b5de10e177f4774d318d072b3f9539088ad9ea1ac0d3a8ae9aba9ce1ec7918a8... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d324b001dac9d62436616dc6da9c0a4eab9402803b8d26ed1482d4d0f9eb640... client: Send Direct [28] 2dee300017b37927e0a78ddc6ccacef08ca90822f112be824d22c288 client: Send Direct [66] 2e891a003db5de10e177f4774d318d072b3f9539088ad9ea1ac0d3a8ae9aba9c... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/0 (9 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 1000000001082:[23] 6bd73f280f939a42088f932bdccdc69cbcb265c4e5e1f7 client: Drop packet record drop: DTLS 1.3 <45> 1000000007ee5:[29] cdd714822c69b524a4fe5178567ef9492c403615a288b5e6577943a513 record drop: DTLS 1.3 <46> 2000000008776:[61] d58f030e2fbb5a5018c3f24ec55483a10014cc63c142badb3697ae54a2084491... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d7ee5001dcdd714822c69b524a4fe5178567ef9492c403615a288b5e6577943... client: Send Direct [28] 2d108200176bd73f280f939a42088f932bdccdc69cbcb265c4e5e1f7 client: Send Direct [66] 2e8776003dd58f030e2fbb5a5018c3f24ec55483a10014cc63c142badb3697ae... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/1 (8 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 1000000007068:[23] 7c424df2be8b3a80a8272f96672ed3146d97897f8a3a49 client: Drop packet record drop: DTLS 1.3 <45> 100000000cd24:[29] 8548f32529d04a869a3ae923ec1447eedc2f2a1a764cf2f289b4c9a40f record drop: DTLS 1.3 <46> 200000000dda4:[61] d38bf06dd12ca47e6d5bd3d0121ca9d9378aa25c2329d8f298e66360eba4712f... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2dcd24001d8548f32529d04a869a3ae923ec1447eedc2f2a1a764cf2f289b4c9... client: Send Direct [66] 2edda4003dd38bf06dd12ca47e6d5bd3d0121ca9d9378aa25c2329d8f298e663... client: Send Direct [28] 2d706800177c424df2be8b3a80a8272f96672ed3146d97897f8a3a49 server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/0 (8 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 10000000030db:[23] 1792613120287d101b4bd6a7a43b30cacfa6dadefb5d73 client: Drop packet record drop: DTLS 1.3 <45> 1000000008b45:[29] 8f89025e21373c8adbb4e4c5d57b9ba148005773da542d249163289f6a record drop: DTLS 1.3 <46> 2000000006cd4:[61] 025c2c60c20990e48714034180a3c3f76991fbd8df9e1492af79836b5332b227... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d8b45001d8f89025e21373c8adbb4e4c5d57b9ba148005773da542d24916328... client: Send Direct [66] 2e6cd4003d025c2c60c20990e48714034180a3c3f76991fbd8df9e1492af7983... client: Send Direct [28] 2d30db00171792613120287d101b4bd6a7a43b30cacfa6dadefb5d73 server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/1 (9 ms) [----------] 6 tests from DatagramReorder13/TlsReorderDatagram13 (43 ms total) [----------] 24 tests from DatagramOnly/TlsConnectDatagram [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/1 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/2 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [794] 2cfefd00000000000000000004010203042ea46f0041740cd48cfb2d99b975ea... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/0 (54 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [698] 17fefd000000000000000000040102030416fefd000000000000000101c20b00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/1 (55 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [696] 17feff000000000000000000040102030416feff000000000000000101c20b00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/2 (54 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/0 (56 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/1 (55 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/2 (55 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [231] 16feff00000000000000000066010000b5000000000000005afefdbcbca52aef... client: Filtered packet: [66] 2e968f003da25ba0b86f21c7a4bf246d002494a2e99292f91e5be689cceb33af... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [72] 2f59700043171fdf5262b46d688631a88dd4f801ba54bb5b0ca19f9d63e630c6... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [24] 2f172b0013e7e3f9d908d1174340f97f2f32a91c0f6e386e client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [234] 16feff00000000000000000068010000b8000000000000005cfefdfda9fc931c... client: Filtered packet: [158] 16fefd0000000000000002001c100000210001000000000010205dc3e52c8ca4... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Filtered packet: [87] 17fefd0001000000000001004a00010000000000016dbf273f4b6c8111582c71... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [39] 15fefd0001000000000002001a00010000000000027935d695168427ffedc8a0... client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [164] 16feff00000000000000000045010000720000000000000039feff0e3e213b22... client: Filtered packet: [174] 16feff0000000000000002001c10000021000100000000001020361baf06c7ad... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Filtered packet: [109] 17feff00010000000000010060e97bb7325ea224dc740e54f739c6bd0b4ea65a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [61] 15feff00010000000000020030ab9bf2956444d9396a0856158cdde6502a167e... client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/2 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [913] 16fefd0000000000000000003702000056000000000000002bfefd16746e5a3a... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Filtered packet: [32] 2f2d93001b090d12bedd643da7aac2a475c1f19f4448c2806f12600d65912e5e Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Filtered packet: [72] 2fe4c70043da67b8425b53b36aff8f9c5b460e41fde1384ac2577cc9965f08df... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [874] 16fefd0000000000000000003a0200005d000000000000002efefd1f5cadd3e1... server: Filtered packet: [75] 14fefd000000000000000700010116fefd000100000000000000300001000000... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [87] 17fefd0001000000000001004a000100000000000130745a5d48ddd102f36e17... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/1 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [872] 16feff0000000000000000003a0200005d000000000000002efeff2a9f449b05... server: Filtered packet: [91] 14feff000000000000000700010116feff00010000000000000040bec0896e73... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [109] 17feff00010000000000010060883f95ed2494171d96139d187fe33dc5c8e70b... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/2 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/2 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/1 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/2 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/0 (5 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/1 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/2 (3 ms) [----------] 24 tests from DatagramOnly/TlsConnectDatagram (396 ms total) [----------] 4 tests from Datagram12Plus/TlsConnectDatagram12Plus [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/0 (4 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/1 (3 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/0 (4 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/1 (4 ms) [----------] 4 tests from Datagram12Plus/TlsConnectDatagram12Plus (15 ms total) [----------] 24 tests from KeyExchangeTest/TlsKeyExchangeTest [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 (17 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 (18 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/4 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/5 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 (18 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 (17 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/4 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/5 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 (17 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 (17 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/4 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/5 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/0 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/1 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/2 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/3 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/3 (5 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/4 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/4 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/5 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/5 (6 ms) [----------] 24 tests from KeyExchangeTest/TlsKeyExchangeTest (290 ms total) [----------] 36 tests from Pre13StreamOnly/TlsConnectStreamPre13 [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/0 (11 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/1 (11 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/2 (11 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 030177d15ac5badef90a07e493f35b1e8a3732054f621c3f582094f7b4688c35... handshake new: [93] 0301cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [713] 0200005d030177d15ac5badef90a07e493f35b1e8a3732054f621c3f582094f7... record new: [713] 0200005d0301cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [718] 16030102c90200005d0301cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0302189a46a698c0677ea986bd13a4860aae7af40346f46912510d750e135e37... handshake new: [93] 0302cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [713] 0200005d0302189a46a698c0677ea986bd13a4860aae7af40346f46912510d75... record new: [713] 0200005d0302cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [718] 16030202c90200005d0302cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03037a50ce1f50cf4d32ae396904cb82c21a8be25dee99c9d60f8ffc15c85354... handshake new: [93] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [715] 0200005d03037a50ce1f50cf4d32ae396904cb82c21a8be25dee99c9d60f8ffc... record new: [715] 0200005d0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [720] 16030302cb0200005d0303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [110] 160301002510000021201fd63ea61f2f87161b4150f5c94b0f675705eac0975d... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [126] 160302002510000021206e50583cc850d1f3eda7f72bec50caf99e095a74cb30... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [102] 16030300251000002120f31bdf322d6b920de2cc9be5da934b191814ea29c98b... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [68] 16030100041400000c1403010001011603010030bf0c1b7105e68db2c91a989a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTED to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [84] 16030200041400000c1403020001011603020040f00f37d263c9e91acc46013f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/1 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [60] 16030300041400000c140303000101160303002800000000000000006a4dfb2c... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/0 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/1 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/0 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/1 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/2 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/0 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/1 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00805f7d803b3e5cababdf5eb41f28582238d0cb3a51030680739b14b7faabfb... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 1000008200805f7d803b3e5cababdf5eb41f28582238d0cb3a51030680739b14... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080784299e33b54e262c5d0ff834cb23df038b46913d96cdcee27b44e6a8faa... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 100000820080784299e33b54e262c5d0ff834cb23df038b46913d96cdcee27b4... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080bc2a512be01d7e177e28d830b09e8e235f2056484daa665e87df538f2123... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 100000820080bc2a512be01d7e177e28d830b09e8e235f2056484daa665e87df... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 008089ff86de2a7c807d5f5d2462a2258fdd5deaf4fb7e50ebe6691544513add... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 10000082008089ff86de2a7c807d5f5d2462a2258fdd5deaf4fb7e50ebe66915... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 008049a18cc97c41e9db69397ba691ced7b7051454b0d712de4e0ca466afdf05... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 10000082008049a18cc97c41e9db69397ba691ced7b7051454b0d712de4e0ca4... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 (2 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080254ebac48d5e922980b949e156b539f91f56ef2feff793a25c13996554a5... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 100000820080254ebac48d5e922980b949e156b539f91f56ef2feff793a25c13... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 (3 ms) [----------] 36 tests from Pre13StreamOnly/TlsConnectStreamPre13 (150 ms total) [----------] 16 tests from KeyExchangeTest/TlsKeyExchangeTest13 [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/0 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/0 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/1 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/0 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/0 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/1 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/0 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/1 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/1 (8 ms) [----------] 16 tests from KeyExchangeTest/TlsKeyExchangeTest13 (119 ms total) [----------] 68 tests from ExtensionStream/TlsExtensionTestGeneric [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [180] 03037a81b762092b4e189e717eba13f7ba1a67991c527dcc148b951089bc227e... handshake new: [180] 03037a81b762092b4e189e717eba13f7ba1a67991c527dcc148b951089bc227e... record old: [184] 010000b403037a81b762092b4e189e717eba13f7ba1a67991c527dcc148b9510... record new: [184] 010000b403037a81b762092b4e189e717eba13f7ba1a67991c527dcc148b9510... client: Filtered packet: [189] 16030100b8010000b403037a81b762092b4e189e717eba13f7ba1a67991c527d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [187] 03030c350f2789392fc402005ecec419e2ff8d41cc8ff3120db97488256953a3... handshake new: [187] 03030c350f2789392fc402005ecec419e2ff8d41cc8ff3120db97488256953a3... record old: [191] 010000bb03030c350f2789392fc402005ecec419e2ff8d41cc8ff3120db97488... record new: [191] 010000bb03030c350f2789392fc402005ecec419e2ff8d41cc8ff3120db97488... client: Filtered packet: [196] 16030100bf010000bb03030c350f2789392fc402005ecec419e2ff8d41cc8ff3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [117] 030212c260b5a78a2f4b5b5170f92263c16ee455547a51029b123c61aca0bd07... handshake new: [117] 030212c260b5a78a2f4b5b5170f92263c16ee455547a51029b123c61aca0bd07... record old: [121] 01000075030212c260b5a78a2f4b5b5170f92263c16ee455547a51029b123c61... record new: [121] 01000075030212c260b5a78a2f4b5b5170f92263c16ee455547a51029b123c61... client: Filtered packet: [126] 160301007901000075030212c260b5a78a2f4b5b5170f92263c16ee455547a51... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [117] 03012634867e4170650c841726da731a290c10298c91db7bfffd01a694162b45... handshake new: [117] 03012634867e4170650c841726da731a290c10298c91db7bfffd01a694162b45... record old: [121] 0100007503012634867e4170650c841726da731a290c10298c91db7bfffd01a6... record new: [121] 0100007503012634867e4170650c841726da731a290c10298c91db7bfffd01a6... client: Filtered packet: [126] 16030100790100007503012634867e4170650c841726da731a290c10298c91db... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [180] 0303165223f848bb07b6a0c775f11de5e83470da094d07bcfe3eca6d17d7bd0f... handshake new: [180] 0303165223f848bb07b6a0c775f11de5e83470da094d07bcfe3eca6d17d7bd0f... record old: [184] 010000b40303165223f848bb07b6a0c775f11de5e83470da094d07bcfe3eca6d... record new: [184] 010000b40303165223f848bb07b6a0c775f11de5e83470da094d07bcfe3eca6d... client: Filtered packet: [189] 16030100b8010000b40303165223f848bb07b6a0c775f11de5e83470da094d07... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [187] 03038298cd0927e5be2fb773fc5ac9454c02c3255de72026f9c1bca9421d72af... handshake new: [187] 03038298cd0927e5be2fb773fc5ac9454c02c3255de72026f9c1bca9421d72af... record old: [191] 010000bb03038298cd0927e5be2fb773fc5ac9454c02c3255de72026f9c1bca9... record new: [191] 010000bb03038298cd0927e5be2fb773fc5ac9454c02c3255de72026f9c1bca9... client: Filtered packet: [196] 16030100bf010000bb03038298cd0927e5be2fb773fc5ac9454c02c3255de720... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [117] 030213ca2390deeea7a6e4c2cf722668d03ab0ecb89a60e692babd3be0ec1b2d... handshake new: [117] 030213ca2390deeea7a6e4c2cf722668d03ab0ecb89a60e692babd3be0ec1b2d... record old: [121] 01000075030213ca2390deeea7a6e4c2cf722668d03ab0ecb89a60e692babd3b... record new: [121] 01000075030213ca2390deeea7a6e4c2cf722668d03ab0ecb89a60e692babd3b... client: Filtered packet: [126] 160301007901000075030213ca2390deeea7a6e4c2cf722668d03ab0ecb89a60... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [117] 03017d88556269f1b41f43f5cc845fa74cdf6d9e9935bef021ed39af40b716c8... handshake new: [117] 03017d88556269f1b41f43f5cc845fa74cdf6d9e9935bef021ed39af40b716c8... record old: [121] 0100007503017d88556269f1b41f43f5cc845fa74cdf6d9e9935bef021ed39af... record new: [121] 0100007503017d88556269f1b41f43f5cc845fa74cdf6d9e9935bef021ed39af... client: Filtered packet: [126] 16030100790100007503017d88556269f1b41f43f5cc845fa74cdf6d9e9935be... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [180] 03038fe7c8061f0d51c21d16df7319e9c0f15f1309b6ee0ebe8a3ef879215d8f... handshake new: [176] 03038fe7c8061f0d51c21d16df7319e9c0f15f1309b6ee0ebe8a3ef879215d8f... record old: [184] 010000b403038fe7c8061f0d51c21d16df7319e9c0f15f1309b6ee0ebe8a3ef8... record new: [180] 010000b003038fe7c8061f0d51c21d16df7319e9c0f15f1309b6ee0ebe8a3ef8... client: Filtered packet: [185] 16030100b4010000b003038fe7c8061f0d51c21d16df7319e9c0f15f1309b6ee... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [187] 0303bf71739ed9b2bb2f666a5cfdb649ee8026cd280a386e2b0832b821fff589... handshake new: [183] 0303bf71739ed9b2bb2f666a5cfdb649ee8026cd280a386e2b0832b821fff589... record old: [191] 010000bb0303bf71739ed9b2bb2f666a5cfdb649ee8026cd280a386e2b0832b8... record new: [187] 010000b70303bf71739ed9b2bb2f666a5cfdb649ee8026cd280a386e2b0832b8... client: Filtered packet: [192] 16030100bb010000b70303bf71739ed9b2bb2f666a5cfdb649ee8026cd280a38... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [117] 0302b991471869025134bb29d3e98c491123d184fdf7d0618f4cca14c538113a... handshake new: [113] 0302b991471869025134bb29d3e98c491123d184fdf7d0618f4cca14c538113a... record old: [121] 010000750302b991471869025134bb29d3e98c491123d184fdf7d0618f4cca14... record new: [117] 010000710302b991471869025134bb29d3e98c491123d184fdf7d0618f4cca14... client: Filtered packet: [122] 1603010075010000710302b991471869025134bb29d3e98c491123d184fdf7d0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [117] 0301f9fca7fb6fb6a9691d215fa1236173712af473b37618ec5e994eb3ac16ff... handshake new: [113] 0301f9fca7fb6fb6a9691d215fa1236173712af473b37618ec5e994eb3ac16ff... record old: [121] 010000750301f9fca7fb6fb6a9691d215fa1236173712af473b37618ec5e994e... record new: [117] 010000710301f9fca7fb6fb6a9691d215fa1236173712af473b37618ec5e994e... client: Filtered packet: [122] 1603010075010000710301f9fca7fb6fb6a9691d215fa1236173712af473b376... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303aaf936fcfcb748a9dc4495e72492def249593d95580086dd2088b5d8309c... handshake new: [198] 0303aaf936fcfcb748a9dc4495e72492def249593d95580086dd2088b5d8309c... record old: [184] 010000b40303aaf936fcfcb748a9dc4495e72492def249593d95580086dd2088... record new: [202] 010000c60303aaf936fcfcb748a9dc4495e72492def249593d95580086dd2088... client: Filtered packet: [207] 16030100ca010000c60303aaf936fcfcb748a9dc4495e72492def249593d9558... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03035e6c777b073866008905cc9f0d8029ac7687fb5d1e303be66dad58e553c2... handshake new: [205] 03035e6c777b073866008905cc9f0d8029ac7687fb5d1e303be66dad58e553c2... record old: [191] 010000bb03035e6c777b073866008905cc9f0d8029ac7687fb5d1e303be66dad... record new: [209] 010000cd03035e6c777b073866008905cc9f0d8029ac7687fb5d1e303be66dad... client: Filtered packet: [214] 16030100d1010000cd03035e6c777b073866008905cc9f0d8029ac7687fb5d1e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0302199fc030e62d26e98a6d498a4d3e1040a052559b0ff1f8770c6a6c3566a1... handshake new: [135] 0302199fc030e62d26e98a6d498a4d3e1040a052559b0ff1f8770c6a6c3566a1... record old: [121] 010000750302199fc030e62d26e98a6d498a4d3e1040a052559b0ff1f8770c6a... record new: [139] 010000870302199fc030e62d26e98a6d498a4d3e1040a052559b0ff1f8770c6a... client: Filtered packet: [144] 160301008b010000870302199fc030e62d26e98a6d498a4d3e1040a052559b0f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0301ecd81c238cb999d2b3e5cbb67a3f3299831020c2e09fca7f632bebe2400e... handshake new: [135] 0301ecd81c238cb999d2b3e5cbb67a3f3299831020c2e09fca7f632bebe2400e... record old: [121] 010000750301ecd81c238cb999d2b3e5cbb67a3f3299831020c2e09fca7f632b... record new: [139] 010000870301ecd81c238cb999d2b3e5cbb67a3f3299831020c2e09fca7f632b... client: Filtered packet: [144] 160301008b010000870301ecd81c238cb999d2b3e5cbb67a3f3299831020c2e0... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [180] 030350a36c98b58a92aff87a4989d3987bdb5c62175db8bb1d09df7cf74a530a... handshake new: [186] 030350a36c98b58a92aff87a4989d3987bdb5c62175db8bb1d09df7cf74a530a... record old: [184] 010000b4030350a36c98b58a92aff87a4989d3987bdb5c62175db8bb1d09df7c... record new: [190] 010000ba030350a36c98b58a92aff87a4989d3987bdb5c62175db8bb1d09df7c... client: Filtered packet: [195] 16030100be010000ba030350a36c98b58a92aff87a4989d3987bdb5c62175db8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [187] 03032115d5359f1558e865cdcdf58cdab434184c069227678bb841741a05e3e4... handshake new: [193] 03032115d5359f1558e865cdcdf58cdab434184c069227678bb841741a05e3e4... record old: [191] 010000bb03032115d5359f1558e865cdcdf58cdab434184c069227678bb84174... record new: [197] 010000c103032115d5359f1558e865cdcdf58cdab434184c069227678bb84174... client: Filtered packet: [202] 16030100c5010000c103032115d5359f1558e865cdcdf58cdab434184c069227... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [117] 0302190056905d6a077cbcb7c550a48f36c65654028064f2e1ed4caa02b8005f... handshake new: [123] 0302190056905d6a077cbcb7c550a48f36c65654028064f2e1ed4caa02b8005f... record old: [121] 010000750302190056905d6a077cbcb7c550a48f36c65654028064f2e1ed4caa... record new: [127] 0100007b0302190056905d6a077cbcb7c550a48f36c65654028064f2e1ed4caa... client: Filtered packet: [132] 160301007f0100007b0302190056905d6a077cbcb7c550a48f36c65654028064... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [117] 030157c506d9b029a05064b40105754489198f89f34f70cd3899e83180390f65... handshake new: [123] 030157c506d9b029a05064b40105754489198f89f34f70cd3899e83180390f65... record old: [121] 01000075030157c506d9b029a05064b40105754489198f89f34f70cd3899e831... record new: [127] 0100007b030157c506d9b029a05064b40105754489198f89f34f70cd3899e831... client: Filtered packet: [132] 160301007f0100007b030157c506d9b029a05064b40105754489198f89f34f70... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [180] 0303ceb510f11a2286b5a40d639436592ddddaa110ec314074ca94a654ef7bd6... handshake new: [171] 0303ceb510f11a2286b5a40d639436592ddddaa110ec314074ca94a654ef7bd6... record old: [184] 010000b40303ceb510f11a2286b5a40d639436592ddddaa110ec314074ca94a6... record new: [175] 010000ab0303ceb510f11a2286b5a40d639436592ddddaa110ec314074ca94a6... client: Filtered packet: [180] 16030100af010000ab0303ceb510f11a2286b5a40d639436592ddddaa110ec31... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [187] 0303d5d312cb2a6a3ee40088b2ea6fb2d6f27bf470ae966a5f93c4a0945e33ee... handshake new: [178] 0303d5d312cb2a6a3ee40088b2ea6fb2d6f27bf470ae966a5f93c4a0945e33ee... record old: [191] 010000bb0303d5d312cb2a6a3ee40088b2ea6fb2d6f27bf470ae966a5f93c4a0... record new: [182] 010000b20303d5d312cb2a6a3ee40088b2ea6fb2d6f27bf470ae966a5f93c4a0... client: Filtered packet: [187] 16030100b6010000b20303d5d312cb2a6a3ee40088b2ea6fb2d6f27bf470ae96... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [117] 0302ebc5eaac470290c4c11f5c4d18a708310f779ea6c02d35ea2d8fc2444b7e... handshake new: [108] 0302ebc5eaac470290c4c11f5c4d18a708310f779ea6c02d35ea2d8fc2444b7e... record old: [121] 010000750302ebc5eaac470290c4c11f5c4d18a708310f779ea6c02d35ea2d8f... record new: [112] 0100006c0302ebc5eaac470290c4c11f5c4d18a708310f779ea6c02d35ea2d8f... client: Filtered packet: [117] 16030100700100006c0302ebc5eaac470290c4c11f5c4d18a708310f779ea6c0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [117] 0301142adcccf7b5f0972584792c4478d4a5d2b2098b06f9c409fef0cef83b2f... handshake new: [108] 0301142adcccf7b5f0972584792c4478d4a5d2b2098b06f9c409fef0cef83b2f... record old: [121] 010000750301142adcccf7b5f0972584792c4478d4a5d2b2098b06f9c409fef0... record new: [112] 0100006c0301142adcccf7b5f0972584792c4478d4a5d2b2098b06f9c409fef0... client: Filtered packet: [117] 16030100700100006c0301142adcccf7b5f0972584792c4478d4a5d2b2098b06... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [190] 030378c2385b5163e16607e4f18c7ae6d432dbbcb592dfac228de4b73e05716d... handshake new: [184] 030378c2385b5163e16607e4f18c7ae6d432dbbcb592dfac228de4b73e05716d... record old: [194] 010000be030378c2385b5163e16607e4f18c7ae6d432dbbcb592dfac228de4b7... record new: [188] 010000b8030378c2385b5163e16607e4f18c7ae6d432dbbcb592dfac228de4b7... client: Filtered packet: [193] 16030100bc010000b8030378c2385b5163e16607e4f18c7ae6d432dbbcb592df... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [197] 030396287b56a2aa7c7afc612d75cfa2c22f4dcd0844d669acc2953503cd323e... handshake new: [191] 030396287b56a2aa7c7afc612d75cfa2c22f4dcd0844d669acc2953503cd323e... record old: [201] 010000c5030396287b56a2aa7c7afc612d75cfa2c22f4dcd0844d669acc29535... record new: [195] 010000bf030396287b56a2aa7c7afc612d75cfa2c22f4dcd0844d669acc29535... client: Filtered packet: [200] 16030100c3010000bf030396287b56a2aa7c7afc612d75cfa2c22f4dcd0844d6... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [127] 0302e95b877fac1ce5b3c8170bd452bddbcb0227d99a220b9b18593cc34c1df9... handshake new: [121] 0302e95b877fac1ce5b3c8170bd452bddbcb0227d99a220b9b18593cc34c1df9... record old: [131] 0100007f0302e95b877fac1ce5b3c8170bd452bddbcb0227d99a220b9b18593c... record new: [125] 010000790302e95b877fac1ce5b3c8170bd452bddbcb0227d99a220b9b18593c... client: Filtered packet: [130] 160301007d010000790302e95b877fac1ce5b3c8170bd452bddbcb0227d99a22... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [127] 0301dc1e5532e7327194b1b31a2540082f5b00bcc6fc3b62f08e6ee78d75d34a... handshake new: [121] 0301dc1e5532e7327194b1b31a2540082f5b00bcc6fc3b62f08e6ee78d75d34a... record old: [131] 0100007f0301dc1e5532e7327194b1b31a2540082f5b00bcc6fc3b62f08e6ee7... record new: [125] 010000790301dc1e5532e7327194b1b31a2540082f5b00bcc6fc3b62f08e6ee7... client: Filtered packet: [130] 160301007d010000790301dc1e5532e7327194b1b31a2540082f5b00bcc6fc3b... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [190] 030320af6f7980d7203db3455c93eb62d3672b29fa51a3d3f60dca933885fc5a... handshake new: [186] 030320af6f7980d7203db3455c93eb62d3672b29fa51a3d3f60dca933885fc5a... record old: [194] 010000be030320af6f7980d7203db3455c93eb62d3672b29fa51a3d3f60dca93... record new: [190] 010000ba030320af6f7980d7203db3455c93eb62d3672b29fa51a3d3f60dca93... client: Filtered packet: [195] 16030100be010000ba030320af6f7980d7203db3455c93eb62d3672b29fa51a3... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [197] 030327233c9159469018083aec4bf8bbdb264d11f28e36d8170ecaad55f66f2e... handshake new: [193] 030327233c9159469018083aec4bf8bbdb264d11f28e36d8170ecaad55f66f2e... record old: [201] 010000c5030327233c9159469018083aec4bf8bbdb264d11f28e36d8170ecaad... record new: [197] 010000c1030327233c9159469018083aec4bf8bbdb264d11f28e36d8170ecaad... client: Filtered packet: [202] 16030100c5010000c1030327233c9159469018083aec4bf8bbdb264d11f28e36... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [127] 0302cef8c7ff5ada72768a284089d53dc3cbcec44fda954baeb12f5a80ddf738... handshake new: [123] 0302cef8c7ff5ada72768a284089d53dc3cbcec44fda954baeb12f5a80ddf738... record old: [131] 0100007f0302cef8c7ff5ada72768a284089d53dc3cbcec44fda954baeb12f5a... record new: [127] 0100007b0302cef8c7ff5ada72768a284089d53dc3cbcec44fda954baeb12f5a... client: Filtered packet: [132] 160301007f0100007b0302cef8c7ff5ada72768a284089d53dc3cbcec44fda95... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [127] 0301a613be1ace30f083a1665a4a11c065ee3cf6ae20fb7eb3c6d49ee89f5396... handshake new: [123] 0301a613be1ace30f083a1665a4a11c065ee3cf6ae20fb7eb3c6d49ee89f5396... record old: [131] 0100007f0301a613be1ace30f083a1665a4a11c065ee3cf6ae20fb7eb3c6d49e... record new: [127] 0100007b0301a613be1ace30f083a1665a4a11c065ee3cf6ae20fb7eb3c6d49e... client: Filtered packet: [132] 160301007f0100007b0301a613be1ace30f083a1665a4a11c065ee3cf6ae20fb... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [190] 0303efb4bb0531815b2661cd0adad10a03aa6433ad3c67cf9547f54f44c8de47... handshake new: [185] 0303efb4bb0531815b2661cd0adad10a03aa6433ad3c67cf9547f54f44c8de47... record old: [194] 010000be0303efb4bb0531815b2661cd0adad10a03aa6433ad3c67cf9547f54f... record new: [189] 010000b90303efb4bb0531815b2661cd0adad10a03aa6433ad3c67cf9547f54f... client: Filtered packet: [194] 16030100bd010000b90303efb4bb0531815b2661cd0adad10a03aa6433ad3c67... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [197] 03039c0fd1c7580a6ef524682fa3b1db93930d12e646c208160716ab99f8d2ea... handshake new: [192] 03039c0fd1c7580a6ef524682fa3b1db93930d12e646c208160716ab99f8d2ea... record old: [201] 010000c503039c0fd1c7580a6ef524682fa3b1db93930d12e646c208160716ab... record new: [196] 010000c003039c0fd1c7580a6ef524682fa3b1db93930d12e646c208160716ab... client: Filtered packet: [201] 16030100c4010000c003039c0fd1c7580a6ef524682fa3b1db93930d12e646c2... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [127] 0302a6e1df852562f3ecd427ed8fc06a189ce0fc6237e85f14647040c1127c37... handshake new: [122] 0302a6e1df852562f3ecd427ed8fc06a189ce0fc6237e85f14647040c1127c37... record old: [131] 0100007f0302a6e1df852562f3ecd427ed8fc06a189ce0fc6237e85f14647040... record new: [126] 0100007a0302a6e1df852562f3ecd427ed8fc06a189ce0fc6237e85f14647040... client: Filtered packet: [131] 160301007e0100007a0302a6e1df852562f3ecd427ed8fc06a189ce0fc6237e8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [127] 0301b6c21a0077f07e9b32b535cd1ec4269b414574a008d12e113463760a4012... handshake new: [122] 0301b6c21a0077f07e9b32b535cd1ec4269b414574a008d12e113463760a4012... record old: [131] 0100007f0301b6c21a0077f07e9b32b535cd1ec4269b414574a008d12e113463... record new: [126] 0100007a0301b6c21a0077f07e9b32b535cd1ec4269b414574a008d12e113463... client: Filtered packet: [131] 160301007e0100007a0301b6c21a0077f07e9b32b535cd1ec4269b414574a008... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [190] 03038168e748d441fdbd415e6d728163bfa4eae9c91e46ce8f7fe67abb1fd510... handshake new: [189] 03038168e748d441fdbd415e6d728163bfa4eae9c91e46ce8f7fe67abb1fd510... record old: [194] 010000be03038168e748d441fdbd415e6d728163bfa4eae9c91e46ce8f7fe67a... record new: [193] 010000bd03038168e748d441fdbd415e6d728163bfa4eae9c91e46ce8f7fe67a... client: Filtered packet: [198] 16030100c1010000bd03038168e748d441fdbd415e6d728163bfa4eae9c91e46... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [197] 0303aed4f61d77fad4fc72d1a9dc39e55acad8c238182d3ada2017abd8e741fa... handshake new: [196] 0303aed4f61d77fad4fc72d1a9dc39e55acad8c238182d3ada2017abd8e741fa... record old: [201] 010000c50303aed4f61d77fad4fc72d1a9dc39e55acad8c238182d3ada2017ab... record new: [200] 010000c40303aed4f61d77fad4fc72d1a9dc39e55acad8c238182d3ada2017ab... client: Filtered packet: [205] 16030100c8010000c40303aed4f61d77fad4fc72d1a9dc39e55acad8c238182d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [127] 0302ad360e2e734c62f825103d6d6ff113c0cdb2e7a2e7645c6b9a53ff706e0c... handshake new: [126] 0302ad360e2e734c62f825103d6d6ff113c0cdb2e7a2e7645c6b9a53ff706e0c... record old: [131] 0100007f0302ad360e2e734c62f825103d6d6ff113c0cdb2e7a2e7645c6b9a53... record new: [130] 0100007e0302ad360e2e734c62f825103d6d6ff113c0cdb2e7a2e7645c6b9a53... client: Filtered packet: [135] 16030100820100007e0302ad360e2e734c62f825103d6d6ff113c0cdb2e7a2e7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [127] 0301d6f29e4baf90d758c0a2031fd8f451496a9bac2834208a787675cae3a92f... handshake new: [126] 0301d6f29e4baf90d758c0a2031fd8f451496a9bac2834208a787675cae3a92f... record old: [131] 0100007f0301d6f29e4baf90d758c0a2031fd8f451496a9bac2834208a787675... record new: [130] 0100007e0301d6f29e4baf90d758c0a2031fd8f451496a9bac2834208a787675... client: Filtered packet: [135] 16030100820100007e0301d6f29e4baf90d758c0a2031fd8f451496a9bac2834... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [190] 0303f8fc652360c68822847aba122c847f9d94b7afa5188b1a254293e947694d... handshake new: [189] 0303f8fc652360c68822847aba122c847f9d94b7afa5188b1a254293e947694d... record old: [194] 010000be0303f8fc652360c68822847aba122c847f9d94b7afa5188b1a254293... record new: [193] 010000bd0303f8fc652360c68822847aba122c847f9d94b7afa5188b1a254293... client: Filtered packet: [198] 16030100c1010000bd0303f8fc652360c68822847aba122c847f9d94b7afa518... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [197] 0303138c59e9cf48a0fede4a027b6afa15c02a883893f958e4dc6b07472a3727... handshake new: [196] 0303138c59e9cf48a0fede4a027b6afa15c02a883893f958e4dc6b07472a3727... record old: [201] 010000c50303138c59e9cf48a0fede4a027b6afa15c02a883893f958e4dc6b07... record new: [200] 010000c40303138c59e9cf48a0fede4a027b6afa15c02a883893f958e4dc6b07... client: Filtered packet: [205] 16030100c8010000c40303138c59e9cf48a0fede4a027b6afa15c02a883893f9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [127] 0302c503162400b49d11cc721c6b1e03298b83543c93063130a01924df2f3e05... handshake new: [126] 0302c503162400b49d11cc721c6b1e03298b83543c93063130a01924df2f3e05... record old: [131] 0100007f0302c503162400b49d11cc721c6b1e03298b83543c93063130a01924... record new: [130] 0100007e0302c503162400b49d11cc721c6b1e03298b83543c93063130a01924... client: Filtered packet: [135] 16030100820100007e0302c503162400b49d11cc721c6b1e03298b83543c9306... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [127] 0301d290a9d2237685a1edb326fb4f8e32837953443aa045f9d0956f816846ba... handshake new: [126] 0301d290a9d2237685a1edb326fb4f8e32837953443aa045f9d0956f816846ba... record old: [131] 0100007f0301d290a9d2237685a1edb326fb4f8e32837953443aa045f9d0956f... record new: [130] 0100007e0301d290a9d2237685a1edb326fb4f8e32837953443aa045f9d0956f... client: Filtered packet: [135] 16030100820100007e0301d290a9d2237685a1edb326fb4f8e32837953443aa0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [190] 0303a722a759f8cbe229691e3e652dd4900fd86fafb99506e25b0bceaa5b22b5... handshake new: [189] 0303a722a759f8cbe229691e3e652dd4900fd86fafb99506e25b0bceaa5b22b5... record old: [194] 010000be0303a722a759f8cbe229691e3e652dd4900fd86fafb99506e25b0bce... record new: [193] 010000bd0303a722a759f8cbe229691e3e652dd4900fd86fafb99506e25b0bce... client: Filtered packet: [198] 16030100c1010000bd0303a722a759f8cbe229691e3e652dd4900fd86fafb995... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [197] 0303be28e8c3e8e26ca32b94cc4de9a4a9ad3b2dfa6bb9bbbd5662ca884dc4a2... handshake new: [196] 0303be28e8c3e8e26ca32b94cc4de9a4a9ad3b2dfa6bb9bbbd5662ca884dc4a2... record old: [201] 010000c50303be28e8c3e8e26ca32b94cc4de9a4a9ad3b2dfa6bb9bbbd5662ca... record new: [200] 010000c40303be28e8c3e8e26ca32b94cc4de9a4a9ad3b2dfa6bb9bbbd5662ca... client: Filtered packet: [205] 16030100c8010000c40303be28e8c3e8e26ca32b94cc4de9a4a9ad3b2dfa6bb9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [127] 0302f955421feeccf78eeefce10c34dccaa4d0631b7493285a21709572d75199... handshake new: [126] 0302f955421feeccf78eeefce10c34dccaa4d0631b7493285a21709572d75199... record old: [131] 0100007f0302f955421feeccf78eeefce10c34dccaa4d0631b7493285a217095... record new: [130] 0100007e0302f955421feeccf78eeefce10c34dccaa4d0631b7493285a217095... client: Filtered packet: [135] 16030100820100007e0302f955421feeccf78eeefce10c34dccaa4d0631b7493... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [127] 0301aa9f08e2f820db7862cf97d57a5cb6c7ee08d2d32169e4b371318e4ac329... handshake new: [126] 0301aa9f08e2f820db7862cf97d57a5cb6c7ee08d2d32169e4b371318e4ac329... record old: [131] 0100007f0301aa9f08e2f820db7862cf97d57a5cb6c7ee08d2d32169e4b37131... record new: [130] 0100007e0301aa9f08e2f820db7862cf97d57a5cb6c7ee08d2d32169e4b37131... client: Filtered packet: [135] 16030100820100007e0301aa9f08e2f820db7862cf97d57a5cb6c7ee08d2d321... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [180] 03038ef44cae4ad23a6b2c69cd133a46aa61de94099e80a8f88eb72420b59ed7... handshake new: [156] 03038ef44cae4ad23a6b2c69cd133a46aa61de94099e80a8f88eb72420b59ed7... record old: [184] 010000b403038ef44cae4ad23a6b2c69cd133a46aa61de94099e80a8f88eb724... record new: [160] 0100009c03038ef44cae4ad23a6b2c69cd133a46aa61de94099e80a8f88eb724... client: Filtered packet: [165] 16030100a00100009c03038ef44cae4ad23a6b2c69cd133a46aa61de94099e80... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [187] 030312483814d87683e2acd26a48c7c92d4a82a1d6dfe921549de2a9fc47c31a... handshake new: [173] 030312483814d87683e2acd26a48c7c92d4a82a1d6dfe921549de2a9fc47c31a... record old: [191] 010000bb030312483814d87683e2acd26a48c7c92d4a82a1d6dfe921549de2a9... record new: [177] 010000ad030312483814d87683e2acd26a48c7c92d4a82a1d6dfe921549de2a9... client: Filtered packet: [182] 16030100b1010000ad030312483814d87683e2acd26a48c7c92d4a82a1d6dfe9... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/1 (6 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 03026745b357ace1b410c865d018cbd2c13a993eb609dbda1995d5f081e1f025... handshake new: [103] 03026745b357ace1b410c865d018cbd2c13a993eb609dbda1995d5f081e1f025... record old: [121] 0100007503026745b357ace1b410c865d018cbd2c13a993eb609dbda1995d5f0... record new: [107] 0100006703026745b357ace1b410c865d018cbd2c13a993eb609dbda1995d5f0... client: Filtered packet: [112] 160301006b0100006703026745b357ace1b410c865d018cbd2c13a993eb609db... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/2 (7 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 03018239a53943f0911244b018fd9c0cfe467d7b716225ed7acab4d1a531a6c5... handshake new: [103] 03018239a53943f0911244b018fd9c0cfe467d7b716225ed7acab4d1a531a6c5... record old: [121] 0100007503018239a53943f0911244b018fd9c0cfe467d7b716225ed7acab4d1... record new: [107] 0100006703018239a53943f0911244b018fd9c0cfe467d7b716225ed7acab4d1... client: Filtered packet: [112] 160301006b0100006703018239a53943f0911244b018fd9c0cfe467d7b716225... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/3 (6 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [3] 000100 handshake old: [180] 0303edab6c8ef1b39bff437f754660706f1203677176e5a661e5c82fdbff1d7c... handshake new: [163] 0303edab6c8ef1b39bff437f754660706f1203677176e5a661e5c82fdbff1d7c... record old: [184] 010000b40303edab6c8ef1b39bff437f754660706f1203677176e5a661e5c82f... record new: [167] 010000a30303edab6c8ef1b39bff437f754660706f1203677176e5a661e5c82f... client: Filtered packet: [172] 16030100a7010000a30303edab6c8ef1b39bff437f754660706f1203677176e5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [187] 03032c0d69b8cf0b341681a896a1e073732eafdabdb2c227b703e70fd0cdd827... handshake new: [180] 03032c0d69b8cf0b341681a896a1e073732eafdabdb2c227b703e70fd0cdd827... record old: [191] 010000bb03032c0d69b8cf0b341681a896a1e073732eafdabdb2c227b703e70f... record new: [184] 010000b403032c0d69b8cf0b341681a896a1e073732eafdabdb2c227b703e70f... client: Filtered packet: [189] 16030100b8010000b403032c0d69b8cf0b341681a896a1e073732eafdabdb2c2... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [117] 03021e2c0d2b45ae4dcf60a527a2b979c98a7d6608306a0772d1e0560a104705... handshake new: [110] 03021e2c0d2b45ae4dcf60a527a2b979c98a7d6608306a0772d1e0560a104705... record old: [121] 0100007503021e2c0d2b45ae4dcf60a527a2b979c98a7d6608306a0772d1e056... record new: [114] 0100006e03021e2c0d2b45ae4dcf60a527a2b979c98a7d6608306a0772d1e056... client: Filtered packet: [119] 16030100720100006e03021e2c0d2b45ae4dcf60a527a2b979c98a7d6608306a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [117] 0301f26a22a5e1e02db4be7a95471bedaf147f2338afabcd68fd7a8bd0c499ba... handshake new: [110] 0301f26a22a5e1e02db4be7a95471bedaf147f2338afabcd68fd7a8bd0c499ba... record old: [121] 010000750301f26a22a5e1e02db4be7a95471bedaf147f2338afabcd68fd7a8b... record new: [114] 0100006e0301f26a22a5e1e02db4be7a95471bedaf147f2338afabcd68fd7a8b... client: Filtered packet: [119] 16030100720100006e0301f26a22a5e1e02db4be7a95471bedaf147f2338afab... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [4] 09990000 handshake old: [180] 0303e7cdaeeb7e8f8c90154185ece698dadfee823849e42d0b3e6bb690f5488b... handshake new: [164] 0303e7cdaeeb7e8f8c90154185ece698dadfee823849e42d0b3e6bb690f5488b... record old: [184] 010000b40303e7cdaeeb7e8f8c90154185ece698dadfee823849e42d0b3e6bb6... record new: [168] 010000a40303e7cdaeeb7e8f8c90154185ece698dadfee823849e42d0b3e6bb6... client: Filtered packet: [173] 16030100a8010000a40303e7cdaeeb7e8f8c90154185ece698dadfee823849e4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [187] 0303ef0ce411ef1cfa6613b1c6c2bfdc78201605f653abb13b8fe867eb13c457... handshake new: [181] 0303ef0ce411ef1cfa6613b1c6c2bfdc78201605f653abb13b8fe867eb13c457... record old: [191] 010000bb0303ef0ce411ef1cfa6613b1c6c2bfdc78201605f653abb13b8fe867... record new: [185] 010000b50303ef0ce411ef1cfa6613b1c6c2bfdc78201605f653abb13b8fe867... client: Filtered packet: [190] 16030100b9010000b50303ef0ce411ef1cfa6613b1c6c2bfdc78201605f653ab... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [117] 0302ecb37980e95c7be5688c13592efc5be58178df1143bb9fb3e5c893d30d45... handshake new: [111] 0302ecb37980e95c7be5688c13592efc5be58178df1143bb9fb3e5c893d30d45... record old: [121] 010000750302ecb37980e95c7be5688c13592efc5be58178df1143bb9fb3e5c8... record new: [115] 0100006f0302ecb37980e95c7be5688c13592efc5be58178df1143bb9fb3e5c8... client: Filtered packet: [120] 16030100730100006f0302ecb37980e95c7be5688c13592efc5be58178df1143... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [117] 03016530d5350446e9e11fec3877f418c021168f7be00c8a9786077bbf244a38... handshake new: [111] 03016530d5350446e9e11fec3877f418c021168f7be00c8a9786077bbf244a38... record old: [121] 0100007503016530d5350446e9e11fec3877f418c021168f7be00c8a9786077b... record new: [115] 0100006f03016530d5350446e9e11fec3877f418c021168f7be00c8a9786077b... client: Filtered packet: [120] 16030100730100006f03016530d5350446e9e11fec3877f418c021168f7be00c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [5] 0002000000 handshake old: [180] 030356b1a1e75f6a906c76c4db90b8b997eb88e11b09d9dd86121f5b68cef3f0... handshake new: [165] 030356b1a1e75f6a906c76c4db90b8b997eb88e11b09d9dd86121f5b68cef3f0... record old: [184] 010000b4030356b1a1e75f6a906c76c4db90b8b997eb88e11b09d9dd86121f5b... record new: [169] 010000a5030356b1a1e75f6a906c76c4db90b8b997eb88e11b09d9dd86121f5b... client: Filtered packet: [174] 16030100a9010000a5030356b1a1e75f6a906c76c4db90b8b997eb88e11b09d9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [187] 03034ecd3f0408716fcabb30d75937e3556c0e9458b4946edee5b71ac5057dee... handshake new: [182] 03034ecd3f0408716fcabb30d75937e3556c0e9458b4946edee5b71ac5057dee... record old: [191] 010000bb03034ecd3f0408716fcabb30d75937e3556c0e9458b4946edee5b71a... record new: [186] 010000b603034ecd3f0408716fcabb30d75937e3556c0e9458b4946edee5b71a... client: Filtered packet: [191] 16030100ba010000b603034ecd3f0408716fcabb30d75937e3556c0e9458b494... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [117] 0302f494397e3b9e399f8fd286ac852b2dcb76f9bf34d06f561fb4eec2533fd0... handshake new: [112] 0302f494397e3b9e399f8fd286ac852b2dcb76f9bf34d06f561fb4eec2533fd0... record old: [121] 010000750302f494397e3b9e399f8fd286ac852b2dcb76f9bf34d06f561fb4ee... record new: [116] 010000700302f494397e3b9e399f8fd286ac852b2dcb76f9bf34d06f561fb4ee... client: Filtered packet: [121] 1603010074010000700302f494397e3b9e399f8fd286ac852b2dcb76f9bf34d0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [117] 03014309da33c21579fe13914eb36df595f49d878c000e729719091319effa0b... handshake new: [112] 03014309da33c21579fe13914eb36df595f49d878c000e729719091319effa0b... record old: [121] 0100007503014309da33c21579fe13914eb36df595f49d878c000e7297190913... record new: [116] 0100007003014309da33c21579fe13914eb36df595f49d878c000e7297190913... client: Filtered packet: [121] 16030100740100007003014309da33c21579fe13914eb36df595f49d878c000e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 (3 ms) [----------] 68 tests from ExtensionStream/TlsExtensionTestGeneric (179 ms total) [----------] 51 tests from ExtensionDatagram/TlsExtensionTestGeneric [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [181] fefd613c4f590e5e92ec6a92d13e859b9248b6ab7322d49d9da094927f9fa500... handshake new: [181] fefd613c4f590e5e92ec6a92d13e859b9248b6ab7322d49d9da094927f9fa500... record old: [193] 010000b500000000000000b5fefd613c4f590e5e92ec6a92d13e859b9248b6ab... record new: [193] 010000b500000000000000b5fefd613c4f590e5e92ec6a92d13e859b9248b6ab... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefd613c4f590e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [184] fefd979b73550cd9bbd087f42e6f477a0a561901dfd9448392b2c4bfcc297b1a... handshake new: [184] fefd979b73550cd9bbd087f42e6f477a0a561901dfd9448392b2c4bfcc297b1a... record old: [196] 010000b800000000000000b8fefd979b73550cd9bbd087f42e6f477a0a561901... record new: [196] 010000b800000000000000b8fefd979b73550cd9bbd087f42e6f477a0a561901... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd979b73550c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [114] feffc1f1e87c54f1b49781b53400174b52084f050fc4cc8db56442e6526721a8... handshake new: [114] feffc1f1e87c54f1b49781b53400174b52084f050fc4cc8db56442e6526721a8... record old: [126] 010000720000000000000072feffc1f1e87c54f1b49781b53400174b52084f05... record new: [126] 010000720000000000000072feffc1f1e87c54f1b49781b53400174b52084f05... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feffc1f1e87c54... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [181] fefdc86cbd6a6b76ab8737c856a959e796f0fd1c1cb62d989310e6f5a8718d9d... handshake new: [181] fefdc86cbd6a6b76ab8737c856a959e796f0fd1c1cb62d989310e6f5a8718d9d... record old: [193] 010000b500000000000000b5fefdc86cbd6a6b76ab8737c856a959e796f0fd1c... record new: [193] 010000b500000000000000b5fefdc86cbd6a6b76ab8737c856a959e796f0fd1c... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefdc86cbd6a6b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [184] fefd359aa55ff19b9d133de9e7a9f3e6a52c048a68b5aa4dab62875b7bfa5c6f... handshake new: [184] fefd359aa55ff19b9d133de9e7a9f3e6a52c048a68b5aa4dab62875b7bfa5c6f... record old: [196] 010000b800000000000000b8fefd359aa55ff19b9d133de9e7a9f3e6a52c048a... record new: [196] 010000b800000000000000b8fefd359aa55ff19b9d133de9e7a9f3e6a52c048a... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd359aa55ff1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [114] fefff3077246f1936b344ce2a27b5039cf456707eb4038b4f44076c8b65be374... handshake new: [114] fefff3077246f1936b344ce2a27b5039cf456707eb4038b4f44076c8b65be374... record old: [126] 010000720000000000000072fefff3077246f1936b344ce2a27b5039cf456707... record new: [126] 010000720000000000000072fefff3077246f1936b344ce2a27b5039cf456707... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072fefff3077246f1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [181] fefdbc36d920ad2b0580fdfd9494eba5e5d92e4f774193e20c6046cb93bb22a8... handshake new: [177] fefdbc36d920ad2b0580fdfd9494eba5e5d92e4f774193e20c6046cb93bb22a8... record old: [193] 010000b500000000000000b5fefdbc36d920ad2b0580fdfd9494eba5e5d92e4f... record new: [189] 010000b100000000000000b1fefdbc36d920ad2b0580fdfd9494eba5e5d92e4f... client: Filtered packet: [202] 16feff000000000000000000bd010000b100000000000000b1fefdbc36d920ad... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [184] fefd4427c45ce148e96b2af83b3d470a8e0aeb4f6eb0647fe950371ca988aa4d... handshake new: [180] fefd4427c45ce148e96b2af83b3d470a8e0aeb4f6eb0647fe950371ca988aa4d... record old: [196] 010000b800000000000000b8fefd4427c45ce148e96b2af83b3d470a8e0aeb4f... record new: [192] 010000b400000000000000b4fefd4427c45ce148e96b2af83b3d470a8e0aeb4f... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefd4427c45ce1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [114] feff462dbd114d2e43288c711c339aa5832a2a8470a4608c396f9b79f7c0ed2b... handshake new: [110] feff462dbd114d2e43288c711c339aa5832a2a8470a4608c396f9b79f7c0ed2b... record old: [126] 010000720000000000000072feff462dbd114d2e43288c711c339aa5832a2a84... record new: [122] 0100006e000000000000006efeff462dbd114d2e43288c711c339aa5832a2a84... client: Filtered packet: [135] 16feff0000000000000000007a0100006e000000000000006efeff462dbd114d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd7d6376d1cc0d8f9ea9912fc59c7b050c0d01a9970833f476b7a4445da07e... handshake new: [199] fefd7d6376d1cc0d8f9ea9912fc59c7b050c0d01a9970833f476b7a4445da07e... record old: [193] 010000b500000000000000b5fefd7d6376d1cc0d8f9ea9912fc59c7b050c0d01... record new: [211] 010000c700000000000000c7fefd7d6376d1cc0d8f9ea9912fc59c7b050c0d01... client: Filtered packet: [224] 16feff000000000000000000d3010000c700000000000000c7fefd7d6376d1cc... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefde48933b528e71baf56c428ca4e81ac1d4dbc523836f3050ee0910c967bc1... handshake new: [202] fefde48933b528e71baf56c428ca4e81ac1d4dbc523836f3050ee0910c967bc1... record old: [196] 010000b800000000000000b8fefde48933b528e71baf56c428ca4e81ac1d4dbc... record new: [214] 010000ca00000000000000cafefde48933b528e71baf56c428ca4e81ac1d4dbc... client: Filtered packet: [227] 16feff000000000000000000d6010000ca00000000000000cafefde48933b528... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [114] feffdc66472c81a1a5a7bd2f1c4064357cc7efd46b63be5ddbd06a56df065626... handshake new: [132] feffdc66472c81a1a5a7bd2f1c4064357cc7efd46b63be5ddbd06a56df065626... record old: [126] 010000720000000000000072feffdc66472c81a1a5a7bd2f1c4064357cc7efd4... record new: [144] 010000840000000000000084feffdc66472c81a1a5a7bd2f1c4064357cc7efd4... client: Filtered packet: [157] 16feff00000000000000000090010000840000000000000084feffdc66472c81... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [181] fefd5873a329d12367ed7132087a055a4f8acffeab8c51aa4337cebd0b5eaeb4... handshake new: [187] fefd5873a329d12367ed7132087a055a4f8acffeab8c51aa4337cebd0b5eaeb4... record old: [193] 010000b500000000000000b5fefd5873a329d12367ed7132087a055a4f8acffe... record new: [199] 010000bb00000000000000bbfefd5873a329d12367ed7132087a055a4f8acffe... client: Filtered packet: [212] 16feff000000000000000000c7010000bb00000000000000bbfefd5873a329d1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [184] fefdd2278f275e3d58b8bffdb3ead2ecb1a4c200de6415bf74f9a948236f8396... handshake new: [190] fefdd2278f275e3d58b8bffdb3ead2ecb1a4c200de6415bf74f9a948236f8396... record old: [196] 010000b800000000000000b8fefdd2278f275e3d58b8bffdb3ead2ecb1a4c200... record new: [202] 010000be00000000000000befefdd2278f275e3d58b8bffdb3ead2ecb1a4c200... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefdd2278f275e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [114] feff58072a42313dc8b04143f0bee09146811f459c730bed5dd7d4f47e38a2ec... handshake new: [120] feff58072a42313dc8b04143f0bee09146811f459c730bed5dd7d4f47e38a2ec... record old: [126] 010000720000000000000072feff58072a42313dc8b04143f0bee09146811f45... record new: [132] 010000780000000000000078feff58072a42313dc8b04143f0bee09146811f45... client: Filtered packet: [145] 16feff00000000000000000084010000780000000000000078feff58072a4231... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [181] fefd92dc47edbf38376524c270155b7855afa9084c7013127a5b301883f5d473... handshake new: [172] fefd92dc47edbf38376524c270155b7855afa9084c7013127a5b301883f5d473... record old: [193] 010000b500000000000000b5fefd92dc47edbf38376524c270155b7855afa908... record new: [184] 010000ac00000000000000acfefd92dc47edbf38376524c270155b7855afa908... client: Filtered packet: [197] 16feff000000000000000000b8010000ac00000000000000acfefd92dc47edbf... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [184] fefdb265f5be9cbb76b63644c98ac37a8b6eb6433f88fb205f5b262cbe11e76d... handshake new: [175] fefdb265f5be9cbb76b63644c98ac37a8b6eb6433f88fb205f5b262cbe11e76d... record old: [196] 010000b800000000000000b8fefdb265f5be9cbb76b63644c98ac37a8b6eb643... record new: [187] 010000af00000000000000affefdb265f5be9cbb76b63644c98ac37a8b6eb643... client: Filtered packet: [200] 16feff000000000000000000bb010000af00000000000000affefdb265f5be9c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [114] feff6735a7bae99293cab81d0862b3a37eaea66a4c2a71ca6d2992e63b1c998a... handshake new: [105] feff6735a7bae99293cab81d0862b3a37eaea66a4c2a71ca6d2992e63b1c998a... record old: [126] 010000720000000000000072feff6735a7bae99293cab81d0862b3a37eaea66a... record new: [117] 010000690000000000000069feff6735a7bae99293cab81d0862b3a37eaea66a... client: Filtered packet: [130] 16feff00000000000000000075010000690000000000000069feff6735a7bae9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [191] fefdc1c5858e12b1329ed56b77fa856b8e4829f5a4296c4bc0172bebb3093a82... handshake new: [185] fefdc1c5858e12b1329ed56b77fa856b8e4829f5a4296c4bc0172bebb3093a82... record old: [203] 010000bf00000000000000bffefdc1c5858e12b1329ed56b77fa856b8e4829f5... record new: [197] 010000b900000000000000b9fefdc1c5858e12b1329ed56b77fa856b8e4829f5... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefdc1c5858e12... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [194] fefd387a150784f195ad439e08f744cc82509f95b4e96ff3ba5aff97dd88c34c... handshake new: [188] fefd387a150784f195ad439e08f744cc82509f95b4e96ff3ba5aff97dd88c34c... record old: [206] 010000c200000000000000c2fefd387a150784f195ad439e08f744cc82509f95... record new: [200] 010000bc00000000000000bcfefd387a150784f195ad439e08f744cc82509f95... client: Filtered packet: [213] 16feff000000000000000000c8010000bc00000000000000bcfefd387a150784... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [124] feff765e43de9b7cfc81b6a00bfa55ae88cba7c90512a6022620e514724b4a14... handshake new: [118] feff765e43de9b7cfc81b6a00bfa55ae88cba7c90512a6022620e514724b4a14... record old: [136] 0100007c000000000000007cfeff765e43de9b7cfc81b6a00bfa55ae88cba7c9... record new: [130] 010000760000000000000076feff765e43de9b7cfc81b6a00bfa55ae88cba7c9... client: Filtered packet: [143] 16feff00000000000000000082010000760000000000000076feff765e43de9b... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [191] fefd39a364b063df2e78916c87aa71e736ef18c29b3e3b0c38b2458afe23a9ad... handshake new: [187] fefd39a364b063df2e78916c87aa71e736ef18c29b3e3b0c38b2458afe23a9ad... record old: [203] 010000bf00000000000000bffefd39a364b063df2e78916c87aa71e736ef18c2... record new: [199] 010000bb00000000000000bbfefd39a364b063df2e78916c87aa71e736ef18c2... client: Filtered packet: [212] 16feff000000000000000000c7010000bb00000000000000bbfefd39a364b063... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [194] fefd73d5358f7cbbb6696e140bf39874294160850775722402eadffb748f0a26... handshake new: [190] fefd73d5358f7cbbb6696e140bf39874294160850775722402eadffb748f0a26... record old: [206] 010000c200000000000000c2fefd73d5358f7cbbb6696e140bf3987429416085... record new: [202] 010000be00000000000000befefd73d5358f7cbbb6696e140bf3987429416085... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefd73d5358f7c... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [124] feffe09b4b4ca7bc509c59d7e3594f2c81742fd191edc2abe2b7480ebff7d7e0... handshake new: [120] feffe09b4b4ca7bc509c59d7e3594f2c81742fd191edc2abe2b7480ebff7d7e0... record old: [136] 0100007c000000000000007cfeffe09b4b4ca7bc509c59d7e3594f2c81742fd1... record new: [132] 010000780000000000000078feffe09b4b4ca7bc509c59d7e3594f2c81742fd1... client: Filtered packet: [145] 16feff00000000000000000084010000780000000000000078feffe09b4b4ca7... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [191] fefd46db6c2a3b24a1f800c90eab748bd391d69c28c55a87176f09fc0a37c832... handshake new: [186] fefd46db6c2a3b24a1f800c90eab748bd391d69c28c55a87176f09fc0a37c832... record old: [203] 010000bf00000000000000bffefd46db6c2a3b24a1f800c90eab748bd391d69c... record new: [198] 010000ba00000000000000bafefd46db6c2a3b24a1f800c90eab748bd391d69c... client: Filtered packet: [211] 16feff000000000000000000c6010000ba00000000000000bafefd46db6c2a3b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [194] fefde89143d4d1606e36808cd92c5060ede726e1f4ff1ad7c4094d5bb71683a3... handshake new: [189] fefde89143d4d1606e36808cd92c5060ede726e1f4ff1ad7c4094d5bb71683a3... record old: [206] 010000c200000000000000c2fefde89143d4d1606e36808cd92c5060ede726e1... record new: [201] 010000bd00000000000000bdfefde89143d4d1606e36808cd92c5060ede726e1... client: Filtered packet: [214] 16feff000000000000000000c9010000bd00000000000000bdfefde89143d4d1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [124] feff95202e5110ab5cd1762cb1b8db8f868f9e94ed7afdd76e68b757a86f3001... handshake new: [119] feff95202e5110ab5cd1762cb1b8db8f868f9e94ed7afdd76e68b757a86f3001... record old: [136] 0100007c000000000000007cfeff95202e5110ab5cd1762cb1b8db8f868f9e94... record new: [131] 010000770000000000000077feff95202e5110ab5cd1762cb1b8db8f868f9e94... client: Filtered packet: [144] 16feff00000000000000000083010000770000000000000077feff95202e5110... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [191] fefd985b0edb2fb5fce7e61c64316c3da1c56bd617d788b7cc1eae0c99e634ee... handshake new: [190] fefd985b0edb2fb5fce7e61c64316c3da1c56bd617d788b7cc1eae0c99e634ee... record old: [203] 010000bf00000000000000bffefd985b0edb2fb5fce7e61c64316c3da1c56bd6... record new: [202] 010000be00000000000000befefd985b0edb2fb5fce7e61c64316c3da1c56bd6... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefd985b0edb2f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [194] fefde2f38b3ae888b20f082f7acab83590d5a93b2a462ad761a8377433c6376e... handshake new: [193] fefde2f38b3ae888b20f082f7acab83590d5a93b2a462ad761a8377433c6376e... record old: [206] 010000c200000000000000c2fefde2f38b3ae888b20f082f7acab83590d5a93b... record new: [205] 010000c100000000000000c1fefde2f38b3ae888b20f082f7acab83590d5a93b... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefde2f38b3ae8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [124] feff21bb9970d69e77531751dca76c039e76e133ce4df507f826568fb88cb55c... handshake new: [123] feff21bb9970d69e77531751dca76c039e76e133ce4df507f826568fb88cb55c... record old: [136] 0100007c000000000000007cfeff21bb9970d69e77531751dca76c039e76e133... record new: [135] 0100007b000000000000007bfeff21bb9970d69e77531751dca76c039e76e133... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeff21bb9970d6... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [191] fefded1476e9b4c3a893142b1986ae7be680949432918d5c9c29592e404ebb72... handshake new: [190] fefded1476e9b4c3a893142b1986ae7be680949432918d5c9c29592e404ebb72... record old: [203] 010000bf00000000000000bffefded1476e9b4c3a893142b1986ae7be6809494... record new: [202] 010000be00000000000000befefded1476e9b4c3a893142b1986ae7be6809494... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefded1476e9b4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [194] fefd6f1b13d4305a01242c48baebb963621f3a44cd6c6a09dee0816a0711dbe3... handshake new: [193] fefd6f1b13d4305a01242c48baebb963621f3a44cd6c6a09dee0816a0711dbe3... record old: [206] 010000c200000000000000c2fefd6f1b13d4305a01242c48baebb963621f3a44... record new: [205] 010000c100000000000000c1fefd6f1b13d4305a01242c48baebb963621f3a44... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefd6f1b13d430... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [124] feff5c385d018e105efcf0567bb2cac7017bbb5fa0fa80ea1e688e7b90ec6e92... handshake new: [123] feff5c385d018e105efcf0567bb2cac7017bbb5fa0fa80ea1e688e7b90ec6e92... record old: [136] 0100007c000000000000007cfeff5c385d018e105efcf0567bb2cac7017bbb5f... record new: [135] 0100007b000000000000007bfeff5c385d018e105efcf0567bb2cac7017bbb5f... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeff5c385d018e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [191] fefd565e4c53cac617dc9ca8057682ecf73e304bc0710ea60c4e1ccf891b9890... handshake new: [190] fefd565e4c53cac617dc9ca8057682ecf73e304bc0710ea60c4e1ccf891b9890... record old: [203] 010000bf00000000000000bffefd565e4c53cac617dc9ca8057682ecf73e304b... record new: [202] 010000be00000000000000befefd565e4c53cac617dc9ca8057682ecf73e304b... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefd565e4c53ca... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [194] fefdec6fe3ffaa2dfe0693f03bc5cbcef0ab7e7c2fb60fccb33586799023ba8d... handshake new: [193] fefdec6fe3ffaa2dfe0693f03bc5cbcef0ab7e7c2fb60fccb33586799023ba8d... record old: [206] 010000c200000000000000c2fefdec6fe3ffaa2dfe0693f03bc5cbcef0ab7e7c... record new: [205] 010000c100000000000000c1fefdec6fe3ffaa2dfe0693f03bc5cbcef0ab7e7c... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefdec6fe3ffaa... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [124] feffdeefb1ebfc871cfbcfaaf224e579aa669c15766841157ac88ca206011094... handshake new: [123] feffdeefb1ebfc871cfbcfaaf224e579aa669c15766841157ac88ca206011094... record old: [136] 0100007c000000000000007cfeffdeefb1ebfc871cfbcfaaf224e579aa669c15... record new: [135] 0100007b000000000000007bfeffdeefb1ebfc871cfbcfaaf224e579aa669c15... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeffdeefb1ebfc... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [181] fefd8ba26fd1ea6e5607041ca931f94be0e46001b314f413ec42d0e9fb886d03... handshake new: [157] fefd8ba26fd1ea6e5607041ca931f94be0e46001b314f413ec42d0e9fb886d03... record old: [193] 010000b500000000000000b5fefd8ba26fd1ea6e5607041ca931f94be0e46001... record new: [169] 0100009d000000000000009dfefd8ba26fd1ea6e5607041ca931f94be0e46001... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefd8ba26fd1ea... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [184] fefd7ee481a3d7e7d88548e0327bd36f1aa44379b95d6ac4c664d3739d65380e... handshake new: [170] fefd7ee481a3d7e7d88548e0327bd36f1aa44379b95d6ac4c664d3739d65380e... record old: [196] 010000b800000000000000b8fefd7ee481a3d7e7d88548e0327bd36f1aa44379... record new: [182] 010000aa00000000000000aafefd7ee481a3d7e7d88548e0327bd36f1aa44379... client: Filtered packet: [195] 16feff000000000000000000b6010000aa00000000000000aafefd7ee481a3d7... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/1 (7 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [114] feffb1082e22679f3ac81ad153c208cf22049bfb9fd68c4b6d6714e69d52491a... handshake new: [100] feffb1082e22679f3ac81ad153c208cf22049bfb9fd68c4b6d6714e69d52491a... record old: [126] 010000720000000000000072feffb1082e22679f3ac81ad153c208cf22049bfb... record new: [112] 010000640000000000000064feffb1082e22679f3ac81ad153c208cf22049bfb... client: Filtered packet: [125] 16feff00000000000000000070010000640000000000000064feffb1082e2267... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/2 (6 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [3] 000100 handshake old: [181] fefdbdc85c7b22730c2ab43b4d521507bcd6f6724a90d8a94843f2bcd3586531... handshake new: [164] fefdbdc85c7b22730c2ab43b4d521507bcd6f6724a90d8a94843f2bcd3586531... record old: [193] 010000b500000000000000b5fefdbdc85c7b22730c2ab43b4d521507bcd6f672... record new: [176] 010000a400000000000000a4fefdbdc85c7b22730c2ab43b4d521507bcd6f672... client: Filtered packet: [189] 16feff000000000000000000b0010000a400000000000000a4fefdbdc85c7b22... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [184] fefd3f287b61069b1787a515a53ee2c2115366ffa0c92e53eafbcec2a1699b45... handshake new: [177] fefd3f287b61069b1787a515a53ee2c2115366ffa0c92e53eafbcec2a1699b45... record old: [196] 010000b800000000000000b8fefd3f287b61069b1787a515a53ee2c2115366ff... record new: [189] 010000b100000000000000b1fefd3f287b61069b1787a515a53ee2c2115366ff... client: Filtered packet: [202] 16feff000000000000000000bd010000b100000000000000b1fefd3f287b6106... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [114] feffafdfbc502d5e559f3bf03a083e4bc6ffff0ae254147a0c5bb8670c5474d5... handshake new: [107] feffafdfbc502d5e559f3bf03a083e4bc6ffff0ae254147a0c5bb8670c5474d5... record old: [126] 010000720000000000000072feffafdfbc502d5e559f3bf03a083e4bc6ffff0a... record new: [119] 0100006b000000000000006bfeffafdfbc502d5e559f3bf03a083e4bc6ffff0a... client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeffafdfbc502d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [4] 09990000 handshake old: [181] fefd3aa17ed5ec6fe7e78bf46a3b37782841b78519760079a78e1f65f6c08baf... handshake new: [165] fefd3aa17ed5ec6fe7e78bf46a3b37782841b78519760079a78e1f65f6c08baf... record old: [193] 010000b500000000000000b5fefd3aa17ed5ec6fe7e78bf46a3b37782841b785... record new: [177] 010000a500000000000000a5fefd3aa17ed5ec6fe7e78bf46a3b37782841b785... client: Filtered packet: [190] 16feff000000000000000000b1010000a500000000000000a5fefd3aa17ed5ec... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [184] fefd63a4c12ebc277e7789e4ff854203273452525da543e460853c067a447482... handshake new: [178] fefd63a4c12ebc277e7789e4ff854203273452525da543e460853c067a447482... record old: [196] 010000b800000000000000b8fefd63a4c12ebc277e7789e4ff85420327345252... record new: [190] 010000b200000000000000b2fefd63a4c12ebc277e7789e4ff85420327345252... client: Filtered packet: [203] 16feff000000000000000000be010000b200000000000000b2fefd63a4c12ebc... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [114] feffa156b72a16dd01df53483912ba993f42ca4ec823aa7bfbceee06571f4635... handshake new: [108] feffa156b72a16dd01df53483912ba993f42ca4ec823aa7bfbceee06571f4635... record old: [126] 010000720000000000000072feffa156b72a16dd01df53483912ba993f42ca4e... record new: [120] 0100006c000000000000006cfeffa156b72a16dd01df53483912ba993f42ca4e... client: Filtered packet: [133] 16feff000000000000000000780100006c000000000000006cfeffa156b72a16... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [5] 0002000000 handshake old: [181] fefdc0a3eab8397c9276a3309d1f7cd9536b92542b23db55a11336a18b0d1ad4... handshake new: [166] fefdc0a3eab8397c9276a3309d1f7cd9536b92542b23db55a11336a18b0d1ad4... record old: [193] 010000b500000000000000b5fefdc0a3eab8397c9276a3309d1f7cd9536b9254... record new: [178] 010000a600000000000000a6fefdc0a3eab8397c9276a3309d1f7cd9536b9254... client: Filtered packet: [191] 16feff000000000000000000b2010000a600000000000000a6fefdc0a3eab839... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [184] fefd2e2aba5fedc2ac367357654498f0773d94f8bac55606330fec73b34adc7b... handshake new: [179] fefd2e2aba5fedc2ac367357654498f0773d94f8bac55606330fec73b34adc7b... record old: [196] 010000b800000000000000b8fefd2e2aba5fedc2ac367357654498f0773d94f8... record new: [191] 010000b300000000000000b3fefd2e2aba5fedc2ac367357654498f0773d94f8... client: Filtered packet: [204] 16feff000000000000000000bf010000b300000000000000b3fefd2e2aba5fed... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [114] feff2ee157b88ec40a67d536ebc27b1123b1a75c228fbb75a4711e07030411e1... handshake new: [109] feff2ee157b88ec40a67d536ebc27b1123b1a75c228fbb75a4711e07030411e1... record old: [126] 010000720000000000000072feff2ee157b88ec40a67d536ebc27b1123b1a75c... record new: [121] 0100006d000000000000006dfeff2ee157b88ec40a67d536ebc27b1123b1a75c... client: Filtered packet: [134] 16feff000000000000000000790100006d000000000000006dfeff2ee157b88e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (3 ms) [----------] 51 tests from ExtensionDatagram/TlsExtensionTestGeneric (134 ms total) [----------] 39 tests from ExtensionPre13Stream/TlsExtensionTestPre13 [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0301f956c51bb0a7dd50e9082bd03261fea3e38b221c073b636f61398c23ffd9... handshake new: [99] 0301f956c51bb0a7dd50e9082bd03261fea3e38b221c073b636f61398c23ffd9... record old: [721] 020000650301f956c51bb0a7dd50e9082bd03261fea3e38b221c073b636f6139... record new: [719] 020000630301f956c51bb0a7dd50e9082bd03261fea3e38b221c073b636f6139... server: Filtered packet: [724] 16030102cf020000630301f956c51bb0a7dd50e9082bd03261fea3e38b221c07... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 030290c97bbbba8aa86a00b05290434601d1276e9ede945ba5b0f765fd88e5c8... handshake new: [99] 030290c97bbbba8aa86a00b05290434601d1276e9ede945ba5b0f765fd88e5c8... record old: [721] 02000065030290c97bbbba8aa86a00b05290434601d1276e9ede945ba5b0f765... record new: [719] 02000063030290c97bbbba8aa86a00b05290434601d1276e9ede945ba5b0f765... server: Filtered packet: [724] 16030202cf02000063030290c97bbbba8aa86a00b05290434601d1276e9ede94... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0303f8641004302d707d61eaeefa503db03969d12600c879ae0f34e4db47aab0... handshake new: [99] 0303f8641004302d707d61eaeefa503db03969d12600c879ae0f34e4db47aab0... record old: [723] 020000650303f8641004302d707d61eaeefa503db03969d12600c879ae0f34e4... record new: [721] 020000630303f8641004302d707d61eaeefa503db03969d12600c879ae0f34e4... server: Filtered packet: [726] 16030302d1020000630303f8641004302d707d61eaeefa503db03969d12600c8... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 03014007ffb2c93ba48e9d504065bf8d304f1a411474af9f2a73b289120a3c75... handshake new: [100] 03014007ffb2c93ba48e9d504065bf8d304f1a411474af9f2a73b289120a3c75... record old: [721] 0200006503014007ffb2c93ba48e9d504065bf8d304f1a411474af9f2a73b289... record new: [720] 0200006403014007ffb2c93ba48e9d504065bf8d304f1a411474af9f2a73b289... server: Filtered packet: [725] 16030102d00200006403014007ffb2c93ba48e9d504065bf8d304f1a411474af... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 030238ef025f2e858768453e154a2953c92da90691eec48eaeebd4ba9f3097c1... handshake new: [100] 030238ef025f2e858768453e154a2953c92da90691eec48eaeebd4ba9f3097c1... record old: [721] 02000065030238ef025f2e858768453e154a2953c92da90691eec48eaeebd4ba... record new: [720] 02000064030238ef025f2e858768453e154a2953c92da90691eec48eaeebd4ba... server: Filtered packet: [725] 16030202d002000064030238ef025f2e858768453e154a2953c92da90691eec4... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 030359df4ec8aa984f6ed3b084f9b9110b6a71fe726c2eb7f3c6d579e04878ca... handshake new: [100] 030359df4ec8aa984f6ed3b084f9b9110b6a71fe726c2eb7f3c6d579e04878ca... record old: [723] 02000065030359df4ec8aa984f6ed3b084f9b9110b6a71fe726c2eb7f3c6d579... record new: [722] 02000064030359df4ec8aa984f6ed3b084f9b9110b6a71fe726c2eb7f3c6d579... server: Filtered packet: [727] 16030302d202000064030359df4ec8aa984f6ed3b084f9b9110b6a71fe726c2e... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 03012ebc21c868d0a56d1811f6dfac6ce4c422aaf5e32a207fb21c63449fd9d7... handshake new: [102] 03012ebc21c868d0a56d1811f6dfac6ce4c422aaf5e32a207fb21c63449fd9d7... record old: [721] 0200006503012ebc21c868d0a56d1811f6dfac6ce4c422aaf5e32a207fb21c63... record new: [722] 0200006603012ebc21c868d0a56d1811f6dfac6ce4c422aaf5e32a207fb21c63... server: Filtered packet: [727] 16030102d20200006603012ebc21c868d0a56d1811f6dfac6ce4c422aaf5e32a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 03027f27f487dcec0940dac77850122c42dd6a36658be601b6f3eef6bd4fa796... handshake new: [102] 03027f27f487dcec0940dac77850122c42dd6a36658be601b6f3eef6bd4fa796... record old: [721] 0200006503027f27f487dcec0940dac77850122c42dd6a36658be601b6f3eef6... record new: [722] 0200006603027f27f487dcec0940dac77850122c42dd6a36658be601b6f3eef6... server: Filtered packet: [727] 16030202d20200006603027f27f487dcec0940dac77850122c42dd6a36658be6... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 030373a3da5b981a7c05acc4ccc31581409f670c7853df3b9eef15e6754f20c4... handshake new: [102] 030373a3da5b981a7c05acc4ccc31581409f670c7853df3b9eef15e6754f20c4... record old: [723] 02000065030373a3da5b981a7c05acc4ccc31581409f670c7853df3b9eef15e6... record new: [724] 02000066030373a3da5b981a7c05acc4ccc31581409f670c7853df3b9eef15e6... server: Filtered packet: [729] 16030302d402000066030373a3da5b981a7c05acc4ccc31581409f670c7853df... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 03019fecf4c4dc91d1b23ca352db720a3d531af2910638767759f8c33fc354c9... handshake new: [103] 03019fecf4c4dc91d1b23ca352db720a3d531af2910638767759f8c33fc354c9... record old: [721] 0200006503019fecf4c4dc91d1b23ca352db720a3d531af2910638767759f8c3... record new: [723] 0200006703019fecf4c4dc91d1b23ca352db720a3d531af2910638767759f8c3... server: Filtered packet: [728] 16030102d30200006703019fecf4c4dc91d1b23ca352db720a3d531af2910638... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 030279a28d5b746ba2bfac21bd3e2cab970e83515416a5daa21b865636c81e32... handshake new: [103] 030279a28d5b746ba2bfac21bd3e2cab970e83515416a5daa21b865636c81e32... record old: [721] 02000065030279a28d5b746ba2bfac21bd3e2cab970e83515416a5daa21b8656... record new: [723] 02000067030279a28d5b746ba2bfac21bd3e2cab970e83515416a5daa21b8656... server: Filtered packet: [728] 16030202d302000067030279a28d5b746ba2bfac21bd3e2cab970e83515416a5... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 030357bb587eb3c6ab46590b9c2ccfc56440a1bcd6b2d4632681b20d4d78c392... handshake new: [103] 030357bb587eb3c6ab46590b9c2ccfc56440a1bcd6b2d4632681b20d4d78c392... record old: [723] 02000065030357bb587eb3c6ab46590b9c2ccfc56440a1bcd6b2d4632681b20d... record new: [725] 02000067030357bb587eb3c6ab46590b9c2ccfc56440a1bcd6b2d4632681b20d... server: Filtered packet: [730] 16030302d502000067030357bb587eb3c6ab46590b9c2ccfc56440a1bcd6b2d4... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0301f4210e950d20f39732ca3099838b62f24813965afd52b334c2461c403660... handshake new: [102] 0301f4210e950d20f39732ca3099838b62f24813965afd52b334c2461c403660... record old: [721] 020000650301f4210e950d20f39732ca3099838b62f24813965afd52b334c246... record new: [722] 020000660301f4210e950d20f39732ca3099838b62f24813965afd52b334c246... server: Filtered packet: [727] 16030102d2020000660301f4210e950d20f39732ca3099838b62f24813965afd... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 030240eb13361ec8fd2010e91f833ed1fc9ad5676e8b24eb8bd2654d2b4e83ce... handshake new: [102] 030240eb13361ec8fd2010e91f833ed1fc9ad5676e8b24eb8bd2654d2b4e83ce... record old: [721] 02000065030240eb13361ec8fd2010e91f833ed1fc9ad5676e8b24eb8bd2654d... record new: [722] 02000066030240eb13361ec8fd2010e91f833ed1fc9ad5676e8b24eb8bd2654d... server: Filtered packet: [727] 16030202d202000066030240eb13361ec8fd2010e91f833ed1fc9ad5676e8b24... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 03031f797143c46daaf9ff1cee419480ff1aff7b9c95b8e57b32182cc09f77ce... handshake new: [102] 03031f797143c46daaf9ff1cee419480ff1aff7b9c95b8e57b32182cc09f77ce... record old: [723] 0200006503031f797143c46daaf9ff1cee419480ff1aff7b9c95b8e57b32182c... record new: [724] 0200006603031f797143c46daaf9ff1cee419480ff1aff7b9c95b8e57b32182c... server: Filtered packet: [729] 16030302d40200006603031f797143c46daaf9ff1cee419480ff1aff7b9c95b8... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0301cb1ad30354b6cf0170d88b20ea2d02dc81c732ac9829dbf16718bb0611f9... handshake new: [101] 0301cb1ad30354b6cf0170d88b20ea2d02dc81c732ac9829dbf16718bb0611f9... record old: [721] 020000650301cb1ad30354b6cf0170d88b20ea2d02dc81c732ac9829dbf16718... record new: [721] 020000650301cb1ad30354b6cf0170d88b20ea2d02dc81c732ac9829dbf16718... server: Filtered packet: [726] 16030102d1020000650301cb1ad30354b6cf0170d88b20ea2d02dc81c732ac98... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 03026a1fc7b0970005418ea1a4ee6890239de481e7f66c346c15e9574486fe17... handshake new: [101] 03026a1fc7b0970005418ea1a4ee6890239de481e7f66c346c15e9574486fe17... record old: [721] 0200006503026a1fc7b0970005418ea1a4ee6890239de481e7f66c346c15e957... record new: [721] 0200006503026a1fc7b0970005418ea1a4ee6890239de481e7f66c346c15e957... server: Filtered packet: [726] 16030202d10200006503026a1fc7b0970005418ea1a4ee6890239de481e7f66c... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 03035d1fbcc6164926dbc2e3c990217fd7723a966024a596b24c84037e09e07c... handshake new: [101] 03035d1fbcc6164926dbc2e3c990217fd7723a966024a596b24c84037e09e07c... record old: [723] 0200006503035d1fbcc6164926dbc2e3c990217fd7723a966024a596b24c8403... record new: [723] 0200006503035d1fbcc6164926dbc2e3c990217fd7723a966024a596b24c8403... server: Filtered packet: [728] 16030302d30200006503035d1fbcc6164926dbc2e3c990217fd7723a966024a5... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 03012c3c0d005b175e90dcecf8ed0033df23ec3b10af6d1cd82702241e9cc574... handshake new: [101] 03012c3c0d005b175e90dcecf8ed0033df23ec3b10af6d1cd82702241e9cc574... record old: [721] 0200006503012c3c0d005b175e90dcecf8ed0033df23ec3b10af6d1cd8270224... record new: [721] 0200006503012c3c0d005b175e90dcecf8ed0033df23ec3b10af6d1cd8270224... server: Filtered packet: [726] 16030102d10200006503012c3c0d005b175e90dcecf8ed0033df23ec3b10af6d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 030226f5a295f0e2e3e105bc76a0b24073d997d5ff2d3619f1c05c60a1378ed5... handshake new: [101] 030226f5a295f0e2e3e105bc76a0b24073d997d5ff2d3619f1c05c60a1378ed5... record old: [721] 02000065030226f5a295f0e2e3e105bc76a0b24073d997d5ff2d3619f1c05c60... record new: [721] 02000065030226f5a295f0e2e3e105bc76a0b24073d997d5ff2d3619f1c05c60... server: Filtered packet: [726] 16030202d102000065030226f5a295f0e2e3e105bc76a0b24073d997d5ff2d36... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 03038bec71ed5d7e536f39fe8ce6b395278a394b26a85d6cf67572d9eb0d9501... handshake new: [101] 03038bec71ed5d7e536f39fe8ce6b395278a394b26a85d6cf67572d9eb0d9501... record old: [723] 0200006503038bec71ed5d7e536f39fe8ce6b395278a394b26a85d6cf67572d9... record new: [723] 0200006503038bec71ed5d7e536f39fe8ce6b395278a394b26a85d6cf67572d9... server: Filtered packet: [728] 16030302d30200006503038bec71ed5d7e536f39fe8ce6b395278a394b26a85d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 0301d0dd16efc526b5c75bdaaf7de43db33dcd2e0abeb3923acd546ac3e868c3... handshake new: [116] 0301d0dd16efc526b5c75bdaaf7de43db33dcd2e0abeb3923acd546ac3e868c3... record old: [121] 010000750301d0dd16efc526b5c75bdaaf7de43db33dcd2e0abeb3923acd546a... record new: [120] 010000740301d0dd16efc526b5c75bdaaf7de43db33dcd2e0abeb3923acd546a... client: Filtered packet: [125] 1603010078010000740301d0dd16efc526b5c75bdaaf7de43db33dcd2e0abeb3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 0302e2565b7394baaf12848a1ac77ff739604da9710905d1ef5ebdbae8959c28... handshake new: [116] 0302e2565b7394baaf12848a1ac77ff739604da9710905d1ef5ebdbae8959c28... record old: [121] 010000750302e2565b7394baaf12848a1ac77ff739604da9710905d1ef5ebdba... record new: [120] 010000740302e2565b7394baaf12848a1ac77ff739604da9710905d1ef5ebdba... client: Filtered packet: [125] 1603010078010000740302e2565b7394baaf12848a1ac77ff739604da9710905... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [187] 030319f1d3a74ddea58e67a649b2cae11961332b70e55fd0d6c3e167e4930942... handshake new: [186] 030319f1d3a74ddea58e67a649b2cae11961332b70e55fd0d6c3e167e4930942... record old: [191] 010000bb030319f1d3a74ddea58e67a649b2cae11961332b70e55fd0d6c3e167... record new: [190] 010000ba030319f1d3a74ddea58e67a649b2cae11961332b70e55fd0d6c3e167... client: Filtered packet: [195] 16030100be010000ba030319f1d3a74ddea58e67a649b2cae11961332b70e55f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 0301871618e5c514e099250a9b050066826ec0ab1048760bfab9adba91763523... handshake new: [118] 0301871618e5c514e099250a9b050066826ec0ab1048760bfab9adba91763523... record old: [121] 010000750301871618e5c514e099250a9b050066826ec0ab1048760bfab9adba... record new: [122] 010000760301871618e5c514e099250a9b050066826ec0ab1048760bfab9adba... client: Filtered packet: [127] 160301007a010000760301871618e5c514e099250a9b050066826ec0ab104876... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 030286ec6ebf2803712f76bd1dde309e3e5bd1951c0a41d0097d7d7d157ba00c... handshake new: [118] 030286ec6ebf2803712f76bd1dde309e3e5bd1951c0a41d0097d7d7d157ba00c... record old: [121] 01000075030286ec6ebf2803712f76bd1dde309e3e5bd1951c0a41d0097d7d7d... record new: [122] 01000076030286ec6ebf2803712f76bd1dde309e3e5bd1951c0a41d0097d7d7d... client: Filtered packet: [127] 160301007a01000076030286ec6ebf2803712f76bd1dde309e3e5bd1951c0a41... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [187] 030342ddf6f600eb5f1b7c02a4c989ca9b19f3d63ad0fde704cff43793f62eb2... handshake new: [188] 030342ddf6f600eb5f1b7c02a4c989ca9b19f3d63ad0fde704cff43793f62eb2... record old: [191] 010000bb030342ddf6f600eb5f1b7c02a4c989ca9b19f3d63ad0fde704cff437... record new: [192] 010000bc030342ddf6f600eb5f1b7c02a4c989ca9b19f3d63ad0fde704cff437... client: Filtered packet: [197] 16030100c0010000bc030342ddf6f600eb5f1b7c02a4c989ca9b19f3d63ad0fd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 030143055a0e2362f735b5cd6dc1168925354698177490f3f0c634cbf174a564... handshake new: [118] 030143055a0e2362f735b5cd6dc1168925354698177490f3f0c634cbf174a564... record old: [121] 01000075030143055a0e2362f735b5cd6dc1168925354698177490f3f0c634cb... record new: [122] 01000076030143055a0e2362f735b5cd6dc1168925354698177490f3f0c634cb... client: Filtered packet: [127] 160301007a01000076030143055a0e2362f735b5cd6dc1168925354698177490... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 0302de4ba412f9882da2fa5a02e29837b8f10f01e67f41ef8f75b317f7b12783... handshake new: [118] 0302de4ba412f9882da2fa5a02e29837b8f10f01e67f41ef8f75b317f7b12783... record old: [121] 010000750302de4ba412f9882da2fa5a02e29837b8f10f01e67f41ef8f75b317... record new: [122] 010000760302de4ba412f9882da2fa5a02e29837b8f10f01e67f41ef8f75b317... client: Filtered packet: [127] 160301007a010000760302de4ba412f9882da2fa5a02e29837b8f10f01e67f41... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [187] 03032167a40ce12b3674d390d2db3d15f24053ab4a8baa92d1e2f0dd8afcc97e... handshake new: [188] 03032167a40ce12b3674d390d2db3d15f24053ab4a8baa92d1e2f0dd8afcc97e... record old: [191] 010000bb03032167a40ce12b3674d390d2db3d15f24053ab4a8baa92d1e2f0dd... record new: [192] 010000bc03032167a40ce12b3674d390d2db3d15f24053ab4a8baa92d1e2f0dd... client: Filtered packet: [197] 16030100c0010000bc03032167a40ce12b3674d390d2db3d15f24053ab4a8baa... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 03012cdf41f2d3c504c342d48eef78ad7fa002a20b5ea1f0e5e0898e4a0f352d... handshake new: [117] 03012cdf41f2d3c504c342d48eef78ad7fa002a20b5ea1f0e5e0898e4a0f352d... record old: [121] 0100007503012cdf41f2d3c504c342d48eef78ad7fa002a20b5ea1f0e5e0898e... record new: [121] 0100007503012cdf41f2d3c504c342d48eef78ad7fa002a20b5ea1f0e5e0898e... client: Filtered packet: [126] 16030100790100007503012cdf41f2d3c504c342d48eef78ad7fa002a20b5ea1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 0302f336efa2c54ef8a37fb0c9d9a1d2dea6cbc735ea65ef57f774cc3e04173b... handshake new: [117] 0302f336efa2c54ef8a37fb0c9d9a1d2dea6cbc735ea65ef57f774cc3e04173b... record old: [121] 010000750302f336efa2c54ef8a37fb0c9d9a1d2dea6cbc735ea65ef57f774cc... record new: [121] 010000750302f336efa2c54ef8a37fb0c9d9a1d2dea6cbc735ea65ef57f774cc... client: Filtered packet: [126] 1603010079010000750302f336efa2c54ef8a37fb0c9d9a1d2dea6cbc735ea65... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [187] 0303ac9c68a7e81548d932e1ac545c720cb451654b89a4d223aa2b9f9253bd25... handshake new: [187] 0303ac9c68a7e81548d932e1ac545c720cb451654b89a4d223aa2b9f9253bd25... record old: [191] 010000bb0303ac9c68a7e81548d932e1ac545c720cb451654b89a4d223aa2b9f... record new: [191] 010000bb0303ac9c68a7e81548d932e1ac545c720cb451654b89a4d223aa2b9f... client: Filtered packet: [196] 16030100bf010000bb0303ac9c68a7e81548d932e1ac545c720cb451654b89a4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 0301af2ced8739a0ead26c0524f5497eabf54389f60c42817457a5dc8064b643... handshake new: [118] 0301af2ced8739a0ead26c0524f5497eabf54389f60c42817457a5dc8064b643... record old: [121] 010000750301af2ced8739a0ead26c0524f5497eabf54389f60c42817457a5dc... record new: [122] 010000760301af2ced8739a0ead26c0524f5497eabf54389f60c42817457a5dc... client: Filtered packet: [127] 160301007a010000760301af2ced8739a0ead26c0524f5497eabf54389f60c42... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 030222c8ffeea4dc4e364ecd028d66108532dda46b03298f7f907d475f80e50d... handshake new: [118] 030222c8ffeea4dc4e364ecd028d66108532dda46b03298f7f907d475f80e50d... record old: [121] 01000075030222c8ffeea4dc4e364ecd028d66108532dda46b03298f7f907d47... record new: [122] 01000076030222c8ffeea4dc4e364ecd028d66108532dda46b03298f7f907d47... client: Filtered packet: [127] 160301007a01000076030222c8ffeea4dc4e364ecd028d66108532dda46b0329... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [187] 030338b0d08b5d608377f8a73ab24ff25ff8fb0f45f03fb23e73de9be4126c2e... handshake new: [188] 030338b0d08b5d608377f8a73ab24ff25ff8fb0f45f03fb23e73de9be4126c2e... record old: [191] 010000bb030338b0d08b5d608377f8a73ab24ff25ff8fb0f45f03fb23e73de9b... record new: [192] 010000bc030338b0d08b5d608377f8a73ab24ff25ff8fb0f45f03fb23e73de9b... client: Filtered packet: [197] 16030100c0010000bc030338b0d08b5d608377f8a73ab24ff25ff8fb0f45f03f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 030142e2b9e7b5bfb0067825a29bcd5326e0615e0dbafaf2575dc817199efe2f... handshake new: [116] 030142e2b9e7b5bfb0067825a29bcd5326e0615e0dbafaf2575dc817199efe2f... record old: [121] 01000075030142e2b9e7b5bfb0067825a29bcd5326e0615e0dbafaf2575dc817... record new: [120] 01000074030142e2b9e7b5bfb0067825a29bcd5326e0615e0dbafaf2575dc817... client: Filtered packet: [125] 160301007801000074030142e2b9e7b5bfb0067825a29bcd5326e0615e0dbafa... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 0302ef901d107286fc7b91f0df99b1dfdab4ebb1c65370316a535326cea15775... handshake new: [116] 0302ef901d107286fc7b91f0df99b1dfdab4ebb1c65370316a535326cea15775... record old: [121] 010000750302ef901d107286fc7b91f0df99b1dfdab4ebb1c65370316a535326... record new: [120] 010000740302ef901d107286fc7b91f0df99b1dfdab4ebb1c65370316a535326... client: Filtered packet: [125] 1603010078010000740302ef901d107286fc7b91f0df99b1dfdab4ebb1c65370... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [187] 03036443f32002664b062f74704925a0ba4cc35a2b4e94ea60be4a2c8d6ab83e... handshake new: [186] 03036443f32002664b062f74704925a0ba4cc35a2b4e94ea60be4a2c8d6ab83e... record old: [191] 010000bb03036443f32002664b062f74704925a0ba4cc35a2b4e94ea60be4a2c... record new: [190] 010000ba03036443f32002664b062f74704925a0ba4cc35a2b4e94ea60be4a2c... client: Filtered packet: [195] 16030100be010000ba03036443f32002664b062f74704925a0ba4cc35a2b4e94... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (2 ms) [----------] 39 tests from ExtensionPre13Stream/TlsExtensionTestPre13 (105 ms total) [----------] 52 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 030221b5cc7b7b596dc4ad09873e75b8df3c9cc8cdefee882a207d9a9271e225... handshake new: [99] 030221b5cc7b7b596dc4ad09873e75b8df3c9cc8cdefee882a207d9a9271e225... record old: [721] 02000065030221b5cc7b7b596dc4ad09873e75b8df3c9cc8cdefee882a207d9a... record new: [719] 02000063030221b5cc7b7b596dc4ad09873e75b8df3c9cc8cdefee882a207d9a... server: Filtered packet: [724] 16030202cf02000063030221b5cc7b7b596dc4ad09873e75b8df3c9cc8cdefee... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 030346edf43bc4340aeaac6db674d294c1a18e078bc6ff0523ffdc50864d8737... handshake new: [99] 030346edf43bc4340aeaac6db674d294c1a18e078bc6ff0523ffdc50864d8737... record old: [723] 02000065030346edf43bc4340aeaac6db674d294c1a18e078bc6ff0523ffdc50... record new: [721] 02000063030346edf43bc4340aeaac6db674d294c1a18e078bc6ff0523ffdc50... server: Filtered packet: [726] 16030302d102000063030346edf43bc4340aeaac6db674d294c1a18e078bc6ff... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] feff7a95528f80ed7cb3666c0e4aca7001efbb943ac948c76c2b006280fcb514... handshake new: [99] feff7a95528f80ed7cb3666c0e4aca7001efbb943ac948c76c2b006280fcb514... record old: [113] 020000650000000000000065feff7a95528f80ed7cb3666c0e4aca7001efbb94... record new: [111] 020000630000000000000063feff7a95528f80ed7cb3666c0e4aca7001efbb94... server: Filtered packet: [803] 16feff0000000000000000006f020000630000000000000063feff7a95528f80... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] fefdcefdb4a53dff9497ce0a2c095fca8c75c63175b3a60c753ade2c82372a46... handshake new: [99] fefdcefdb4a53dff9497ce0a2c095fca8c75c63175b3a60c753ade2c82372a46... record old: [113] 020000650000000000000065fefdcefdb4a53dff9497ce0a2c095fca8c75c631... record new: [111] 020000630000000000000063fefdcefdb4a53dff9497ce0a2c095fca8c75c631... server: Filtered packet: [805] 16fefd0000000000000000006f020000630000000000000063fefdcefdb4a53d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 0302c63261731d33ee3545780d69f990a316a78e65fd711b84e76db86cc3269d... handshake new: [100] 0302c63261731d33ee3545780d69f990a316a78e65fd711b84e76db86cc3269d... record old: [721] 020000650302c63261731d33ee3545780d69f990a316a78e65fd711b84e76db8... record new: [720] 020000640302c63261731d33ee3545780d69f990a316a78e65fd711b84e76db8... server: Filtered packet: [725] 16030202d0020000640302c63261731d33ee3545780d69f990a316a78e65fd71... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 03033396b5b278525143f7a997100eca4d53fa9f79cbcc51c9c9250a9b279adf... handshake new: [100] 03033396b5b278525143f7a997100eca4d53fa9f79cbcc51c9c9250a9b279adf... record old: [723] 0200006503033396b5b278525143f7a997100eca4d53fa9f79cbcc51c9c9250a... record new: [722] 0200006403033396b5b278525143f7a997100eca4d53fa9f79cbcc51c9c9250a... server: Filtered packet: [727] 16030302d20200006403033396b5b278525143f7a997100eca4d53fa9f79cbcc... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] feffb31328932df469ab23fca2408a4578a0386feb67ef737a934fe66d6f1d88... handshake new: [100] feffb31328932df469ab23fca2408a4578a0386feb67ef737a934fe66d6f1d88... record old: [113] 020000650000000000000065feffb31328932df469ab23fca2408a4578a0386f... record new: [112] 020000640000000000000064feffb31328932df469ab23fca2408a4578a0386f... server: Filtered packet: [804] 16feff00000000000000000070020000640000000000000064feffb31328932d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] fefd132c778f69707f36da567c16c706f80a6ac70097dd5c18072dcb74145884... handshake new: [100] fefd132c778f69707f36da567c16c706f80a6ac70097dd5c18072dcb74145884... record old: [113] 020000650000000000000065fefd132c778f69707f36da567c16c706f80a6ac7... record new: [112] 020000640000000000000064fefd132c778f69707f36da567c16c706f80a6ac7... server: Filtered packet: [806] 16fefd00000000000000000070020000640000000000000064fefd132c778f69... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 0302337e82f32012ac5a1aaec0847120565ef3ab205a9922f659cb364c4d7673... handshake new: [102] 0302337e82f32012ac5a1aaec0847120565ef3ab205a9922f659cb364c4d7673... record old: [721] 020000650302337e82f32012ac5a1aaec0847120565ef3ab205a9922f659cb36... record new: [722] 020000660302337e82f32012ac5a1aaec0847120565ef3ab205a9922f659cb36... server: Filtered packet: [727] 16030202d2020000660302337e82f32012ac5a1aaec0847120565ef3ab205a99... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 03031ce98d9772d99def32c21139452b749d4c390a63ca9da7a7e741f9ac139d... handshake new: [102] 03031ce98d9772d99def32c21139452b749d4c390a63ca9da7a7e741f9ac139d... record old: [723] 0200006503031ce98d9772d99def32c21139452b749d4c390a63ca9da7a7e741... record new: [724] 0200006603031ce98d9772d99def32c21139452b749d4c390a63ca9da7a7e741... server: Filtered packet: [729] 16030302d40200006603031ce98d9772d99def32c21139452b749d4c390a63ca... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] feff1cee0d449c09ad7df7fe30e7456a9f9f35f7bc37f23520aa970389d9de77... handshake new: [102] feff1cee0d449c09ad7df7fe30e7456a9f9f35f7bc37f23520aa970389d9de77... record old: [113] 020000650000000000000065feff1cee0d449c09ad7df7fe30e7456a9f9f35f7... record new: [114] 020000660000000000000066feff1cee0d449c09ad7df7fe30e7456a9f9f35f7... server: Filtered packet: [806] 16feff00000000000000000072020000660000000000000066feff1cee0d449c... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] fefd0a61c5f105b5bd7da80323e27f9c6eb5654d8fd1410207b86294a374258d... handshake new: [102] fefd0a61c5f105b5bd7da80323e27f9c6eb5654d8fd1410207b86294a374258d... record old: [113] 020000650000000000000065fefd0a61c5f105b5bd7da80323e27f9c6eb5654d... record new: [114] 020000660000000000000066fefd0a61c5f105b5bd7da80323e27f9c6eb5654d... server: Filtered packet: [808] 16fefd00000000000000000072020000660000000000000066fefd0a61c5f105... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 0302a414aeefb6d5623a085f2bea8394fb7f7d8904a418807079282929b2648e... handshake new: [103] 0302a414aeefb6d5623a085f2bea8394fb7f7d8904a418807079282929b2648e... record old: [721] 020000650302a414aeefb6d5623a085f2bea8394fb7f7d8904a4188070792829... record new: [723] 020000670302a414aeefb6d5623a085f2bea8394fb7f7d8904a4188070792829... server: Filtered packet: [728] 16030202d3020000670302a414aeefb6d5623a085f2bea8394fb7f7d8904a418... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 03036bf28a429be78ef70e9cf3eee5b8ba71812ddc37f442bdd4c0e7c6f59e45... handshake new: [103] 03036bf28a429be78ef70e9cf3eee5b8ba71812ddc37f442bdd4c0e7c6f59e45... record old: [723] 0200006503036bf28a429be78ef70e9cf3eee5b8ba71812ddc37f442bdd4c0e7... record new: [725] 0200006703036bf28a429be78ef70e9cf3eee5b8ba71812ddc37f442bdd4c0e7... server: Filtered packet: [730] 16030302d50200006703036bf28a429be78ef70e9cf3eee5b8ba71812ddc37f4... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] feff1b88a2af47f5c1a45cd063d5b8c318418315bcc349dbaa3fc7defea46de0... handshake new: [103] feff1b88a2af47f5c1a45cd063d5b8c318418315bcc349dbaa3fc7defea46de0... record old: [113] 020000650000000000000065feff1b88a2af47f5c1a45cd063d5b8c318418315... record new: [115] 020000670000000000000067feff1b88a2af47f5c1a45cd063d5b8c318418315... server: Filtered packet: [807] 16feff00000000000000000073020000670000000000000067feff1b88a2af47... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] fefd62aa20adb1af3a63b2976c2c251663ebca40e74de098a33521b4b56e8bfa... handshake new: [103] fefd62aa20adb1af3a63b2976c2c251663ebca40e74de098a33521b4b56e8bfa... record old: [113] 020000650000000000000065fefd62aa20adb1af3a63b2976c2c251663ebca40... record new: [115] 020000670000000000000067fefd62aa20adb1af3a63b2976c2c251663ebca40... server: Filtered packet: [809] 16fefd00000000000000000073020000670000000000000067fefd62aa20adb1... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 03027bad9bb598dd47f08516ad3db93121216414dda833e2b6844d8903b54970... handshake new: [102] 03027bad9bb598dd47f08516ad3db93121216414dda833e2b6844d8903b54970... record old: [721] 0200006503027bad9bb598dd47f08516ad3db93121216414dda833e2b6844d89... record new: [722] 0200006603027bad9bb598dd47f08516ad3db93121216414dda833e2b6844d89... server: Filtered packet: [727] 16030202d20200006603027bad9bb598dd47f08516ad3db93121216414dda833... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 03030205d6164fa8f8a92520be67eb45ed77503cdad10d30dc5718236128ce67... handshake new: [102] 03030205d6164fa8f8a92520be67eb45ed77503cdad10d30dc5718236128ce67... record old: [723] 0200006503030205d6164fa8f8a92520be67eb45ed77503cdad10d30dc571823... record new: [724] 0200006603030205d6164fa8f8a92520be67eb45ed77503cdad10d30dc571823... server: Filtered packet: [729] 16030302d40200006603030205d6164fa8f8a92520be67eb45ed77503cdad10d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] feff2491959777ffbfe6251fc50eddadfc1d50663b3afbe95b2cc267dc7d42c5... handshake new: [102] feff2491959777ffbfe6251fc50eddadfc1d50663b3afbe95b2cc267dc7d42c5... record old: [113] 020000650000000000000065feff2491959777ffbfe6251fc50eddadfc1d5066... record new: [114] 020000660000000000000066feff2491959777ffbfe6251fc50eddadfc1d5066... server: Filtered packet: [806] 16feff00000000000000000072020000660000000000000066feff2491959777... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] fefd9d65c37059a77695dc2154d1fb416426d6b6e8e742ecd401deb01bba4161... handshake new: [102] fefd9d65c37059a77695dc2154d1fb416426d6b6e8e742ecd401deb01bba4161... record old: [113] 020000650000000000000065fefd9d65c37059a77695dc2154d1fb416426d6b6... record new: [114] 020000660000000000000066fefd9d65c37059a77695dc2154d1fb416426d6b6... server: Filtered packet: [808] 16fefd00000000000000000072020000660000000000000066fefd9d65c37059... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 03027c791e435416f40f422039d7266a380c381cd7da94971ef5c6c57f268eaa... handshake new: [101] 03027c791e435416f40f422039d7266a380c381cd7da94971ef5c6c57f268eaa... record old: [721] 0200006503027c791e435416f40f422039d7266a380c381cd7da94971ef5c6c5... record new: [721] 0200006503027c791e435416f40f422039d7266a380c381cd7da94971ef5c6c5... server: Filtered packet: [726] 16030202d10200006503027c791e435416f40f422039d7266a380c381cd7da94... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 03032788c45a7d43988aca62e042a41550972040f18223dc67d0b63c2a52f0de... handshake new: [101] 03032788c45a7d43988aca62e042a41550972040f18223dc67d0b63c2a52f0de... record old: [723] 0200006503032788c45a7d43988aca62e042a41550972040f18223dc67d0b63c... record new: [723] 0200006503032788c45a7d43988aca62e042a41550972040f18223dc67d0b63c... server: Filtered packet: [728] 16030302d30200006503032788c45a7d43988aca62e042a41550972040f18223... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] feff6aee3fb0ceffcd11e8701e07d94006737e55dd3cfb21d1391a534981588a... handshake new: [101] feff6aee3fb0ceffcd11e8701e07d94006737e55dd3cfb21d1391a534981588a... record old: [113] 020000650000000000000065feff6aee3fb0ceffcd11e8701e07d94006737e55... record new: [113] 020000650000000000000065feff6aee3fb0ceffcd11e8701e07d94006737e55... server: Filtered packet: [805] 16feff00000000000000000071020000650000000000000065feff6aee3fb0ce... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] fefd402bd490954bee654cf72079a1aa5cff25c3537729941d0b93f332785316... handshake new: [101] fefd402bd490954bee654cf72079a1aa5cff25c3537729941d0b93f332785316... record old: [113] 020000650000000000000065fefd402bd490954bee654cf72079a1aa5cff25c3... record new: [113] 020000650000000000000065fefd402bd490954bee654cf72079a1aa5cff25c3... server: Filtered packet: [807] 16fefd00000000000000000071020000650000000000000065fefd402bd49095... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 0302e07053e93c3ee9608ce150d9bfc2afa39adebe4edc7bbc859ebdd1d5eef8... handshake new: [101] 0302e07053e93c3ee9608ce150d9bfc2afa39adebe4edc7bbc859ebdd1d5eef8... record old: [721] 020000650302e07053e93c3ee9608ce150d9bfc2afa39adebe4edc7bbc859ebd... record new: [721] 020000650302e07053e93c3ee9608ce150d9bfc2afa39adebe4edc7bbc859ebd... server: Filtered packet: [726] 16030202d1020000650302e07053e93c3ee9608ce150d9bfc2afa39adebe4edc... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 0303a4ea96742c4774f014ae6d241eeb815bd62865f7b65696bdc7e7fa46026b... handshake new: [101] 0303a4ea96742c4774f014ae6d241eeb815bd62865f7b65696bdc7e7fa46026b... record old: [723] 020000650303a4ea96742c4774f014ae6d241eeb815bd62865f7b65696bdc7e7... record new: [723] 020000650303a4ea96742c4774f014ae6d241eeb815bd62865f7b65696bdc7e7... server: Filtered packet: [728] 16030302d3020000650303a4ea96742c4774f014ae6d241eeb815bd62865f7b6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] feffbd13f521744e876aaa206849b4a320f3e24df991da525dcbddfb5e4cc1cf... handshake new: [101] feffbd13f521744e876aaa206849b4a320f3e24df991da525dcbddfb5e4cc1cf... record old: [113] 020000650000000000000065feffbd13f521744e876aaa206849b4a320f3e24d... record new: [113] 020000650000000000000065feffbd13f521744e876aaa206849b4a320f3e24d... server: Filtered packet: [805] 16feff00000000000000000071020000650000000000000065feffbd13f52174... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] fefdbbcc29b54a8a9fe05772a1bf35e03c11a02836d0fbcc289f83703000677f... handshake new: [101] fefdbbcc29b54a8a9fe05772a1bf35e03c11a02836d0fbcc289f83703000677f... record old: [113] 020000650000000000000065fefdbbcc29b54a8a9fe05772a1bf35e03c11a028... record new: [113] 020000650000000000000065fefdbbcc29b54a8a9fe05772a1bf35e03c11a028... server: Filtered packet: [807] 16fefd00000000000000000071020000650000000000000065fefdbbcc29b54a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 0302f115959f3d16291e560cd7e1ca672577f26957c03e386f3fa993424aac82... handshake new: [116] 0302f115959f3d16291e560cd7e1ca672577f26957c03e386f3fa993424aac82... record old: [121] 010000750302f115959f3d16291e560cd7e1ca672577f26957c03e386f3fa993... record new: [120] 010000740302f115959f3d16291e560cd7e1ca672577f26957c03e386f3fa993... client: Filtered packet: [125] 1603010078010000740302f115959f3d16291e560cd7e1ca672577f26957c03e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [187] 0303e411202e38afe5b4f4195ce15fcc586afe18118c5d1b2a900d46e8f0b4d4... handshake new: [186] 0303e411202e38afe5b4f4195ce15fcc586afe18118c5d1b2a900d46e8f0b4d4... record old: [191] 010000bb0303e411202e38afe5b4f4195ce15fcc586afe18118c5d1b2a900d46... record new: [190] 010000ba0303e411202e38afe5b4f4195ce15fcc586afe18118c5d1b2a900d46... client: Filtered packet: [195] 16030100be010000ba0303e411202e38afe5b4f4195ce15fcc586afe18118c5d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [114] feff44bf16b9335ef9f61e0852615ff3e4781ed600d7ca5bd3da385013b078a3... handshake new: [113] feff44bf16b9335ef9f61e0852615ff3e4781ed600d7ca5bd3da385013b078a3... record old: [126] 010000720000000000000072feff44bf16b9335ef9f61e0852615ff3e4781ed6... record new: [125] 010000710000000000000071feff44bf16b9335ef9f61e0852615ff3e4781ed6... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feff44bf16b933... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [184] fefda6593e2917aa67ca94727aa9176a1b802905a14f23ee5b41db559e603c36... handshake new: [183] fefda6593e2917aa67ca94727aa9176a1b802905a14f23ee5b41db559e603c36... record old: [196] 010000b800000000000000b8fefda6593e2917aa67ca94727aa9176a1b802905... record new: [195] 010000b700000000000000b7fefda6593e2917aa67ca94727aa9176a1b802905... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefda6593e2917... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 030209748b6f9c4c6a784382059edd3a8db72c1f39deedbcd24d8a8b1e519bd1... handshake new: [118] 030209748b6f9c4c6a784382059edd3a8db72c1f39deedbcd24d8a8b1e519bd1... record old: [121] 01000075030209748b6f9c4c6a784382059edd3a8db72c1f39deedbcd24d8a8b... record new: [122] 01000076030209748b6f9c4c6a784382059edd3a8db72c1f39deedbcd24d8a8b... client: Filtered packet: [127] 160301007a01000076030209748b6f9c4c6a784382059edd3a8db72c1f39deed... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [187] 0303da0c5af58684159f6a9c5709e665c08d0d2a6247b102ed6898ef27efaa65... handshake new: [188] 0303da0c5af58684159f6a9c5709e665c08d0d2a6247b102ed6898ef27efaa65... record old: [191] 010000bb0303da0c5af58684159f6a9c5709e665c08d0d2a6247b102ed6898ef... record new: [192] 010000bc0303da0c5af58684159f6a9c5709e665c08d0d2a6247b102ed6898ef... client: Filtered packet: [197] 16030100c0010000bc0303da0c5af58684159f6a9c5709e665c08d0d2a6247b1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [114] feff1705d83d273bb07e338de502d5cdd5aade3fb51c0a6601127ce982c67d3e... handshake new: [115] feff1705d83d273bb07e338de502d5cdd5aade3fb51c0a6601127ce982c67d3e... record old: [126] 010000720000000000000072feff1705d83d273bb07e338de502d5cdd5aade3f... record new: [127] 010000730000000000000073feff1705d83d273bb07e338de502d5cdd5aade3f... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feff1705d83d27... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [184] fefd1536e3b4c0b531681c1f2749706bc1bc9a51c1eeeaa77d8df2cf6e2ab48d... handshake new: [185] fefd1536e3b4c0b531681c1f2749706bc1bc9a51c1eeeaa77d8df2cf6e2ab48d... record old: [196] 010000b800000000000000b8fefd1536e3b4c0b531681c1f2749706bc1bc9a51... record new: [197] 010000b900000000000000b9fefd1536e3b4c0b531681c1f2749706bc1bc9a51... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefd1536e3b4c0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 0302c0915d7f05c1cf05e51311ab64b6a52faa193f0e190ecd3e613340c99915... handshake new: [118] 0302c0915d7f05c1cf05e51311ab64b6a52faa193f0e190ecd3e613340c99915... record old: [121] 010000750302c0915d7f05c1cf05e51311ab64b6a52faa193f0e190ecd3e6133... record new: [122] 010000760302c0915d7f05c1cf05e51311ab64b6a52faa193f0e190ecd3e6133... client: Filtered packet: [127] 160301007a010000760302c0915d7f05c1cf05e51311ab64b6a52faa193f0e19... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [187] 0303f9cf191f2276eae1a4bf272dff188ba57b46cd026c307bc785e3d87c6a67... handshake new: [188] 0303f9cf191f2276eae1a4bf272dff188ba57b46cd026c307bc785e3d87c6a67... record old: [191] 010000bb0303f9cf191f2276eae1a4bf272dff188ba57b46cd026c307bc785e3... record new: [192] 010000bc0303f9cf191f2276eae1a4bf272dff188ba57b46cd026c307bc785e3... client: Filtered packet: [197] 16030100c0010000bc0303f9cf191f2276eae1a4bf272dff188ba57b46cd026c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [114] feff5d2d3276128340599ace831992444485014b22825b6e416f4b8259cb039a... handshake new: [115] feff5d2d3276128340599ace831992444485014b22825b6e416f4b8259cb039a... record old: [126] 010000720000000000000072feff5d2d3276128340599ace831992444485014b... record new: [127] 010000730000000000000073feff5d2d3276128340599ace831992444485014b... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feff5d2d327612... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [184] fefdf217f3f5f0e2981d13ba3c21b09e3fc685feafb6bccb39537e88463d1841... handshake new: [185] fefdf217f3f5f0e2981d13ba3c21b09e3fc685feafb6bccb39537e88463d1841... record old: [196] 010000b800000000000000b8fefdf217f3f5f0e2981d13ba3c21b09e3fc685fe... record new: [197] 010000b900000000000000b9fefdf217f3f5f0e2981d13ba3c21b09e3fc685fe... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefdf217f3f5f0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 0302f3151a604cabfbe5e8d70a21071e23aacefa9adeba1cb45a58f6bf7eaeb8... handshake new: [117] 0302f3151a604cabfbe5e8d70a21071e23aacefa9adeba1cb45a58f6bf7eaeb8... record old: [121] 010000750302f3151a604cabfbe5e8d70a21071e23aacefa9adeba1cb45a58f6... record new: [121] 010000750302f3151a604cabfbe5e8d70a21071e23aacefa9adeba1cb45a58f6... client: Filtered packet: [126] 1603010079010000750302f3151a604cabfbe5e8d70a21071e23aacefa9adeba... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [187] 0303af19af9caf51bf5a0430ea81b7d7d77dcb0f862c742e09ff3cda3e725c97... handshake new: [187] 0303af19af9caf51bf5a0430ea81b7d7d77dcb0f862c742e09ff3cda3e725c97... record old: [191] 010000bb0303af19af9caf51bf5a0430ea81b7d7d77dcb0f862c742e09ff3cda... record new: [191] 010000bb0303af19af9caf51bf5a0430ea81b7d7d77dcb0f862c742e09ff3cda... client: Filtered packet: [196] 16030100bf010000bb0303af19af9caf51bf5a0430ea81b7d7d77dcb0f862c74... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [114] feff9e6283f721c7e3e279c8b8663f2ec3ff6a9ee4a2569e00ef8dc17e74ce04... handshake new: [114] feff9e6283f721c7e3e279c8b8663f2ec3ff6a9ee4a2569e00ef8dc17e74ce04... record old: [126] 010000720000000000000072feff9e6283f721c7e3e279c8b8663f2ec3ff6a9e... record new: [126] 010000720000000000000072feff9e6283f721c7e3e279c8b8663f2ec3ff6a9e... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff9e6283f721... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [184] fefdc2d5a3d243f5ef294c58d314ef5d9cd5a6cbd166271a6a4fb299aa5eb5dc... handshake new: [184] fefdc2d5a3d243f5ef294c58d314ef5d9cd5a6cbd166271a6a4fb299aa5eb5dc... record old: [196] 010000b800000000000000b8fefdc2d5a3d243f5ef294c58d314ef5d9cd5a6cb... record new: [196] 010000b800000000000000b8fefdc2d5a3d243f5ef294c58d314ef5d9cd5a6cb... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefdc2d5a3d243... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 03023f9a24b6ccce717f70592b8d3b320db7e5582fb6ebff566a8c39761f910e... handshake new: [118] 03023f9a24b6ccce717f70592b8d3b320db7e5582fb6ebff566a8c39761f910e... record old: [121] 0100007503023f9a24b6ccce717f70592b8d3b320db7e5582fb6ebff566a8c39... record new: [122] 0100007603023f9a24b6ccce717f70592b8d3b320db7e5582fb6ebff566a8c39... client: Filtered packet: [127] 160301007a0100007603023f9a24b6ccce717f70592b8d3b320db7e5582fb6eb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [187] 03033efb6077f8b0ae101fd258cac9117480e4089d82af96ebe99f9c610f018f... handshake new: [188] 03033efb6077f8b0ae101fd258cac9117480e4089d82af96ebe99f9c610f018f... record old: [191] 010000bb03033efb6077f8b0ae101fd258cac9117480e4089d82af96ebe99f9c... record new: [192] 010000bc03033efb6077f8b0ae101fd258cac9117480e4089d82af96ebe99f9c... client: Filtered packet: [197] 16030100c0010000bc03033efb6077f8b0ae101fd258cac9117480e4089d82af... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [114] feff5773bf321718dec0aa2aae861feebbbefae9997851155b730cff9c8384d9... handshake new: [115] feff5773bf321718dec0aa2aae861feebbbefae9997851155b730cff9c8384d9... record old: [126] 010000720000000000000072feff5773bf321718dec0aa2aae861feebbbefae9... record new: [127] 010000730000000000000073feff5773bf321718dec0aa2aae861feebbbefae9... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feff5773bf3217... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [184] fefd377c62511a272912bac785242ba4ba6c006f664ee4eb7f0f85db24c8ad50... handshake new: [185] fefd377c62511a272912bac785242ba4ba6c006f664ee4eb7f0f85db24c8ad50... record old: [196] 010000b800000000000000b8fefd377c62511a272912bac785242ba4ba6c006f... record new: [197] 010000b900000000000000b9fefd377c62511a272912bac785242ba4ba6c006f... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefd377c62511a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 0302e28216b8914397934236359f2b62e05ebc9e8e353c957224da79f91ea37f... handshake new: [116] 0302e28216b8914397934236359f2b62e05ebc9e8e353c957224da79f91ea37f... record old: [121] 010000750302e28216b8914397934236359f2b62e05ebc9e8e353c957224da79... record new: [120] 010000740302e28216b8914397934236359f2b62e05ebc9e8e353c957224da79... client: Filtered packet: [125] 1603010078010000740302e28216b8914397934236359f2b62e05ebc9e8e353c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [187] 03031bf21ef1351ec1aa35caed8783b3043a3cbf3486b6f2b8d4f5cf6d5c01d0... handshake new: [186] 03031bf21ef1351ec1aa35caed8783b3043a3cbf3486b6f2b8d4f5cf6d5c01d0... record old: [191] 010000bb03031bf21ef1351ec1aa35caed8783b3043a3cbf3486b6f2b8d4f5cf... record new: [190] 010000ba03031bf21ef1351ec1aa35caed8783b3043a3cbf3486b6f2b8d4f5cf... client: Filtered packet: [195] 16030100be010000ba03031bf21ef1351ec1aa35caed8783b3043a3cbf3486b6... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [114] feff407992b208346c65bcc715895392da7b2e3b1296a1557cb216c972e2ac6f... handshake new: [113] feff407992b208346c65bcc715895392da7b2e3b1296a1557cb216c972e2ac6f... record old: [126] 010000720000000000000072feff407992b208346c65bcc715895392da7b2e3b... record new: [125] 010000710000000000000071feff407992b208346c65bcc715895392da7b2e3b... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feff407992b208... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [184] fefd4e9a6b0150584848d3aee29845ae26a29d27bffaac722ce224e0238ece64... handshake new: [183] fefd4e9a6b0150584848d3aee29845ae26a29d27bffaac722ce224e0238ece64... record old: [196] 010000b800000000000000b8fefd4e9a6b0150584848d3aee29845ae26a29d27... record new: [195] 010000b700000000000000b7fefd4e9a6b0150584848d3aee29845ae26a29d27... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd4e9a6b0150... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 (3 ms) [----------] 52 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 (140 ms total) [----------] 6 tests from ExtensionDatagramOnly/TlsExtensionTestDtls [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [192] fefd4411bbe7910994386c756d86e49322f16141c73fb3c1d29b70015fcff49a... handshake new: [188] fefd4411bbe7910994386c756d86e49322f16141c73fb3c1d29b70015fcff49a... record old: [204] 010000c000000000000000c0fefd4411bbe7910994386c756d86e49322f16141... record new: [200] 010000bc00000000000000bcfefd4411bbe7910994386c756d86e49322f16141... client: Filtered packet: [213] 16feff000000000000000000c8010000bc00000000000000bcfefd4411bbe791... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [195] fefd0470b2bca77bc1b78d8d0346c56ad10f40248a3d3d7f994d7cb064a5e0e2... handshake new: [191] fefd0470b2bca77bc1b78d8d0346c56ad10f40248a3d3d7f994d7cb064a5e0e2... record old: [207] 010000c300000000000000c3fefd0470b2bca77bc1b78d8d0346c56ad10f4024... record new: [203] 010000bf00000000000000bffefd0470b2bca77bc1b78d8d0346c56ad10f4024... client: Filtered packet: [216] 16feff000000000000000000cb010000bf00000000000000bffefd0470b2bca7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 (3 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [125] feffa6f510bd832a881fa2c9281583c813949fd912dd15a07b00a18af5e15ec3... handshake new: [121] feffa6f510bd832a881fa2c9281583c813949fd912dd15a07b00a18af5e15ec3... record old: [137] 0100007d000000000000007dfeffa6f510bd832a881fa2c9281583c813949fd9... record new: [133] 010000790000000000000079feffa6f510bd832a881fa2c9281583c813949fd9... client: Filtered packet: [146] 16feff00000000000000000085010000790000000000000079feffa6f510bd83... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/2 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [192] fefddbad72aece5ab3b36f721409bff8c78aec4db071917b79607bf3433374e4... handshake new: [189] fefddbad72aece5ab3b36f721409bff8c78aec4db071917b79607bf3433374e4... record old: [204] 010000c000000000000000c0fefddbad72aece5ab3b36f721409bff8c78aec4d... record new: [201] 010000bd00000000000000bdfefddbad72aece5ab3b36f721409bff8c78aec4d... client: Filtered packet: [214] 16feff000000000000000000c9010000bd00000000000000bdfefddbad72aece... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 (3 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [195] fefd0fd02b680debd62cf5351c638b969629cf9758e55d667e3731ea9a4771aa... handshake new: [192] fefd0fd02b680debd62cf5351c638b969629cf9758e55d667e3731ea9a4771aa... record old: [207] 010000c300000000000000c3fefd0fd02b680debd62cf5351c638b969629cf97... record new: [204] 010000c000000000000000c0fefd0fd02b680debd62cf5351c638b969629cf97... client: Filtered packet: [217] 16feff000000000000000000cc010000c000000000000000c0fefd0fd02b680d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [125] feff1e0159e075bc50f7adebc79378c39f6c8b17b42c89d76292d93756bb15bd... handshake new: [122] feff1e0159e075bc50f7adebc79378c39f6c8b17b42c89d76292d93756bb15bd... record old: [137] 0100007d000000000000007dfeff1e0159e075bc50f7adebc79378c39f6c8b17... record new: [134] 0100007a000000000000007afeff1e0159e075bc50f7adebc79378c39f6c8b17... client: Filtered packet: [147] 16feff000000000000000000860100007a000000000000007afeff1e0159e075... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/2 (2 ms) [----------] 6 tests from ExtensionDatagramOnly/TlsExtensionTestDtls (14 ms total) [----------] 20 tests from ExtensionTls12Plus/TlsExtensionTest12Plus [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [1] 00 handshake old: [180] 0303883b2bc4e11447a3355911f98a67cded6ee30fd2b3d140653aa17feb5259... handshake new: [157] 0303883b2bc4e11447a3355911f98a67cded6ee30fd2b3d140653aa17feb5259... record old: [184] 010000b40303883b2bc4e11447a3355911f98a67cded6ee30fd2b3d140653aa1... record new: [161] 0100009d0303883b2bc4e11447a3355911f98a67cded6ee30fd2b3d140653aa1... client: Filtered packet: [166] 16030100a10100009d0303883b2bc4e11447a3355911f98a67cded6ee30fd2b3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [1] 00 handshake old: [187] 0303d27fe3108ba89f4262c40e214aadf86fc99948f7639c58cc7d4b22d1a98b... handshake new: [156] 0303d27fe3108ba89f4262c40e214aadf86fc99948f7639c58cc7d4b22d1a98b... record old: [191] 010000bb0303d27fe3108ba89f4262c40e214aadf86fc99948f7639c58cc7d4b... record new: [160] 0100009c0303d27fe3108ba89f4262c40e214aadf86fc99948f7639c58cc7d4b... client: Filtered packet: [165] 16030100a00100009c0303d27fe3108ba89f4262c40e214aadf86fc99948f763... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [1] 00 handshake old: [181] fefd87091271696efe1179239db797825bc5cf4e1b7fb4c4ddd34bb311d181db... handshake new: [158] fefd87091271696efe1179239db797825bc5cf4e1b7fb4c4ddd34bb311d181db... record old: [193] 010000b500000000000000b5fefd87091271696efe1179239db797825bc5cf4e... record new: [170] 0100009e000000000000009efefd87091271696efe1179239db797825bc5cf4e... client: Filtered packet: [183] 16feff000000000000000000aa0100009e000000000000009efefd8709127169... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [1] 00 handshake old: [184] fefdb2e33fb2f4e5f697a773a7bfdbd3d4f4c27971893c4a5e9807c60c8fae52... handshake new: [153] fefdb2e33fb2f4e5f697a773a7bfdbd3d4f4c27971893c4a5e9807c60c8fae52... record old: [196] 010000b800000000000000b8fefdb2e33fb2f4e5f697a773a7bfdbd3d4f4c279... record new: [165] 010000990000000000000099fefdb2e33fb2f4e5f697a773a7bfdbd3d4f4c279... client: Filtered packet: [178] 16feff000000000000000000a5010000990000000000000099fefdb2e33fb2f4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/3 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [5] 0002040100 handshake old: [180] 0303c67771150b45181de7881602c4a907cac918b12dc5a5f58919a88045c178... handshake new: [161] 0303c67771150b45181de7881602c4a907cac918b12dc5a5f58919a88045c178... record old: [184] 010000b40303c67771150b45181de7881602c4a907cac918b12dc5a5f58919a8... record new: [165] 010000a10303c67771150b45181de7881602c4a907cac918b12dc5a5f58919a8... client: Filtered packet: [170] 16030100a5010000a10303c67771150b45181de7881602c4a907cac918b12dc5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [5] 0002040100 handshake old: [187] 0303fdbeb69578cb24ac85a376edd049c26349e51ddc227b946d67285b5394fd... handshake new: [160] 0303fdbeb69578cb24ac85a376edd049c26349e51ddc227b946d67285b5394fd... record old: [191] 010000bb0303fdbeb69578cb24ac85a376edd049c26349e51ddc227b946d6728... record new: [164] 010000a00303fdbeb69578cb24ac85a376edd049c26349e51ddc227b946d6728... client: Filtered packet: [169] 16030100a4010000a00303fdbeb69578cb24ac85a376edd049c26349e51ddc22... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [5] 0002040100 handshake old: [181] fefd127d1ac6b3952e68d28578508335b55e90babfa1933ca9fcbb80b595c382... handshake new: [162] fefd127d1ac6b3952e68d28578508335b55e90babfa1933ca9fcbb80b595c382... record old: [193] 010000b500000000000000b5fefd127d1ac6b3952e68d28578508335b55e90ba... record new: [174] 010000a200000000000000a2fefd127d1ac6b3952e68d28578508335b55e90ba... client: Filtered packet: [187] 16feff000000000000000000ae010000a200000000000000a2fefd127d1ac6b3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [5] 0002040100 handshake old: [184] fefddf15616d70c130220e0607db1c5621fb5795e1ddbe829395ad14f05b547b... handshake new: [157] fefddf15616d70c130220e0607db1c5621fb5795e1ddbe829395ad14f05b547b... record old: [196] 010000b800000000000000b8fefddf15616d70c130220e0607db1c5621fb5795... record new: [169] 0100009d000000000000009dfefddf15616d70c130220e0607db1c5621fb5795... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefddf15616d70... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/3 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [2] 0000 handshake old: [180] 030305cd5b8695ebda3f4eac7447cac8b02edf80ad0ec43bb22bfc0353e2d1fa... handshake new: [158] 030305cd5b8695ebda3f4eac7447cac8b02edf80ad0ec43bb22bfc0353e2d1fa... record old: [184] 010000b4030305cd5b8695ebda3f4eac7447cac8b02edf80ad0ec43bb22bfc03... record new: [162] 0100009e030305cd5b8695ebda3f4eac7447cac8b02edf80ad0ec43bb22bfc03... client: Filtered packet: [167] 16030100a20100009e030305cd5b8695ebda3f4eac7447cac8b02edf80ad0ec4... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [2] 0000 handshake old: [187] 0303b0efcbc396b83a4bb8039fa630ffa8c0ef1da2fdfa16d1e9c0e833ea5632... handshake new: [157] 0303b0efcbc396b83a4bb8039fa630ffa8c0ef1da2fdfa16d1e9c0e833ea5632... record old: [191] 010000bb0303b0efcbc396b83a4bb8039fa630ffa8c0ef1da2fdfa16d1e9c0e8... record new: [161] 0100009d0303b0efcbc396b83a4bb8039fa630ffa8c0ef1da2fdfa16d1e9c0e8... client: Filtered packet: [166] 16030100a10100009d0303b0efcbc396b83a4bb8039fa630ffa8c0ef1da2fdfa... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [2] 0000 handshake old: [181] fefd0f82d7a68fc1d33a9a8fe015820327e5340b30c779d444dd5f23e7734a23... handshake new: [159] fefd0f82d7a68fc1d33a9a8fe015820327e5340b30c779d444dd5f23e7734a23... record old: [193] 010000b500000000000000b5fefd0f82d7a68fc1d33a9a8fe015820327e5340b... record new: [171] 0100009f000000000000009ffefd0f82d7a68fc1d33a9a8fe015820327e5340b... client: Filtered packet: [184] 16feff000000000000000000ab0100009f000000000000009ffefd0f82d7a68f... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [2] 0000 handshake old: [184] fefd8d11f180e4803d1598bcb80279da7ee96d115d7d35855cb0c65293750a12... handshake new: [154] fefd8d11f180e4803d1598bcb80279da7ee96d115d7d35855cb0c65293750a12... record old: [196] 010000b800000000000000b8fefd8d11f180e4803d1598bcb80279da7ee96d11... record new: [166] 0100009a000000000000009afefd8d11f180e4803d1598bcb80279da7ee96d11... client: Filtered packet: [179] 16feff000000000000000000a60100009a000000000000009afefd8d11f180e4... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/3 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 0002ffff handshake old: [180] 030370a36c2a360ec54d1e83520029cf1eae38bd95a3aa3bee174a4faa21d723... handshake new: [160] 030370a36c2a360ec54d1e83520029cf1eae38bd95a3aa3bee174a4faa21d723... record old: [184] 010000b4030370a36c2a360ec54d1e83520029cf1eae38bd95a3aa3bee174a4f... record new: [164] 010000a0030370a36c2a360ec54d1e83520029cf1eae38bd95a3aa3bee174a4f... client: Filtered packet: [169] 16030100a4010000a0030370a36c2a360ec54d1e83520029cf1eae38bd95a3aa... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [4] 0002ffff handshake old: [187] 030337c44be6a71ff7093f227a2fa1abe2c047084f5ad4a9e960352648eb2bb4... handshake new: [159] 030337c44be6a71ff7093f227a2fa1abe2c047084f5ad4a9e960352648eb2bb4... record old: [191] 010000bb030337c44be6a71ff7093f227a2fa1abe2c047084f5ad4a9e9603526... record new: [163] 0100009f030337c44be6a71ff7093f227a2fa1abe2c047084f5ad4a9e9603526... client: Filtered packet: [168] 16030100a30100009f030337c44be6a71ff7093f227a2fa1abe2c047084f5ad4... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 0002ffff handshake old: [181] fefde7a7b59834df3a7ecb392f62e2575278378477261512ff8a66a70340251e... handshake new: [161] fefde7a7b59834df3a7ecb392f62e2575278378477261512ff8a66a70340251e... record old: [193] 010000b500000000000000b5fefde7a7b59834df3a7ecb392f62e25752783784... record new: [173] 010000a100000000000000a1fefde7a7b59834df3a7ecb392f62e25752783784... client: Filtered packet: [186] 16feff000000000000000000ad010000a100000000000000a1fefde7a7b59834... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [4] 0002ffff handshake old: [184] fefda07509409018ede93459c19c9a8677524c2359102efe289f1280565dd754... handshake new: [156] fefda07509409018ede93459c19c9a8677524c2359102efe289f1280565dd754... record old: [196] 010000b800000000000000b8fefda07509409018ede93459c19c9a8677524c23... record new: [168] 0100009c000000000000009cfefda07509409018ede93459c19c9a8677524c23... client: Filtered packet: [181] 16feff000000000000000000a80100009c000000000000009cfefda075094090... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/3 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [3] 000104 handshake old: [180] 0303f4e189bbb861fee9f707e481b7e329b982c65cd78b19ba6d6f58b66d612e... handshake new: [159] 0303f4e189bbb861fee9f707e481b7e329b982c65cd78b19ba6d6f58b66d612e... record old: [184] 010000b40303f4e189bbb861fee9f707e481b7e329b982c65cd78b19ba6d6f58... record new: [163] 0100009f0303f4e189bbb861fee9f707e481b7e329b982c65cd78b19ba6d6f58... client: Filtered packet: [168] 16030100a30100009f0303f4e189bbb861fee9f707e481b7e329b982c65cd78b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [3] 000104 handshake old: [187] 0303d3ac190d7b320853f0f2958edcdfc51c6b33bb9b3760f960fd67ac4eb015... handshake new: [158] 0303d3ac190d7b320853f0f2958edcdfc51c6b33bb9b3760f960fd67ac4eb015... record old: [191] 010000bb0303d3ac190d7b320853f0f2958edcdfc51c6b33bb9b3760f960fd67... record new: [162] 0100009e0303d3ac190d7b320853f0f2958edcdfc51c6b33bb9b3760f960fd67... client: Filtered packet: [167] 16030100a20100009e0303d3ac190d7b320853f0f2958edcdfc51c6b33bb9b37... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [3] 000104 handshake old: [181] fefd1828980776bd90dab270d74fb79f29487bda72f66e564d53288e1fb71162... handshake new: [160] fefd1828980776bd90dab270d74fb79f29487bda72f66e564d53288e1fb71162... record old: [193] 010000b500000000000000b5fefd1828980776bd90dab270d74fb79f29487bda... record new: [172] 010000a000000000000000a0fefd1828980776bd90dab270d74fb79f29487bda... client: Filtered packet: [185] 16feff000000000000000000ac010000a000000000000000a0fefd1828980776... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [3] 000104 handshake old: [184] fefd2392771775277ef2fbce4034deb441131bccc2c7b718642930f206672237... handshake new: [155] fefd2392771775277ef2fbce4034deb441131bccc2c7b718642930f206672237... record old: [196] 010000b800000000000000b8fefd2392771775277ef2fbce4034deb441131bcc... record new: [167] 0100009b000000000000009bfefd2392771775277ef2fbce4034deb441131bcc... client: Filtered packet: [180] 16feff000000000000000000a70100009b000000000000009bfefd2392771775... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/3 (3 ms) [----------] 20 tests from ExtensionTls12Plus/TlsExtensionTest12Plus (51 ms total) [----------] 6 tests from ExtensionTls12/TlsExtensionTest12 [ RUN ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/0 (9 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/1 (10 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/0 (4 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/1 (3 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/0 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/0 (10 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/1 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/1 (10 ms) [----------] 6 tests from ExtensionTls12/TlsExtensionTest12 (46 ms total) [----------] 20 tests from ExtensionTls13/TlsExtensionTest13 [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [38] 0024001d00205509125d05c8aa7d1bb4f67af89c620e4704e74be96360f702af... extension new: [2] 0024 handshake old: [180] 0303798a81f457cfc61fe89f9adae58afb8759e6403ef0c3e3ea1317cd999fd8... handshake new: [144] 0303798a81f457cfc61fe89f9adae58afb8759e6403ef0c3e3ea1317cd999fd8... record old: [184] 010000b40303798a81f457cfc61fe89f9adae58afb8759e6403ef0c3e3ea1317... record new: [148] 010000900303798a81f457cfc61fe89f9adae58afb8759e6403ef0c3e3ea1317... client: Filtered packet: [153] 1603010094010000900303798a81f457cfc61fe89f9adae58afb8759e6403ef0... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [38] 0024001d0020bb07e39663c732905ae7bc44a7c06d8a0ae97a4f7d7be24efe67... extension new: [2] 0024 handshake old: [181] fefd94c1328f403eaf8bb107b03301d4e9f6d41c0e2c87c530736a3d98c718f7... handshake new: [145] fefd94c1328f403eaf8bb107b03301d4e9f6d41c0e2c87c530736a3d98c718f7... record old: [193] 010000b500000000000000b5fefd94c1328f403eaf8bb107b03301d4e9f6d41c... record new: [157] 010000910000000000000091fefd94c1328f403eaf8bb107b03301d4e9f6d41c... client: Filtered packet: [170] 16feff0000000000000000009d010000910000000000000091fefd94c1328f40... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/1 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/0 (4 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/1 (4 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 020303 handshake old: [180] 030354b08c42a28b84f52f762d0fa14c0b46bbef3ba88d7c283b7f955030b76e... handshake new: [180] 030354b08c42a28b84f52f762d0fa14c0b46bbef3ba88d7c283b7f955030b76e... record old: [184] 010000b4030354b08c42a28b84f52f762d0fa14c0b46bbef3ba88d7c283b7f95... record new: [184] 010000b4030354b08c42a28b84f52f762d0fa14c0b46bbef3ba88d7c283b7f95... client: Filtered packet: [189] 16030100b8010000b4030354b08c42a28b84f52f762d0fa14c0b46bbef3ba88d... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [3] 02fefd handshake old: [181] fefdaf4fcfdd1cb6701ba08f568390a4672ea84b603c2e11ea5fbe224b61515c... handshake new: [181] fefdaf4fcfdd1cb6701ba08f568390a4672ea84b603c2e11ea5fbe224b61515c... record old: [193] 010000b500000000000000b5fefdaf4fcfdd1cb6701ba08f568390a4672ea84b... record new: [193] 010000b500000000000000b5fefdaf4fcfdd1cb6701ba08f568390a4672ea84b... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefdaf4fcfdd1c... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/1 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 020303 handshake old: [180] 030394adc481a5f932d5c8b0bb99058ba58396a7012846bfb077d34887d90ace... handshake new: [180] 030394adc481a5f932d5c8b0bb99058ba58396a7012846bfb077d34887d90ace... record old: [184] 010000b4030394adc481a5f932d5c8b0bb99058ba58396a7012846bfb077d348... record new: [184] 010000b4030394adc481a5f932d5c8b0bb99058ba58396a7012846bfb077d348... client: Filtered packet: [189] 16030100b8010000b4030394adc481a5f932d5c8b0bb99058ba58396a7012846... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [3] 02fefd handshake old: [181] fefd291188d0f8f3573b4f8bee7dd715ac766329bd1274d3849c759ea659377e... handshake new: [181] fefd291188d0f8f3573b4f8bee7dd715ac766329bd1274d3849c759ea659377e... record old: [193] 010000b500000000000000b5fefd291188d0f8f3573b4f8bee7dd715ac766329... record new: [193] 010000b500000000000000b5fefd291188d0f8f3573b4f8bee7dd715ac766329... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefd291188d0f8... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020303 handshake old: [508] 030375fd827bca1ea79c582c769d7cf9b14303936c06074eb6ff38a0690b1e16... handshake new: [506] 030375fd827bca1ea79c582c769d7cf9b14303936c06074eb6ff38a0690b1e16... record old: [512] 010001fc030375fd827bca1ea79c582c769d7cf9b14303936c06074eb6ff38a0... record new: [510] 010001fa030375fd827bca1ea79c582c769d7cf9b14303936c06074eb6ff38a0... client: Filtered packet: [515] 16030101fe010001fa030375fd827bca1ea79c582c769d7cf9b14303936c0607... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 047f26fefd extension new: [3] 02fefd handshake old: [257] fefd17a18d119bb099526b0840faab18b6b927c2dc5df1d8b853e6fbf855882a... handshake new: [255] fefd17a18d119bb099526b0840faab18b6b927c2dc5df1d8b853e6fbf855882a... record old: [269] 010001010000000000000101fefd17a18d119bb099526b0840faab18b6b927c2... record new: [267] 010000ff00000000000000fffefd17a18d119bb099526b0840faab18b6b927c2... client: Filtered packet: [280] 16feff0000000000000000010b010000ff00000000000000fffefd17a18d119b... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [508] 030386fa4f1d562912cd4ea9fda39d8e048894f5d298340573fcfa21a82c483e... handshake new: [480] 030386fa4f1d562912cd4ea9fda39d8e048894f5d298340573fcfa21a82c483e... record old: [512] 010001fc030386fa4f1d562912cd4ea9fda39d8e048894f5d298340573fcfa21... record new: [484] 010001e0030386fa4f1d562912cd4ea9fda39d8e048894f5d298340573fcfa21... client: Filtered packet: [489] 16030301e4010001e0030386fa4f1d562912cd4ea9fda39d8e048894f5d29834... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/0 (8 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefd698245d5bb895d56bee0573036080036f9af0a6054e9a0057791ecc22ec2... handshake new: [259] fefd698245d5bb895d56bee0573036080036f9af0a6054e9a0057791ecc22ec2... record old: [299] 0100011f000100000000011ffefd698245d5bb895d56bee0573036080036f9af... record new: [271] 010001030001000000000103fefd698245d5bb895d56bee0573036080036f9af... client: Filtered packet: [284] 16fefd0000000000000000010f010001030001000000000103fefd698245d5bb... extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefd698245d5bb895d56bee0573036080036f9af0a6054e9a0057791ecc22ec2... handshake new: [259] fefd698245d5bb895d56bee0573036080036f9af0a6054e9a0057791ecc22ec2... record old: [299] 0100011f000100000000011ffefd698245d5bb895d56bee0573036080036f9af... record new: [271] 010001030001000000000103fefd698245d5bb895d56bee0573036080036f9af... client: Filtered packet: [284] 16fefd0000000000000002010f010001030001000000000103fefd698245d5bb... extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefd698245d5bb895d56bee0573036080036f9af0a6054e9a0057791ecc22ec2... handshake new: [259] fefd698245d5bb895d56bee0573036080036f9af0a6054e9a0057791ecc22ec2... record old: [299] 0100011f000100000000011ffefd698245d5bb895d56bee0573036080036f9af... record new: [271] 010001030001000000000103fefd698245d5bb895d56bee0573036080036f9af... client: Filtered packet: [284] 16fefd0000000000000003010f010001030001000000000103fefd698245d5bb... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/1 (160 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [38] 0024001d0020d4ec71edc55e7ae5a2405d5ce3e524464895fe2be0ffeeebe15f... handshake old: [508] 03033ab7dce9e3df4759cdfd314fdfaf6c28f8bd4a500e558c036081dd8a19aa... handshake new: [466] 03033ab7dce9e3df4759cdfd314fdfaf6c28f8bd4a500e558c036081dd8a19aa... record old: [512] 010001fc03033ab7dce9e3df4759cdfd314fdfaf6c28f8bd4a500e558c036081... record new: [470] 010001d203033ab7dce9e3df4759cdfd314fdfaf6c28f8bd4a500e558c036081... client: Filtered packet: [475] 16030301d6010001d203033ab7dce9e3df4759cdfd314fdfaf6c28f8bd4a500e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/0 (7 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [38] 0024001d0020a6c3cbabd512310f7ff1b2402541ea1d3e61b07480a94e813edd... handshake old: [287] fefdf7efa20412b37a6e900e1d7799dbcbd29262cda52b9a21bb2e1cc4103c92... handshake new: [245] fefdf7efa20412b37a6e900e1d7799dbcbd29262cda52b9a21bb2e1cc4103c92... record old: [299] 0100011f000100000000011ffefdf7efa20412b37a6e900e1d7799dbcbd29262... record new: [257] 010000f500010000000000f5fefdf7efa20412b37a6e900e1d7799dbcbd29262... client: Filtered packet: [270] 16fefd00000000000000000101010000f500010000000000f5fefdf7efa20412... extension drop: [38] 0024001d0020a6c3cbabd512310f7ff1b2402541ea1d3e61b07480a94e813edd... handshake old: [287] fefdf7efa20412b37a6e900e1d7799dbcbd29262cda52b9a21bb2e1cc4103c92... handshake new: [245] fefdf7efa20412b37a6e900e1d7799dbcbd29262cda52b9a21bb2e1cc4103c92... record old: [299] 0100011f000100000000011ffefdf7efa20412b37a6e900e1d7799dbcbd29262... record new: [257] 010000f500010000000000f5fefdf7efa20412b37a6e900e1d7799dbcbd29262... client: Filtered packet: [270] 16fefd00000000000000020101010000f500010000000000f5fefdf7efa20412... extension drop: [38] 0024001d0020a6c3cbabd512310f7ff1b2402541ea1d3e61b07480a94e813edd... handshake old: [287] fefdf7efa20412b37a6e900e1d7799dbcbd29262cda52b9a21bb2e1cc4103c92... handshake new: [245] fefdf7efa20412b37a6e900e1d7799dbcbd29262cda52b9a21bb2e1cc4103c92... record old: [299] 0100011f000100000000011ffefdf7efa20412b37a6e900e1d7799dbcbd29262... record new: [257] 010000f500010000000000f5fefdf7efa20412b37a6e900e1d7799dbcbd29262... client: Filtered packet: [270] 16fefd00000000000000030101010000f500010000000000f5fefdf7efa20412... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/1 (160 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [6] 00040018001d handshake old: [508] 030305259c73bdc328066deb56c2a61d4ce6b946a346c8fe8bc00b9ceac497e1... handshake new: [498] 030305259c73bdc328066deb56c2a61d4ce6b946a346c8fe8bc00b9ceac497e1... record old: [512] 010001fc030305259c73bdc328066deb56c2a61d4ce6b946a346c8fe8bc00b9c... record new: [502] 010001f2030305259c73bdc328066deb56c2a61d4ce6b946a346c8fe8bc00b9c... client: Filtered packet: [507] 16030301f6010001f2030305259c73bdc328066deb56c2a61d4ce6b946a346c8... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/0 (7 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [6] 00040018001d handshake old: [287] fefd58dfbf17d17b4716293c6e328139ade55cf883edb88f182db6dcbcbbae44... handshake new: [277] fefd58dfbf17d17b4716293c6e328139ade55cf883edb88f182db6dcbcbbae44... record old: [299] 0100011f000100000000011ffefd58dfbf17d17b4716293c6e328139ade55cf8... record new: [289] 010001150001000000000115fefd58dfbf17d17b4716293c6e328139ade55cf8... client: Filtered packet: [302] 16fefd00000000000000000121010001150001000000000115fefd58dfbf17d1... extension drop: [6] 00040018001d handshake old: [287] fefd58dfbf17d17b4716293c6e328139ade55cf883edb88f182db6dcbcbbae44... handshake new: [277] fefd58dfbf17d17b4716293c6e328139ade55cf883edb88f182db6dcbcbbae44... record old: [299] 0100011f000100000000011ffefd58dfbf17d17b4716293c6e328139ade55cf8... record new: [289] 010001150001000000000115fefd58dfbf17d17b4716293c6e328139ade55cf8... client: Filtered packet: [302] 16fefd00000000000000020121010001150001000000000115fefd58dfbf17d1... extension drop: [6] 00040018001d handshake old: [287] fefd58dfbf17d17b4716293c6e328139ade55cf883edb88f182db6dcbcbbae44... handshake new: [277] fefd58dfbf17d17b4716293c6e328139ade55cf883edb88f182db6dcbcbbae44... record old: [299] 0100011f000100000000011ffefd58dfbf17d17b4716293c6e328139ade55cf8... record new: [289] 010001150001000000000115fefd58dfbf17d17b4716293c6e328139ade55cf8... client: Filtered packet: [302] 16fefd00000000000000030121010001150001000000000115fefd58dfbf17d1... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/1 (159 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [2] 0000 handshake old: [180] 03036f7533b1cb434c18db18024380d373675548c41c812e1b60227964671f7f... handshake new: [179] 03036f7533b1cb434c18db18024380d373675548c41c812e1b60227964671f7f... record old: [184] 010000b403036f7533b1cb434c18db18024380d373675548c41c812e1b602279... record new: [183] 010000b303036f7533b1cb434c18db18024380d373675548c41c812e1b602279... client: Filtered packet: [188] 16030100b7010000b303036f7533b1cb434c18db18024380d373675548c41c81... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [2] 0000 handshake old: [181] fefd5ab6768e1fda0d8aae4fcab9c6c991ae23276db03bf5ffb5d32ac80ce858... handshake new: [180] fefd5ab6768e1fda0d8aae4fcab9c6c991ae23276db03bf5ffb5d32ac80ce858... record old: [193] 010000b500000000000000b5fefd5ab6768e1fda0d8aae4fcab9c6c991ae2327... record new: [192] 010000b400000000000000b4fefd5ab6768e1fda0d8aae4fcab9c6c991ae2327... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefd5ab6768e1f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/1 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.OddVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 000100 handshake old: [180] 0303aadbe657efe328f2c4d3b26fd03851b9e0a53732c9270f35d9cad84f684f... handshake new: [180] 0303aadbe657efe328f2c4d3b26fd03851b9e0a53732c9270f35d9cad84f684f... record old: [184] 010000b40303aadbe657efe328f2c4d3b26fd03851b9e0a53732c9270f35d9ca... record new: [184] 010000b40303aadbe657efe328f2c4d3b26fd03851b9e0a53732c9270f35d9ca... client: Filtered packet: [189] 16030100b8010000b40303aadbe657efe328f2c4d3b26fd03851b9e0a53732c9... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.OddVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.OddVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [3] 000100 handshake old: [181] fefd17ff3f9bb27bbe93122f13ec0b1022a4a758934063f67a3523f2b4a43372... handshake new: [181] fefd17ff3f9bb27bbe93122f13ec0b1022a4a758934063f67a3523f2b4a43372... record old: [193] 010000b500000000000000b5fefd17ff3f9bb27bbe93122f13ec0b1022a4a758... record new: [193] 010000b500000000000000b5fefd17ff3f9bb27bbe93122f13ec0b1022a4a758... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefd17ff3f9bb2... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.OddVersionList/1 (2 ms) [----------] 20 tests from ExtensionTls13/TlsExtensionTest13 (541 ms total) [----------] 3 tests from BogusExtensionStream/TlsBogusExtensionTestPre13 [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0301e6f6f1dd86307861568daa7561278e13f87555c7d6be913f657ef68716e1... handshake new: [97] 0301e6f6f1dd86307861568daa7561278e13f87555c7d6be913f657ef68716e1... record old: [713] 0200005d0301e6f6f1dd86307861568daa7561278e13f87555c7d6be913f657e... record new: [717] 020000610301e6f6f1dd86307861568daa7561278e13f87555c7d6be913f657e... server: Filtered packet: [722] 16030102cd020000610301e6f6f1dd86307861568daa7561278e13f87555c7d6... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 (3 ms) [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0302487ace75fcf92138c137b0aaab7ae4ff8cb24d8ca514e8d82d6626cfd465... handshake new: [97] 0302487ace75fcf92138c137b0aaab7ae4ff8cb24d8ca514e8d82d6626cfd465... record old: [713] 0200005d0302487ace75fcf92138c137b0aaab7ae4ff8cb24d8ca514e8d82d66... record new: [717] 020000610302487ace75fcf92138c137b0aaab7ae4ff8cb24d8ca514e8d82d66... server: Filtered packet: [722] 16030202cd020000610302487ace75fcf92138c137b0aaab7ae4ff8cb24d8ca5... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 (3 ms) [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0303ce1a002a8bdded6c31bf2f430d37c90b94ac9a33b97c99df24d664eb30ee... handshake new: [97] 0303ce1a002a8bdded6c31bf2f430d37c90b94ac9a33b97c99df24d664eb30ee... record old: [715] 0200005d0303ce1a002a8bdded6c31bf2f430d37c90b94ac9a33b97c99df24d6... record new: [719] 020000610303ce1a002a8bdded6c31bf2f430d37c90b94ac9a33b97c99df24d6... server: Filtered packet: [724] 16030302cf020000610303ce1a002a8bdded6c31bf2f430d37c90b94ac9a33b9... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/2 (3 ms) [----------] 3 tests from BogusExtensionStream/TlsBogusExtensionTestPre13 (9 ms total) [----------] 2 tests from BogusExtensionDatagram/TlsBogusExtensionTestPre13 [ RUN ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] feff7d007664f5dcba257a21741a1e07737e3e1519d35ec973a32fe9e18110a6... handshake new: [97] feff7d007664f5dcba257a21741a1e07737e3e1519d35ec973a32fe9e18110a6... record old: [105] 0200005d000000000000005dfeff7d007664f5dcba257a21741a1e07737e3e15... record new: [109] 020000610000000000000061feff7d007664f5dcba257a21741a1e07737e3e15... server: Filtered packet: [801] 16feff0000000000000000006d020000610000000000000061feff7d007664f5... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 (3 ms) [ RUN ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] fefdb1c1626ff0b39c439dc2fa636f75be90d1550a06a7064d9292e7ac8e47e3... handshake new: [97] fefdb1c1626ff0b39c439dc2fa636f75be90d1550a06a7064d9292e7ac8e47e3... record old: [105] 0200005d000000000000005dfefdb1c1626ff0b39c439dc2fa636f75be90d155... record new: [109] 020000610000000000000061fefdb1c1626ff0b39c439dc2fa636f75be90d155... server: Filtered packet: [803] 16fefd0000000000000000006d020000610000000000000061fefdb1c1626ff0... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 (3 ms) [----------] 2 tests from BogusExtensionDatagram/TlsBogusExtensionTestPre13 (6 ms total) [----------] 18 tests from BogusExtension13/TlsBogusExtensionTest13 [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 03032b176e4b10fd09f57ab87df156375b840f3fde3c22f5405097ba231063c9... handshake new: [90] 03032b176e4b10fd09f57ab87df156375b840f3fde3c22f5405097ba231063c9... record old: [90] 0200005603032b176e4b10fd09f57ab87df156375b840f3fde3c22f5405097ba... record new: [94] 0200005a03032b176e4b10fd09f57ab87df156375b840f3fde3c22f5405097ba... server: Filtered packet: [778] 160303005e0200005a03032b176e4b10fd09f57ab87df156375b840f3fde3c22... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] fefdf302d5e35d44bd550ed8bc561d7a1414fe7a682cfad83cc4ba84289af95b... handshake new: [90] fefdf302d5e35d44bd550ed8bc561d7a1414fe7a682cfad83cc4ba84289af95b... record old: [98] 020000560000000000000056fefdf302d5e35d44bd550ed8bc561d7a1414fe7a... record new: [102] 0200005a000000000000005afefdf302d5e35d44bd550ed8bc561d7a1414fe7a... server: Filtered packet: [892] 16fefd000000000000000000660200005a000000000000005afefdf302d5e35d... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000280026000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a0200005603035c264731d725101ee0f757daf7c8546ce7a9eaa04a... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [52] 0800002800010000000000280026000a00140012001d00170018001901000101... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefdd12c348040... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a020000560303fe2383c6a7997d7d5fab2009a10bcd859d6b6ce897... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [457] 0b0001bd00020000000001bd000001b90001b0308201ac30820115a003020102... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefd45057d2819... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [692] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [696] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [813] 160303005a0200005603039b852ad5ec9cc4f80873d6ac33a92ea5ddd8956ce1... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/0 (3 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [43] 0d00001f000200000000001f00001c000d001800160403050306030203080408... record new: [47] 0d0000230002000000000023000020000d001800160403050306030203080408... server: Filtered packet: [957] 16fefd00000000000000000062020000560000000000000056fefddf7db0ed1f... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [172] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... handshake new: [176] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [176] 020000ac0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... record new: [180] 020000b00303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [185] 16030300b4020000b00303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/0 (7 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [172] fefdcf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... handshake new: [176] fefdcf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [184] 020000ac00000000000000acfefdcf21ad74e59a6111be1d8c021e65b891c2a2... record new: [188] 020000b000000000000000b0fefdcf21ad74e59a6111be1d8c021e65b891c2a2... server: Filtered packet: [201] 16fefd000000000000000000bc020000b000000000000000b0fefdcf21ad74e5... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/1 (7 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000280026000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a020000560303f1f086e2c1a2b502c8f22aff1024d82d403c0e4b41... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/0 (3 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [52] 0800002800010000000000280026000a00140012001d00170018001901000101... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefd8cf91da567... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a0200005603035e10d082819c5c592d771decddfa2b0f0013ca88b9... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [457] 0b0001bd00020000000001bd000001b90001b0308201ac30820115a003020102... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefd5b595408ec... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [692] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [696] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [813] 160303005a020000560303c4969451b8b101a7ed9b7a9a9ba25d0ef36227e8f0... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [43] 0d00001f000200000000001f00001c000d001800160403050306030203080408... record new: [47] 0d0000230002000000000023000020000d001800160403050306030203080408... server: Filtered packet: [957] 16fefd00000000000000000062020000560000000000000056fefdec3aff9c1a... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED handshake old: [193] 0002a30083f672c302000000b2cd7b743cb34634e138128a2b00000000e6ef2f... handshake new: [197] 0002a30083f672c302000000b2cd7b743cb34634e138128a2b00000000e6ef2f... record old: [197] 040000c10002a30083f672c302000000b2cd7b743cb34634e138128a2b000000... record new: [201] 040000c50002a30083f672c302000000b2cd7b743cb34634e138128a2b000000... server: Filtered packet: [223] 17030300da913c76b0d3fc17e613fbae0f5e6a1399b765d1d47ff7cf338233d5... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/0 (8 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED handshake old: [193] 0002a300389b713402000000b26c08e4f354684e197ab059cf000000006001fb... handshake new: [197] 0002a300389b713402000000b26c08e4f354684e197ab059cf000000006001fb... record old: [205] 040000c100050000000000c10002a300389b713402000000b26c08e4f354684e... record new: [209] 040000c500050000000000c50002a300389b713402000000b26c08e4f354684e... server: Filtered packet: [231] 2fc9cb00e27ce4543bba3001e95504da2789d6b6f3840a743773184690fbd0cf... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/1 (9 ms) [----------] 18 tests from BogusExtension13/TlsBogusExtensionTest13 (86 ms total) [----------] 52 tests from StreamOnly/TlsConnectStream [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/1 Version: TLS 1.2 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/1 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/2 Version: TLS 1.1 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/2 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/3 Version: TLS 1.0 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/3 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ShortRead/3 (1 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [27] 9c1cd9699d74ea6c3632ca457dc691a3214a6c8e623162cb28a88a record new: [27] 9c1cd9699d74ea6c3632ca457dc691a3214a6c8e623162cb28a88b client: Filtered packet: [32] 170303001b9c1cd9699d74ea6c3632ca457dc691a3214a6c8e623162cb28a88b server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [34] 00000000000000013e7f596622dc88234ff34cafc3d8329283140ff7491c8d55... record new: [34] 00000000000000013e7f596622dc88234ff34cafc3d8329283140ff7491c8d55... client: Filtered packet: [39] 170303002200000000000000013e7f596622dc88234ff34cafc3d8329283140f... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [48] 8016dd9c10bebe22a9bc4d5d71c66b13db5fea2b71dfd6b02f2e375ca6dfb6d2... record new: [48] 8016dd9c10bebe22a9bc4d5d71c66b13db5fea2b71dfd6b02f2e375ca6dfb6d2... client: Filtered packet: [53] 17030200308016dd9c10bebe22a9bc4d5d71c66b13db5fea2b71dfd6b02f2e37... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [32] 09032317b0807ad6002eacd3a49043d77c7a2c6457af708adf4b6c5861981d9b record new: [32] 09032317b0807ad6002eacd3a49043d77c7a2c6457af708adf4b6c5861981d9c client: Filtered packet: [37] 170301002009032317b0807ad6002eacd3a49043d77c7a2c6457af708adf4b6c... record old: [32] 14e62179f679a41291f08b7b1c56804f235115e9f24178a4ec9b9e169abccf54 record new: [32] 14e62179f679a41291f08b7b1c56804f235115e9f24178a4ec9b9e169abccf55 client: Filtered packet: [37] 170301002014e62179f679a41291f08b7b1c56804f235115e9f24178a4ec9b9e... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/3 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/3 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/3 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/3 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 03033271b7e75b04e85544fed5fa2b9d7fa113c49df5f09447ad37b37c51950e... handshake new: [92] 03033271b7e75b04e85544fed5fa2b9d7fa113c49df5f09447ad37b37c51950e... record old: [96] 0200005c03033271b7e75b04e85544fed5fa2b9d7fa113c49df5f09447ad37b3... record new: [96] 0200005c03033271b7e75b04e85544fed5fa2b9d7fa113c49df5f09447ad37b3... server: Filtered packet: [199] 16030300600200005c03033271b7e75b04e85544fed5fa2b9d7fa113c49df5f0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/0 (8 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03034bdc553426e04d1854ceb71054462e169c0ab60e2447bf73acc3cbc102ea... handshake new: [89] 03034bdc553426e04d1854ceb71054462e169c0ab60e2447bf73acc3cbc102ea... record old: [93] 0200005903034bdc553426e04d1854ceb71054462e169c0ab60e2447bf73acc3... record new: [93] 0200005903034bdc553426e04d1854ceb71054462e169c0ab60e2447bf73acc3... server: Filtered packet: [173] 160303005d0200005903034bdc553426e04d1854ceb71054462e169c0ab60e24... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/1 (7 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 030272a1147ca05a0ffef632c22631986991158e2d304f5dbb69c6e3946641fe... handshake new: [89] 030272a1147ca05a0ffef632c22631986991158e2d304f5dbb69c6e3946641fe... record old: [93] 02000059030272a1147ca05a0ffef632c22631986991158e2d304f5dbb69c6e3... record new: [93] 02000059030272a1147ca05a0ffef632c22631986991158e2d304f5dbb69c6e3... server: Filtered packet: [173] 160302005d02000059030272a1147ca05a0ffef632c22631986991158e2d304f... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/2 (7 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 0301c0ecae9dc6eb8a02af1d196f7fae9c4bf1f1275e0b11cf63f504e7340ccf... handshake new: [89] 0301c0ecae9dc6eb8a02af1d196f7fae9c4bf1f1275e0b11cf63f504e7340ccf... record old: [93] 020000590301c0ecae9dc6eb8a02af1d196f7fae9c4bf1f1275e0b11cf63f504... record new: [93] 020000590301c0ecae9dc6eb8a02af1d196f7fae9c4bf1f1275e0b11cf63f504... server: Filtered packet: [157] 160301005d020000590301c0ecae9dc6eb8a02af1d196f7fae9c4bf1f1275e0b... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/3 (7 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RENEGOTIATION_NOT_ALLOWED: Renegotiation is not allowed on this SSL socket. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RENEGOTIATION_NOT_ALLOWED: Renegotiation is not allowed on this SSL socket. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/3 (4 ms) [----------] 52 tests from StreamOnly/TlsConnectStream (178 ms total) [----------] 6 tests from HelloRetryRequestKeyExchangeTests/TlsKeyExchange13 [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/0 (8 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/1 (9 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/0 (8 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/1 (8 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/0 (10 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/1 (10 ms) [----------] 6 tests from HelloRetryRequestKeyExchangeTests/TlsKeyExchange13 (53 ms total) [----------] 6 tests from HelloRetryRequestAgentTests/HelloRetryRequestAgentTest [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_RETRY_REQUEST: SSL received an unexpected Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/0 (5 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [77] 16030400000000000000000040020000340000000000000034fefdcf21ad74e5... Process message: [77] 16030400000000000000010040020000340001000000000034fefdcf21ad74e5... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_RETRY_REQUEST: SSL received an unexpected Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/1 (4 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/0 (1 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [77] 16030400000000000000000040020000340000000000000034fefdcf21ad74e5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/1 (0 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [55] 16030400320200002e0303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/0 (0 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [71] 1603040000000000000000003a0200002e000000000000002efefdcf21ad74e5... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/1 (1 ms) [----------] 6 tests from HelloRetryRequestAgentTests/HelloRetryRequestAgentTest (11 ms total) [----------] 6 tests from DatagramHolddown/TlsHolddownTest [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Expiring holddown timer client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/0 (4 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Expiring holddown timer server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/1 (3 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Expiring holddown timer client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/2 (4 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/0 (8 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/1 (7 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/2 (8 ms) [----------] 6 tests from DatagramHolddown/TlsHolddownTest (34 ms total) [----------] 136 tests from GenericStream/TlsConnectGenericResumption [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/6 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/0 (14 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/2 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/3 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/4 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/6 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/7 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/1 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/2 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/4 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/6 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/6 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/7 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/7 (8 ms) [----------] 136 tests from GenericStream/TlsConnectGenericResumption (1162 ms total) [----------] 102 tests from GenericDatagram/TlsConnectGenericResumption [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/0 (15 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/3 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/4 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/5 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/0 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/1 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/2 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/4 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 (8 ms) [----------] 102 tests from GenericDatagram/TlsConnectGenericResumption (891 ms total) [----------] 20 tests from GenericStream/TlsConnectGenericResumptionToken [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/3 (8 ms) [----------] 20 tests from GenericStream/TlsConnectGenericResumptionToken (171 ms total) [----------] 15 tests from GenericDatagram/TlsConnectGenericResumptionToken [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 (8 ms) [----------] 15 tests from GenericDatagram/TlsConnectGenericResumptionToken (132 ms total) [----------] 2 tests from GenericDatagram/TlsConnectTls13ResumptionToken [ RUN ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/1 (10 ms) [----------] 2 tests from GenericDatagram/TlsConnectTls13ResumptionToken (20 ms total) [----------] 60 tests from GenericMasking/VariantSuiteTest [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/0 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/1 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/2 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/2 (1 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/3 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/4 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/5 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/0 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/1 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/2 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/3 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/4 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/5 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/5 (0 ms) [----------] 60 tests from GenericMasking/VariantSuiteTest (1 ms total) [----------] 3 tests from GenericMasking/SuiteTest [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/0 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/0 (0 ms) [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/1 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/1 (0 ms) [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/2 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/2 (0 ms) [----------] 3 tests from GenericMasking/SuiteTest (0 ms total) [----------] 2 tests from GenericMasking/VariantTest [ RUN ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/0 [ OK ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/0 (0 ms) [ RUN ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/1 [ OK ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/1 (0 ms) [----------] 2 tests from GenericMasking/VariantTest (0 ms total) [----------] 88 tests from TlsPadding/TlsPaddingTest [ RUN ] TlsPadding/TlsPaddingTest.Correct/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.Correct/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.Correct/1 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.Correct/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.Correct/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.Correct/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.Correct/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.Correct/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410101 [ OK ] TlsPadding/TlsPaddingTest.Correct/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.Correct/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414100 [ OK ] TlsPadding/TlsPaddingTest.Correct/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/19 Content length=287 padding length=0 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/0 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/2 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/4 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/6 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/8 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/12 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/14 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/15 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/16 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/17 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/18 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/19 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/21 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fffefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410f0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fdfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410d0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fcfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410c0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f2f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0f0e [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0d0c [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0c0b [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 (0 ms) [----------] 88 tests from TlsPadding/TlsPaddingTest (2 ms total) [----------] 8 tests from SkipTls10/TlsSkipTest [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 02000057030133ed050c276b391ff26619abbe0e5e88ba0614fd41a0c10a99f8... record new: [95] 02000057030133ed050c276b391ff26619abbe0e5e88ba0614fd41a0c10a99f8... server: Filtered packet: [100] 160301005f02000057030133ed050c276b391ff26619abbe0e5e88ba0614fd41... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03014d82a53fffa7bc34b5fa64e9684f3fb563bab0d6f3228c630b9f... record new: [271] 0200005d03014d82a53fffa7bc34b5fa64e9684f3fb563bab0d6f3228c630b9f... server: Filtered packet: [276] 160301010f0200005d03014d82a53fffa7bc34b5fa64e9684f3fb563bab0d6f3... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03015e1c86aeec5f16f04a7976b170ef8ccb21e6f0bfe06371010309... record new: [271] 0200005d03015e1c86aeec5f16f04a7976b170ef8ccb21e6f0bfe06371010309... server: Filtered packet: [276] 160301010f0200005d03015e1c86aeec5f16f04a7976b170ef8ccb21e6f0bfe0... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (2 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [530] 0200005d0301c1c551969df06ae7bc9f73b5c1deb7b670fdf4fd89768f7b338e... record new: [213] 0200005d0301c1c551969df06ae7bc9f73b5c1deb7b670fdf4fd89768f7b338e... server: Filtered packet: [218] 16030100d50200005d0301c1c551969df06ae7bc9f73b5c1deb7b670fdf4fd89... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (5 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [713] 0200005d030150973e541c52c9e058ea1a63108fbb503753378aac41ecf9736c... record new: [543] 0200005d030150973e541c52c9e058ea1a63108fbb503753378aac41ecf9736c... server: Filtered packet: [548] 160301021f0200005d030150973e541c52c9e058ea1a63108fbb503753378aac... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [531] 0200005d0301318287c2cad13d2f071091d86e0568657c733f04286f45d53d66... record new: [418] 0200005d0301318287c2cad13d2f071091d86e0568657c733f04286f45d53d66... server: Filtered packet: [423] 16030101a20200005d0301318287c2cad13d2f071091d86e0568657c733f0428... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (4 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03012d7b1e31fb229015c6cff49b0c4d3808cb5f3ef215f4d93107ae... record new: [271] 0200005d03012d7b1e31fb229015c6cff49b0c4d3808cb5f3ef215f4d93107ae... Dropping handshake: 12 record old: [271] 0200005d03012d7b1e31fb229015c6cff49b0c4d3808cb5f3ef215f4d93107ae... record new: [101] 0200005d03012d7b1e31fb229015c6cff49b0c4d3808cb5f3ef215f4d93107ae... server: Filtered packet: [106] 16030100650200005d03012d7b1e31fb229015c6cff49b0c4d3808cb5f3ef215... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [532] 0200005d0301d80ce814b9e5b2638826142f59c5ac515b75489f1fe413f7e73d... record new: [215] 0200005d0301d80ce814b9e5b2638826142f59c5ac515b75489f1fe413f7e73d... Dropping handshake: 12 record old: [215] 0200005d0301d80ce814b9e5b2638826142f59c5ac515b75489f1fe413f7e73d... record new: [101] 0200005d0301d80ce814b9e5b2638826142f59c5ac515b75489f1fe413f7e73d... server: Filtered packet: [106] 16030100650200005d0301d80ce814b9e5b2638826142f59c5ac515b75489f1f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (4 ms) [----------] 8 tests from SkipTls10/TlsSkipTest (27 ms total) [----------] 32 tests from SkipVariants/TlsSkipTest [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 020000570302ce732910399be52a881216a1b502dc07f1b6f5ae3d7dcec38c2a... record new: [95] 020000570302ce732910399be52a881216a1b502dc07f1b6f5ae3d7dcec38c2a... server: Filtered packet: [100] 160302005f020000570302ce732910399be52a881216a1b502dc07f1b6f5ae3d... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 020000570303ea3d52b3f7b4a47977dc3eff8153024a4728f87efe230e30689d... record new: [95] 020000570303ea3d52b3f7b4a47977dc3eff8153024a4728f87efe230e30689d... server: Filtered packet: [100] 160303005f020000570303ea3d52b3f7b4a47977dc3eff8153024a4728f87efe... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [150] 16feff00000000000000000063020000570000000000000057feffc5b38bb61f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [150] 16fefd00000000000000000063020000570000000000000057fefddcc1a8d63c... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03023adab694af780a8436de83d78c782a4ec8ef99f95f28d93803ad... record new: [271] 0200005d03023adab694af780a8436de83d78c782a4ec8ef99f95f28d93803ad... server: Filtered packet: [276] 160302010f0200005d03023adab694af780a8436de83d78c782a4ec8ef99f95f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d0303472446fb359de32631fdd664ee6f6da232365a258804fc00a332... record new: [273] 0200005d0303472446fb359de32631fdd664ee6f6da232365a258804fc00a332... server: Filtered packet: [278] 16030301110200005d0303472446fb359de32631fdd664ee6f6da232365a2588... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [178] 0c0000a600010000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [347] 16feff000000000000000000690200005d000000000000005dfeffa4147a1770... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [180] 0c0000a800010000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [349] 16fefd000000000000000000690200005d000000000000005dfefdbae6b0aacc... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d0302c96eea7a1c6389aa6746bd3762e8afa3308e4f5b666f59415027... record new: [271] 0200005d0302c96eea7a1c6389aa6746bd3762e8afa3308e4f5b666f59415027... server: Filtered packet: [276] 160302010f0200005d0302c96eea7a1c6389aa6746bd3762e8afa3308e4f5b66... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d03031fa2878902e2f971580b74debb4a44f01900cf16f033486ef4a9... record new: [273] 0200005d03031fa2878902e2f971580b74debb4a44f01900cf16f033486ef4a9... server: Filtered packet: [278] 16030301110200005d03031fa2878902e2f971580b74debb4a44f01900cf16f0... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [178] 0c0000a600010000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [347] 16feff000000000000000000690200005d000000000000005dfeff6050df79f4... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [180] 0c0000a800010000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [349] 16fefd000000000000000000690200005d000000000000005dfefdcd851a15c5... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 0200005d0302d2f10d2570f371cea9bcc1ac274909d69eb03352ba20aec29cad... record new: [214] 0200005d0302d2f10d2570f371cea9bcc1ac274909d69eb03352ba20aec29cad... server: Filtered packet: [219] 16030200d60200005d0302d2f10d2570f371cea9bcc1ac274909d69eb03352ba... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [533] 0200005d030337372e1d12beec213cfc077ce527d12f3222665e8b85c7ebbcc8... record new: [216] 0200005d030337372e1d12beec213cfc077ce527d12f3222665e8b85c7ebbcc8... server: Filtered packet: [221] 16030300d80200005d030337372e1d12beec213cfc077ce527d12f3222665e8b... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [121] 0c00006d000200000000006d03001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [121] 0c00006d000100000000006d03001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [290] 16feff000000000000000000690200005d000000000000005dfeffaf958dd030... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [122] 0c00006e000200000000006e03001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [122] 0c00006e000100000000006e03001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [291] 16fefd000000000000000000690200005d000000000000005dfefd6bc3b8fe51... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [713] 0200005d0302cdf046070c26fa47e56dc29045ccc3130d245d506dc52a3dc25b... record new: [543] 0200005d0302cdf046070c26fa47e56dc29045ccc3130d245d506dc52a3dc25b... server: Filtered packet: [548] 160302021f0200005d0302cdf046070c26fa47e56dc29045ccc3130d245d506d... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [715] 0200005d03032fdcd2bc0d103ea08f90edbe1eced200ad8e9376ed3734d588a4... record new: [543] 0200005d03032fdcd2bc0d103ea08f90edbe1eced200ad8e9376ed3734d588a4... server: Filtered packet: [548] 160303021f0200005d03032fdcd2bc0d103ea08f90edbe1eced200ad8e9376ed... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [619] 16feff000000000000000000690200005d000000000000005dfeff10a1234788... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [619] 16fefd000000000000000000690200005d000000000000005dfefd022bef5ce9... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [531] 0200005d030269243d562b6f4826f0785afebc66df3ee4186052f5b5d8cf02c9... record new: [418] 0200005d030269243d562b6f4826f0785afebc66df3ee4186052f5b5d8cf02c9... server: Filtered packet: [423] 16030201a20200005d030269243d562b6f4826f0785afebc66df3ee4186052f5... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [534] 0200005d03038caad3df95372d29be81cd1e600810442faaa9af894263777617... record new: [418] 0200005d03038caad3df95372d29be81cd1e600810442faaa9af894263777617... server: Filtered packet: [423] 16030301a20200005d03038caad3df95372d29be81cd1e600810442faaa9af89... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [121] 0c00006d000200000000006d03001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [494] 16feff000000000000000000690200005d000000000000005dfeff2d98179343... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [123] 0c00006f000200000000006f03001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [494] 16fefd000000000000000000690200005d000000000000005dfefd4c0a5e9a47... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d0302650472e74e022a874ec357e47f189848ed1c15614325f8c3ad8f... record new: [271] 0200005d0302650472e74e022a874ec357e47f189848ed1c15614325f8c3ad8f... Dropping handshake: 12 record old: [271] 0200005d0302650472e74e022a874ec357e47f189848ed1c15614325f8c3ad8f... record new: [101] 0200005d0302650472e74e022a874ec357e47f189848ed1c15614325f8c3ad8f... server: Filtered packet: [106] 16030200650200005d0302650472e74e022a874ec357e47f189848ed1c156143... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d030303c702dc3a5671c6ba91793dfa209260d41e1613af135e71e1b5... record new: [273] 0200005d030303c702dc3a5671c6ba91793dfa209260d41e1613af135e71e1b5... Dropping handshake: 12 record old: [273] 0200005d030303c702dc3a5671c6ba91793dfa209260d41e1613af135e71e1b5... record new: [101] 0200005d030303c702dc3a5671c6ba91793dfa209260d41e1613af135e71e1b5... server: Filtered packet: [106] 16030300650200005d030303c702dc3a5671c6ba91793dfa209260d41e1613af... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [178] 0c0000a600010000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [178] 0c0000a600010000000000a603001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16feff000000000000000000690200005d000000000000005dfefff73aa2556c... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [180] 0c0000a800010000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [180] 0c0000a800010000000000a803001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16fefd000000000000000000690200005d000000000000005dfefd6e7ef66b63... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [530] 0200005d030257301096f287f860411cd94a403b1f8683d31e9ee7cb5ca01317... record new: [213] 0200005d030257301096f287f860411cd94a403b1f8683d31e9ee7cb5ca01317... Dropping handshake: 12 record old: [213] 0200005d030257301096f287f860411cd94a403b1f8683d31e9ee7cb5ca01317... record new: [101] 0200005d030257301096f287f860411cd94a403b1f8683d31e9ee7cb5ca01317... server: Filtered packet: [106] 16030200650200005d030257301096f287f860411cd94a403b1f8683d31e9ee7... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [533] 0200005d0303f442684e7f4339d05ce2f0d84db03fcfadd2cb61feebac4e7bd1... record new: [216] 0200005d0303f442684e7f4339d05ce2f0d84db03fcfadd2cb61feebac4e7bd1... Dropping handshake: 12 record old: [216] 0200005d0303f442684e7f4339d05ce2f0d84db03fcfadd2cb61feebac4e7bd1... record new: [101] 0200005d0303f442684e7f4339d05ce2f0d84db03fcfadd2cb61feebac4e7bd1... server: Filtered packet: [106] 16030300650200005d0303f442684e7f4339d05ce2f0d84db03fcfadd2cb61fe... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [122] 0c00006e000200000000006e03001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [122] 0c00006e000100000000006e03001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [122] 0c00006e000100000000006e03001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16feff000000000000000000690200005d000000000000005dfeff8e42056ed7... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [124] 0c000070000200000000007003001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [124] 0c000070000100000000007003001d20f3d89d7d2b1b48983c5500a0354c7f50... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [124] 0c000070000100000000007003001d20f3d89d7d2b1b48983c5500a0354c7f50... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16fefd000000000000000000690200005d000000000000005dfefd1b6d28d816... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (4 ms) [----------] 32 tests from SkipVariants/TlsSkipTest (107 ms total) [----------] 10 tests from Skip13Variants/Tls13SkipTest [ RUN ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 8 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [617] 0b0001b9000001b50001b0308201ac30820115a003020102020102300d06092a... server: Filtered packet: [734] 160303005a0200005603039a14c3e1eed498df66bcef1daa16bd4931a1d507ce... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERTIFICATE: SSL received an unexpected Certificate handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/0 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 8 record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [0] record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [453] 0b0001b900010000000001b9000001b50001b0308201ac30820115a003020102... record old: [144] 0f000084000300000000008408040080c30e5e04a551691128db4ae432a97541... record new: [144] 0f000084000200000000008408040080c30e5e04a551691128db4ae432a97541... record old: [44] 140000200004000000000020950098eb53561f4c48756741775870e100b48cf9... record new: [44] 140000200003000000000020950098eb53561f4c48756741775870e100b48cf9... server: Filtered packet: [840] 16fefd00000000000000000062020000560000000000000056fefd26885629f0... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERTIFICATE: SSL received an unexpected Certificate handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/1 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [212] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [329] 160303005a0200005603030c482fc363c848626a2ccb7e6edd104b27d846ad13... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/0 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [0] record old: [144] 0f0000840003000000000084080400807ff5078203a396e05fff1213c791c7cb... record new: [144] 0f0000840002000000000084080400807ff5078203a396e05fff1213c791c7cb... record old: [44] 1400002000040000000000209154f84454a4b617eb16533a9bd35c12b43c96e6... record new: [44] 1400002000030000000000209154f84454a4b617eb16533a9bd35c12b43c96e6... server: Filtered packet: [435] 16fefd00000000000000000062020000560000000000000056fefd8d9c3609df... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/1 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [521] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [638] 160303005a020000560303dac2f122ba3c3b7fe27bd2191366468a94f8365493... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/0 (3 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [144] 0f0000840003000000000084080400807464948b2f2ece14b8437c1c1185f58d... record new: [0] record old: [44] 140000200004000000000020a70fa7f76342c60e0acab81e2de1491896e69417... record new: [44] 140000200003000000000020a70fa7f76342c60e0acab81e2de1491896e69417... server: Filtered packet: [744] 16fefd00000000000000000062020000560000000000000056fefd3663cdc475... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/1 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [172] 0f0000840804008038f459d7570188cc8c093721da60eb98ea99765e2fd12e96... client: Filtered packet: [194] 17030300bd0499af5f326e70bde13f8526ebaaec91a7ea14a920a2829f489dca... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/0 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [459] 0b0001bf00010000000001bf000001bb0001b6308201b23082011ba003020102... record new: [0] record old: [144] 0f0000840002000000000084080400807b13056cef0ae58c7b9ee91e0aa157cf... record new: [144] 0f0000840001000000000084080400807b13056cef0ae58c7b9ee91e0aa157cf... record old: [44] 1400002000030000000000205373a865e1b70a86e3a4d374cf127dc71562d9b4... record new: [44] 1400002000020000000000205373a865e1b70a86e3a4d374cf127dc71562d9b4... client: Filtered packet: [254] 2ee4220011de4bb9510c041781a03cbeb4bf5ec477b22eff0100a1effa253132... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/1 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [487] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... client: Filtered packet: [509] 17030301f86581c228908388f8e018243f2771eda89ea21d331877e2836c8e98... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/0 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [144] 0f00008400020000000000840804008094f7b1a87016dd7cb0dd05f80f4a8abe... record new: [0] record old: [44] 140000200003000000000020fe34d6fffa83904809ffb40815ae81034b0c2ff5... record new: [44] 140000200002000000000020fe34d6fffa83904809ffb40815ae81034b0c2ff5... client: Filtered packet: [569] 2e251201dc5022d50ed9cefc640d0e966a7b05d07ae0a6d055788ca2256ff815... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/1 (5 ms) [----------] 10 tests from Skip13Variants/Tls13SkipTest (46 ms total) [----------] 14 tests from VersionsStream10Pre13/SSLv2ClientHelloTest [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103010003000000100000334045c36b67511f5320daebf32c67aa5b server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 (8 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectDisabled/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030100030000001000003385010f529520e872481f497b97e1d8ca client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectDisabled/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 Version: TLS 1.0 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff0103010003000000100000338ec2199278399f6b9f47134c28f8dcdb00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (3 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030100030000001000c013cf2c384c0ceba4f973ee94721842226f server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (6 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff01030100030000001000003314128f313c501894404014bd0e95688c00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 (8 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff010301000300000010000033d7a2648a3b0ac40dbb00bffa2a66a9a600... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 0021040103010003000000100000337ea925a194e566bdf91ab38150d4deb800... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (3 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002106010301000300000010000033766c00fe31c11b74adf8300fc87c459b00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030100030000000f0000332674349483cfc76ab350271951981f server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c010301000300000020000033b32b9cf6c7f062b3b443a0d679f9e0923ce5... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 (8 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d010301000300000021000033d4d94d0a5d1a35f3a47766d695c01fd0db3d... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010301000300000010000033a21093a441e8008935774dd1efa9f3f7 server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (3 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103010006000000100000330000ff818b65f48f5849084361ad33951c42... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (7 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.CheckServerRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010301000300000010000033c946a7aa6b06623a92168c093223194a server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.CheckServerRandom/0 (12 ms) [----------] 14 tests from VersionsStream10Pre13/SSLv2ClientHelloTest (68 ms total) [----------] 28 tests from VersionsStreamPre13/SSLv2ClientHelloTest [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030200030000001000003340c529784e67dedb28201e345774464f server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103030003000000100000334cca96a7e1193956841573cec3966fff server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103020003000000100000334b026500fa9c32b2fcd4a607edb92a59 client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010303000300000010000033621cc77e187ce3345845ba3efc4f0bd8 client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 Version: TLS 1.1 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff010302000300000010000033db6c48df4352e0f8ba9be3d58870639b00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1 Version: TLS 1.2 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff0103030003000000100000337ed9f77bf1b1b0de1c28f4248ec595b800... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030200030000001000c01322cba81582cfee02fda2b336a7adbb41 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (6 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030300030000001000c0133fa88108c9e85f77865a56c546d2fc57 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff010302000300000010000033d2159ab96f49c8e8624f90f61b1a4a5c00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff010303000300000010000033ec1bef95839da622f8008af1c810219300... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff010302000300000010000033d94b4bef0f7ea390584162c21c9fee7600... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff0103030003000000100000332508ba72aecada636b9a5fdfba3879cf00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 00210401030200030000001000003367750745d0ac410649a8fdfb8feb292100... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 00210401030300030000001000003308c442e2c628100b37fc0b7c6950617f00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 0021060103020003000000100000337f2b45ac67e9cfe1056c899dc4514bb400... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 00210601030300030000001000003388e2f92436a2e686da0880b7b3812b9a00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030200030000000f0000330732a63d7815d8eb083d87890d2b9e server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030300030000000f0000331dd880c22d3221be4ade6e03e7c0e2 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c0103020003000000200000331a6faa86a6d741e04bfe14eab8bdc724df68... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c010303000300000020000033b66f8ebb1faa1623174494c7b3587d9db98c... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d01030200030000002100003388afd8c61a7e755b5ae4fa1b94ffcefc8175... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d01030300030000002100003311408205647976bb05795c497098739792e8... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030200030000001000003372c07759ac8323a069c30b5adb551aa6 server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010303000300000010000033938ab3e5aa9eecc94fc2be64ad39c387 server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103020006000000100000330000ffa1456515f59109748d0e601460168d... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103030006000000100000330000fffb16c9fa0eb737399c15abcf868b5f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103020003000000100000336458a054a3cc0e5534a9f8aaff1cf687 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/0 (11 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010303000300000010000033794ee418c886b6d0012b117a4e064e10 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/1 (11 ms) [----------] 28 tests from VersionsStreamPre13/SSLv2ClientHelloTest (133 ms total) [----------] 8 tests from TlsDowngradeSentinelTest/TlsDowngradeTest [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/0 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 Version: TLS 1.3 [ SKIPPED ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 (0 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/2 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/3 (3 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/4 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/5 (3 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/6 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/7 (3 ms) [----------] 8 tests from TlsDowngradeSentinelTest/TlsDowngradeTest (25 ms total) [----------] 4802 tests from TLSVersionRanges/TestPolicyVersionRange [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/0 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/0 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/5 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/5 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/6 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/6 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/7 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/7 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/8 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/8 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/9 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/9 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/10 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/10 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/11 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/11 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/12 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/12 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/13 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/13 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/14 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/14 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/15 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/15 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/16 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/16 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/17 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/17 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/18 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/18 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/19 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/19 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/20 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/20 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/21 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/21 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/22 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/22 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/23 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/23 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/24 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/24 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/25 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/25 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/26 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/26 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/27 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/27 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/28 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/28 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/29 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/29 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/30 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/30 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/31 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/31 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/32 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/32 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/33 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/33 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/34 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/34 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/35 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/35 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/36 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/36 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/37 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/37 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/38 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/38 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/39 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/39 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/40 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/40 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/41 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/41 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/42 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/42 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/43 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/43 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/44 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/44 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/45 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/45 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/46 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/46 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/47 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/47 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/48 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/48 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/49 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/49 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/50 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/50 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/51 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/51 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/52 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/52 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/53 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/53 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/54 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/54 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/55 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/55 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/56 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/56 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/57 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/57 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/58 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/58 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/59 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/59 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/60 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/60 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/61 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/61 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/62 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/62 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/63 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/63 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/64 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/64 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/65 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/65 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/66 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/66 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/67 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/67 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/68 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/68 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/69 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/69 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/70 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/70 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/71 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/71 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/72 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/72 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/73 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/73 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/74 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/74 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/75 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/75 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/76 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/76 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/77 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/77 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/78 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/78 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/79 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/79 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/80 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/80 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/81 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/81 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/82 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/82 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/83 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/83 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/84 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/84 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/85 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/85 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/86 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/86 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/87 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/87 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/88 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/88 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/89 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/89 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/90 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/90 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/91 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/91 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/92 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/92 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/93 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/93 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/94 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/94 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/95 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/95 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/96 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/96 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/97 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/97 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/98 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/98 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/99 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/99 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/100 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/100 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/101 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/101 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/102 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/102 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/103 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/103 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/104 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/104 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/105 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/105 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/106 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/106 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/107 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/107 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/108 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/108 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/109 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/109 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/110 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/110 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/111 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/111 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/112 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/112 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/113 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/113 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/114 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/114 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/115 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/115 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/116 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/116 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/117 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/117 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/118 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/118 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/119 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/119 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/120 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/120 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/121 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/121 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/122 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/122 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/123 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/123 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/124 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/124 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/125 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/125 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/126 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/126 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/127 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/127 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/128 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/128 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/129 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/129 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/130 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/130 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/131 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/131 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/132 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/132 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/133 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/133 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/134 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/134 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/135 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/135 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/136 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/136 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/137 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/137 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/138 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/138 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/139 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/139 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/140 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/140 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/141 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/141 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/142 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/142 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/143 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/143 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/144 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/144 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/145 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/145 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/146 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/146 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/147 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/147 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/148 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/148 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/149 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/149 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/150 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/150 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/151 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/151 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/152 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/152 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/153 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/153 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/154 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/154 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/155 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/155 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/156 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/156 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/157 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/157 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/158 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/158 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/159 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/159 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/160 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/160 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/161 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/161 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/162 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/162 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/163 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/163 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/164 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/164 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/165 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/165 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/166 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/166 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/167 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/167 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/168 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/168 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/169 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/169 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/170 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/170 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/171 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/171 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/172 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/172 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/173 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/173 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/174 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/174 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/175 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/175 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/176 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/176 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/177 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/177 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/178 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/178 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/179 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/179 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/180 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/180 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/181 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/181 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/182 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/182 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/183 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/183 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/184 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/184 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/185 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/185 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/186 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/186 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/187 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/187 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/188 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/188 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/189 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/189 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/190 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/190 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/191 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/191 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/192 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/192 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/193 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/193 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/194 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/194 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/195 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/195 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/196 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/196 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/197 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/197 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/198 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/198 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/199 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/199 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/200 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/200 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/201 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/201 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/202 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/202 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/203 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/203 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/204 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/204 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/205 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/205 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/206 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/206 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/207 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/207 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/208 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/208 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/209 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/209 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/210 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/210 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/211 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/211 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/212 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/212 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/213 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/213 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/214 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/214 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/215 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/215 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/216 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/216 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/217 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/217 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/218 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/218 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/219 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/219 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/220 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/220 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/221 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/221 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/222 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/222 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/223 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/223 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/224 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/224 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/225 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/225 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/226 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/226 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/227 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/227 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/228 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/228 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/229 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/229 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/230 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/230 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/231 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/231 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/232 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/232 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/233 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/233 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/234 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/235 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/235 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/236 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/236 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/237 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/238 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/239 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/240 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/240 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/241 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/242 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/242 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/243 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/243 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/244 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/244 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/245 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/246 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/247 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/248 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/249 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/249 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/250 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/250 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/251 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/251 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/252 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/252 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/253 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/253 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/254 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/254 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/255 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/255 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/256 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/256 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/257 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/257 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/258 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/258 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/259 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/259 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/260 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/260 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/261 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/261 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/262 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/262 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/263 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/263 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/264 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/264 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/265 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/265 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/266 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/267 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/268 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/269 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/269 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/270 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/270 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/271 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/271 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/272 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/273 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/274 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/275 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/276 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/276 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/277 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/277 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/278 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/278 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/279 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/280 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/281 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/282 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/283 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/284 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/284 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/285 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/285 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/286 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/287 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/288 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/289 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/290 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/291 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/291 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/292 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/292 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/293 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/293 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/294 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/295 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/296 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/297 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/298 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/298 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/299 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/299 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/300 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/300 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/301 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/302 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/302 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/303 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/303 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/304 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/304 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/305 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/305 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/306 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/306 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/307 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/307 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/308 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/308 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/309 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/309 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/310 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/310 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/311 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/311 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/312 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/312 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/313 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/313 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/314 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/314 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/315 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/315 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/316 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/316 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/317 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/318 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/318 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/319 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/319 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/320 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/320 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/321 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/322 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/323 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/324 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/325 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/325 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/326 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/326 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/327 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/327 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/328 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/329 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/330 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/331 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/332 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/333 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/333 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/334 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/334 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/335 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/335 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/336 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/337 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/337 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/338 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/339 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/340 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/340 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/341 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/341 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/342 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/342 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/343 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/344 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/344 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/345 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/345 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/346 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/347 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/348 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/348 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/349 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/349 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/350 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/351 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/352 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/352 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/353 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/353 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/354 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/355 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/355 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/356 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/356 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/357 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/357 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/358 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/359 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/359 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/360 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/360 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/361 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/361 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/362 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/362 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/363 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/363 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/364 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/364 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/365 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/365 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/366 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/366 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/367 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/367 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/368 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/368 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/369 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/369 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/370 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/370 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/371 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/371 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/372 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/373 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/374 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/374 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/375 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/376 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/377 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/378 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/378 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/379 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/380 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/381 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/381 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/382 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/382 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/383 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/384 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/385 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/385 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/386 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/387 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/388 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/388 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/389 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/389 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/390 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/391 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/392 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/393 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/394 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/394 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/395 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/396 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/396 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/397 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/398 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/399 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/400 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/400 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/401 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/401 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/402 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/402 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/403 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/403 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/404 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/405 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/405 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/406 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/406 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/407 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/407 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/408 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/408 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/409 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/410 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/411 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/412 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/413 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/413 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/414 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/414 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/415 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/416 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/417 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/418 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/418 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/419 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/420 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/420 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/421 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/421 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/422 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/423 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/424 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/425 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/426 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/427 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/428 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/429 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/430 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/430 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/431 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/431 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/432 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/432 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/433 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/433 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/434 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/434 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/435 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/435 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/436 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/436 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/437 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/437 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/438 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/438 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/439 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/439 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/440 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/440 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/441 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/441 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/442 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/442 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/443 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/443 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/444 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/444 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/445 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/445 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/446 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/446 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/447 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/447 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/448 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/448 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/449 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/449 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/450 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/450 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/451 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/451 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/452 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/452 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/453 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/453 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/454 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/454 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/455 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/455 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/456 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/456 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/457 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/457 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/458 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/458 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/459 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/459 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/460 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/460 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/461 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/461 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/462 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/462 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/463 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/463 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/464 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/464 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/465 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/465 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/466 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/466 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/467 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/467 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/468 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/468 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/469 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/469 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/470 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/470 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/471 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/471 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/472 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/472 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/473 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/473 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/474 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/474 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/475 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/475 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/476 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/476 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/477 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/477 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/478 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/478 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/479 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/479 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/480 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/480 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/481 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/481 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/482 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/482 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/483 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/483 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/484 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/484 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/485 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/485 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/486 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/486 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/487 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/487 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/488 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/488 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/489 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/489 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/490 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/490 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/491 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/491 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/492 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/492 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/493 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/493 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/494 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/494 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/495 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/495 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/496 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/496 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/497 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/497 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/498 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/498 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/499 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/499 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/500 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/500 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/501 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/501 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/502 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/502 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/503 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/503 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/504 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/504 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/505 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/505 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/506 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/506 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/507 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/507 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/508 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/508 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/509 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/509 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/510 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/510 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/511 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/511 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/512 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/512 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/513 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/513 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/514 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/514 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/515 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/515 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/516 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/516 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/517 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/517 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/518 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/518 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/519 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/519 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/520 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/520 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/521 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/521 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/522 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/522 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/523 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/523 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/524 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/524 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/525 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/525 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/526 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/526 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/527 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/527 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/528 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/528 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/529 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/529 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/530 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/530 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/531 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/531 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/532 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/532 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/533 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/533 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/534 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/534 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/535 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/535 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/536 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/536 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/537 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/537 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/538 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/538 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/539 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/539 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/540 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/540 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/541 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/541 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/542 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/542 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/543 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/543 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/544 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/544 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/545 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/545 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/546 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/546 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/547 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/547 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/548 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/548 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/549 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/549 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/550 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/550 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/551 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/551 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/552 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/552 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/553 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/553 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/554 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/554 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/555 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/555 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/556 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/556 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/557 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/557 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/558 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/558 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/559 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/559 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/560 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/560 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/561 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/561 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/562 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/562 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/563 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/563 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/564 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/564 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/565 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/565 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/566 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/566 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/567 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/567 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/568 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/569 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/570 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/571 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/571 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/572 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/572 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/573 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/573 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/574 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/574 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/575 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/576 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/577 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/578 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/579 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/579 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/580 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/581 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/582 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/583 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/584 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/585 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/586 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/587 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/588 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/589 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/590 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/591 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/591 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/592 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/593 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/594 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/595 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/596 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/596 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/597 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/597 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/598 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/598 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/599 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/599 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/600 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/601 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/601 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/602 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/603 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/604 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/604 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/605 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/605 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/606 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/606 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/607 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/607 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/608 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/609 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/610 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/611 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/612 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/612 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/613 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/613 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/614 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/614 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/615 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/616 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/617 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/618 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/619 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/620 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/620 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/621 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/621 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/622 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/623 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/624 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/625 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/626 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/627 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/628 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/628 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/629 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/630 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/631 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/632 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/632 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/633 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/634 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/635 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/636 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/637 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/638 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/639 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/640 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/641 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/642 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/643 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/644 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/645 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/645 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/646 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/646 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/647 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/647 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/648 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/648 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/649 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/650 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/650 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/651 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/652 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/653 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/653 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/654 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/654 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/655 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/655 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/656 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/656 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/657 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/657 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/658 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/659 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/660 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/661 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/661 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/662 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/662 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/663 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/663 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/664 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/665 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/666 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/667 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/668 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/669 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/669 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/670 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/670 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/671 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/671 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/672 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/673 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/674 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/675 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/676 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/677 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/677 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/678 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/679 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/680 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/681 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/682 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/683 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/684 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/685 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/685 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/686 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/686 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/687 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/687 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/688 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/688 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/689 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/689 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/690 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/690 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/691 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/691 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/692 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/692 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/693 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/693 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/694 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/694 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/695 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/695 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/696 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/696 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/697 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/697 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/698 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/698 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/699 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/699 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/700 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/700 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/701 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/701 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/702 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/702 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/703 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/703 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/704 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/704 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/705 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/705 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/706 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/706 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/707 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/707 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/708 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/708 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/709 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/709 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/710 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/710 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/711 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/711 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/712 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/712 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/713 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/713 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/714 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/714 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/715 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/716 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/716 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/717 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/717 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/718 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/719 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/719 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/720 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/721 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/721 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/722 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/723 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/723 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/724 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/724 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/725 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/726 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/727 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/727 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/728 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/729 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/729 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/730 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/731 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/731 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/732 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/733 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/733 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/734 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/735 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/735 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/736 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/736 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/737 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/738 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/739 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/739 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/740 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/740 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/741 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/742 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/743 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/743 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/744 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/745 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/746 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/747 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/747 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/748 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/749 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/750 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/750 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/751 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/752 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/753 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/754 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/754 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/755 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/756 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/757 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/758 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/758 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/759 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/760 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/761 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/762 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/762 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/763 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/764 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/765 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/766 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/766 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/767 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/768 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/769 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/770 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/770 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/771 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/772 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/773 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/774 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/774 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/775 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/776 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/777 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/777 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/778 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/779 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/780 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/781 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/781 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/782 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/783 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/784 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/784 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/785 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/785 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/786 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/786 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/787 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/787 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/788 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/788 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/789 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/789 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/790 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/790 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/791 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/791 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/792 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/792 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/793 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/793 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/794 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/794 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/795 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/795 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/796 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/796 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/797 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/797 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/798 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/798 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/799 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/799 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/800 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/800 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/801 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/801 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/802 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/802 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/803 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/803 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/804 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/804 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/805 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/805 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/806 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/806 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/807 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/807 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/808 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/808 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/809 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/809 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/810 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/810 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/811 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/811 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/812 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/812 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/813 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/813 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/814 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/814 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/815 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/815 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/816 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/816 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/817 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/817 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/818 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/818 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/819 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/819 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/820 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/820 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/821 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/821 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/822 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/822 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/823 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/823 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/824 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/824 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/825 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/825 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/826 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/826 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/827 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/827 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/828 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/828 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/829 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/829 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/830 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/830 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/831 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/831 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/832 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/832 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/833 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/833 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/834 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/834 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/835 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/835 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/836 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/836 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/837 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/837 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/838 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/838 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/839 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/839 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/840 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/840 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/841 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/841 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/842 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/842 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/843 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/843 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/844 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/844 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/845 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/845 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/846 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/846 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/847 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/847 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/848 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/848 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/849 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/849 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/850 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/850 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/851 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/851 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/852 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/852 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/853 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/853 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/854 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/854 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/855 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/855 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/856 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/856 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/857 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/857 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/858 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/858 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/859 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/859 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/860 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/860 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/861 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/861 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/862 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/862 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/863 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/863 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/864 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/864 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/865 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/865 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/866 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/866 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/867 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/867 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/868 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/868 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/869 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/869 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/870 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/870 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/871 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/871 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/872 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/872 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/873 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/873 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/874 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/874 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/875 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/875 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/876 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/876 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/877 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/877 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/878 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/878 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/879 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/879 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/880 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/880 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/881 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/881 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/882 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/882 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/883 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/883 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/884 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/884 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/885 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/885 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/886 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/886 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/887 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/887 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/888 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/888 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/889 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/889 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/890 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/890 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/891 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/891 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/892 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/892 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/893 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/893 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/894 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/894 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/895 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/895 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/896 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/896 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/897 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/897 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/898 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/898 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/899 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/899 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/900 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/900 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/901 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/901 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/902 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/902 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/903 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/903 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/904 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/904 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/905 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/905 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/906 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/906 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/907 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/907 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/908 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/908 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/909 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/909 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/910 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/910 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/911 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/911 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/912 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/912 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/913 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/913 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/914 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/914 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/915 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/915 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/916 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/916 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/917 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/917 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/918 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/918 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/919 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/919 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/920 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/920 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/921 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/921 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/922 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/922 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/923 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/923 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/924 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/924 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/925 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/925 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/926 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/926 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/927 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/927 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/928 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/928 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/929 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/929 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/930 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/930 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/931 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/931 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/932 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/932 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/933 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/933 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/934 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/934 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/935 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/935 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/936 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/936 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/937 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/937 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/938 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/938 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/939 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/939 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/940 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/940 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/941 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/941 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/942 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/942 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/943 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/943 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/944 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/944 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/945 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/945 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/946 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/946 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/947 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/947 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/948 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/948 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/949 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/949 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/950 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/950 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/951 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/951 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/952 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/952 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/953 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/953 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/954 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/954 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/955 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/955 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/956 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/956 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/957 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/957 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/958 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/958 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/959 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/959 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/960 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/960 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/961 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/962 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/963 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/963 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/964 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/964 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/965 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/965 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/966 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/966 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/967 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/968 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/969 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/969 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/970 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/971 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/971 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/972 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/972 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/973 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/974 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/975 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/976 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/977 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/978 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/979 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/980 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/981 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/982 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/983 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/984 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/985 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/986 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/987 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/988 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/989 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/989 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/990 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/990 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/991 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/991 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/992 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/992 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/993 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/994 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/995 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/996 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/996 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/997 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/997 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/998 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/998 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/999 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/999 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1000 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1001 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1001 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1002 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1002 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1003 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1004 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1004 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1005 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1005 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1006 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1006 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1007 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1007 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1008 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1009 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1010 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1011 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1012 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1012 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1013 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1013 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1014 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1015 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1016 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1017 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1017 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1018 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1019 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1020 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1020 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1021 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1022 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1023 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1024 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1025 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1026 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1027 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1028 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1029 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1029 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1030 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1030 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1031 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1031 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1032 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1032 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1033 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1033 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1034 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1034 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1035 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1035 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1036 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1036 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1037 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1037 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1038 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1038 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1039 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1039 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1040 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1040 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1041 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1041 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1042 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1042 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1043 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1043 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1044 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1044 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1045 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1045 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1046 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1046 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1047 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1047 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1048 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1048 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1049 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1049 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1050 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1050 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1051 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1051 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1052 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1052 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1053 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1053 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1054 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1054 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1055 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1055 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1056 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1056 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1057 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1057 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1058 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1058 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1059 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1059 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1060 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1060 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1061 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1061 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1062 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1062 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1063 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1063 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1064 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1064 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1065 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1065 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1066 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1066 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1067 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1067 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1068 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1068 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1069 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1069 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1070 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1070 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1071 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1071 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1072 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1072 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1073 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1073 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1074 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1074 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1075 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1075 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1076 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1076 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1077 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1077 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1078 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1078 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1079 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1079 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1080 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1080 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1081 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1081 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1082 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1082 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1083 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1083 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1084 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1084 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1085 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1085 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1086 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1086 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1087 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1088 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1088 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1089 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1089 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1090 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1091 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1091 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1092 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1093 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1093 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1094 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1095 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1096 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1096 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1097 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1097 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1098 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1099 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1099 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1100 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1101 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1101 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1102 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1103 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1103 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1104 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1104 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1105 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1106 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1107 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1107 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1108 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1108 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1109 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1110 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1110 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1111 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1112 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1112 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1113 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1114 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1115 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1115 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1116 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1116 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1117 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1118 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1119 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1120 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1120 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1121 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1122 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1123 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1123 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1124 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1125 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1126 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1127 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1127 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1128 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1129 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1130 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1131 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1131 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1132 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1133 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1134 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1135 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1135 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1136 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1137 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1138 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1139 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1140 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1141 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1142 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1142 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1143 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1144 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1145 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1146 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1146 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1147 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1148 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1149 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1150 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1150 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1151 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1152 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1153 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1154 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1154 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1155 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1156 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1157 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1158 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1159 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1160 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1161 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1161 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1162 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1163 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1164 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1165 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1165 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1166 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1167 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1168 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1169 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1169 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1170 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1171 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1172 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1173 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1173 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1174 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1175 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1176 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1176 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1177 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1177 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1178 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1178 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1179 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1179 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1180 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1180 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1181 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1181 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1182 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1182 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1183 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1183 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1184 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1184 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1185 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1185 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1186 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1186 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1187 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1187 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1188 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1188 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1189 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1189 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1190 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1190 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1191 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1191 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1192 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1192 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1193 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1193 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1194 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1194 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1195 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1195 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1196 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1196 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1197 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1197 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1198 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1198 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1199 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1199 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1200 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1200 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1201 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1201 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1202 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1202 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1203 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1203 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1204 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1204 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1205 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1205 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1206 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1206 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1207 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1207 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1208 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1208 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1209 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1209 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1210 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1210 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1211 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1211 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1212 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1212 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1213 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1213 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1214 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1214 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1215 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1215 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1216 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1216 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1217 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1217 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1218 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1218 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1219 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1219 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1220 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1220 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1221 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1221 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1222 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1222 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1223 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1223 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1224 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1224 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1225 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1225 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1226 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1226 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1227 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1227 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1228 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1228 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1229 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1229 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1230 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1230 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1231 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1231 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1232 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1232 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1233 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1233 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1234 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1235 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1235 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1236 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1236 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1237 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1238 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1239 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1240 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1241 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1242 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1242 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1243 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1243 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1244 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1244 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1245 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1246 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1247 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1248 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1249 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1249 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1250 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1250 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1251 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1251 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1252 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1253 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1253 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1254 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1254 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1255 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1255 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1256 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1256 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1257 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1257 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1258 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1258 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1259 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1259 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1260 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1260 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1261 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1261 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1262 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1262 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1263 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1263 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1264 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1264 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1265 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1266 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1267 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1268 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1269 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1269 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1270 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1270 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1271 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1271 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1272 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1273 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1274 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1275 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1276 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1276 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1277 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1277 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1278 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1278 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1279 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1280 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1281 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1282 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1283 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1284 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1284 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1285 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1285 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1286 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1287 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1288 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1289 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1290 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1290 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1291 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1291 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1292 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1292 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1293 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1293 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1294 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1294 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1295 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1296 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1297 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1298 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1298 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1299 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1299 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1300 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1300 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1301 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1302 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1302 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1303 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1303 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1304 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1304 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1305 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1305 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1306 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1306 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1307 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1307 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1308 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1308 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1309 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1309 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1310 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1310 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1311 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1311 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1312 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1312 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1313 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1313 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1314 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1314 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1315 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1315 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1316 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1316 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1317 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1318 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1318 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1319 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1319 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1320 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1320 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1321 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1322 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1322 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1323 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1324 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1325 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1325 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1326 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1326 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1327 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1327 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1328 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1329 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1330 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1331 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1332 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1333 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1333 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1334 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1334 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1335 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1335 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1336 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1336 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1337 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1338 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1339 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1340 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1340 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1341 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1341 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1342 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1342 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1343 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1343 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1344 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1344 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1345 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1345 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1346 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1346 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1347 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1347 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1348 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1348 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1349 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1349 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1350 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1350 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1351 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1351 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1352 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1352 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1353 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1353 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1354 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1354 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1355 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1355 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1356 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1356 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1357 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1357 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1358 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1358 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1359 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1359 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1360 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1360 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1361 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1362 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1363 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1363 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1364 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1364 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1365 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1365 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1366 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1367 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1368 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1368 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1369 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1369 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1370 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1371 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1372 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1373 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1374 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1374 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1375 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1376 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1377 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1378 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1378 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1379 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1380 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1381 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1381 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1382 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1382 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1383 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1384 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1385 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1385 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1386 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1387 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1388 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1388 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1389 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1389 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1390 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1391 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1392 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1392 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1393 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1393 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1394 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1394 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1395 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1395 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1396 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1396 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1397 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1397 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1398 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1398 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1399 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1399 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1400 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1400 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1401 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1401 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1402 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1402 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1403 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1403 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1404 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1404 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1405 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1405 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1406 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1406 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1407 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1407 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1408 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1408 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1409 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1409 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1410 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1410 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1411 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1411 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1412 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1412 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1413 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1413 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1414 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1414 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1415 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1415 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1416 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1416 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1417 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1417 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1418 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1418 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1419 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1419 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1420 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1420 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1421 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1421 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1422 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1422 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1423 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1423 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1424 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1424 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1425 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1425 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1426 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1426 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1427 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1427 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1428 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1428 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1429 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1429 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1430 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1430 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1431 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1432 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1432 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1433 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1433 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1434 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1434 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1435 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1436 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1436 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1437 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1437 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1438 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1438 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1439 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1440 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1440 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1441 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1441 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1442 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1443 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1444 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1444 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1445 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1445 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1446 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1447 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1447 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1448 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1448 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1449 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1449 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1450 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1451 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1451 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1452 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1452 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1453 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1453 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1454 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1455 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1455 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1456 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1456 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1457 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1458 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1459 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1460 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1460 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1461 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1462 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1463 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1464 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1464 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1465 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1466 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1467 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1468 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1469 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1470 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1471 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1471 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1472 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1473 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1474 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1475 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1475 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1476 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1477 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1478 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1479 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1479 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1480 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1481 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1482 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1482 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1483 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1484 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1485 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1486 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1486 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1487 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1488 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1489 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1490 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1490 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1491 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1492 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1493 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1494 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1495 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1496 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1497 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1497 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1498 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1499 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1500 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1501 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1501 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1502 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1503 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1504 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1505 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1505 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1506 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1507 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1508 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1508 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1509 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1510 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1511 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1512 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1512 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1513 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1514 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1515 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1516 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1516 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1517 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1518 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1519 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1519 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1520 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1521 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1522 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1523 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1523 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1524 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1525 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1526 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1527 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1527 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1528 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1529 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1530 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1530 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1531 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1532 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1533 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1534 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1534 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1535 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1536 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1537 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1538 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1538 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1539 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1540 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1541 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1542 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1542 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1543 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1544 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1545 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1545 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1546 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1547 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1548 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1548 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1549 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1549 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1550 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1551 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1552 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1552 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1553 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1553 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1554 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1555 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1556 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1556 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1557 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1558 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1559 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1559 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1560 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1560 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1561 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1562 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1562 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1563 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1563 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1564 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1565 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1566 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1566 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1567 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1567 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1568 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1569 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1570 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1571 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1571 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1572 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1572 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1573 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1573 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1574 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1574 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1575 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1576 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1577 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1578 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1578 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1579 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1579 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1580 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1581 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1582 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1583 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1583 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1584 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1585 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1586 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1586 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1587 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1587 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1588 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1589 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1590 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1591 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1592 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1593 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1593 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1594 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1594 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1595 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1596 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1597 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1598 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1599 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1600 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1600 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1601 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1601 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1602 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1603 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1603 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1604 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1605 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1606 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1607 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1608 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1609 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1610 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1611 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1612 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1613 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1614 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1614 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1615 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1616 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1617 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1618 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1619 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1620 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1621 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1621 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1622 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1623 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1624 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1625 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1626 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1626 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1627 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1628 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1628 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1629 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1630 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1631 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1632 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1633 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1634 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1634 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1635 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1635 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1636 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1636 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1637 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1638 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1639 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1640 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1641 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1642 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1642 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1643 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1643 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1644 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1645 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1646 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1647 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1648 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1649 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1649 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1650 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1650 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1651 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1651 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1652 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1653 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1654 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1655 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1656 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1657 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1657 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1658 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1659 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1660 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1661 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1662 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1663 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1664 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1665 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1665 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1666 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1667 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1668 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1669 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1670 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1670 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1671 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1671 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1672 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1673 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1674 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1675 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1676 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1677 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1677 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1678 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1679 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1680 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1681 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1682 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1683 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1684 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1684 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1685 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1685 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1686 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1686 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1687 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1688 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1689 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1690 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1691 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1691 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1692 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1692 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1693 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1694 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1695 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1696 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1697 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1698 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1698 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1699 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1699 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1700 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1700 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1701 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1701 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1702 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1703 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1704 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1705 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1706 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1706 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1707 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1707 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1708 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1708 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1709 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1710 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1711 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1712 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1713 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1714 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1715 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1715 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1716 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1716 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1717 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1717 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1718 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1718 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1719 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1719 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1720 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1721 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1721 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1722 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1722 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1723 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1724 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1724 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1725 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1725 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1726 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1727 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1727 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1728 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1729 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1729 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1730 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1731 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1732 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1733 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1733 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1734 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1735 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1736 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1736 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1737 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1738 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1739 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1739 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1740 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1740 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1741 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1742 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1743 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1743 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1744 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1745 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1746 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1747 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1747 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1748 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1749 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1750 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1751 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1751 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1752 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1753 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1754 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1754 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1755 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1755 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1756 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1757 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1758 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1759 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1759 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1760 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1761 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1762 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1762 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1763 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1764 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1765 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1766 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1766 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1767 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1768 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1769 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1770 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1770 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1771 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1772 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1773 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1773 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1774 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1775 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1776 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1777 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1777 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1778 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1779 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1780 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1781 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1781 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1782 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1783 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1784 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1784 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1785 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1786 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1787 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1788 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1788 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1789 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1790 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1791 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1792 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1792 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1793 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1794 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1795 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1795 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1796 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1797 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1798 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1799 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1799 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1800 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1801 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1802 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1803 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1803 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1804 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1805 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1805 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1806 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1806 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1807 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1807 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1808 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1809 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1810 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1810 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1811 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1812 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1813 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1814 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1814 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1815 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1815 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1816 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1817 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1817 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1818 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1818 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1819 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1820 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1821 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1821 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1822 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1822 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1823 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1824 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1825 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1825 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1826 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1827 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1828 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1829 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1829 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1830 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1831 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1832 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1832 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1833 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1834 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1835 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1836 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1836 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1837 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1838 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1839 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1839 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1840 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1840 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1841 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1842 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1843 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1843 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1844 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1844 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1845 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1846 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1846 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1847 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1847 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1848 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1848 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1849 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1850 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1850 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1851 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1851 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1852 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1853 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1853 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1854 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1855 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1855 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1856 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1856 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1857 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1858 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1859 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1859 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1860 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1860 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1861 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1862 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1862 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1863 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1863 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1864 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1864 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1865 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1866 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1866 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1867 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1867 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1868 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1869 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1870 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1870 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1871 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1871 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1872 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1873 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1873 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1874 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1874 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1875 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1875 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1876 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1877 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1877 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1878 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1879 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1879 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1880 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1881 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1881 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1882 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1883 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1883 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1884 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1885 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1885 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1886 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1887 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1888 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1889 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1889 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1890 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1890 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1891 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1891 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1892 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1892 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1893 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1893 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1894 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1894 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1895 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1895 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1896 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1896 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1897 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1897 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1898 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1898 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1899 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1899 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1900 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1900 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1901 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1901 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1902 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1902 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1903 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1903 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1904 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1904 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1905 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1905 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1906 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1906 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1907 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1907 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1908 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1908 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1909 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1909 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1910 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1910 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1911 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1911 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1912 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1912 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1913 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1913 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1914 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1914 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1915 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1915 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1916 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1916 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1917 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1917 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1918 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1918 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1919 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1919 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1920 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1920 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1921 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1921 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1922 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1922 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1923 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1923 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1924 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1924 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1925 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1925 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1926 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1926 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1927 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1927 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1928 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1928 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1929 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1929 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1930 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1930 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1931 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1931 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1932 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1932 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1933 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1933 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1934 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1934 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1935 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1935 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1936 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1936 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1937 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1937 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1938 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1938 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1939 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1939 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1940 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1940 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1941 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1941 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1942 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1942 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1943 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1943 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1944 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1944 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1945 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1945 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1946 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1946 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1947 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1947 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1948 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1948 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1949 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1949 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1950 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1950 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1951 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1951 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1952 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1952 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1953 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1953 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1954 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1954 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1955 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1955 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1956 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1956 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1957 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1957 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1958 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1958 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1959 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1959 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1960 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1961 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1962 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1963 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1963 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1964 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1964 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1965 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1965 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1966 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1966 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1967 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1967 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1968 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1969 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1970 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1971 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1972 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1973 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1974 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1975 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1976 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1977 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1978 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1979 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1979 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1980 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1980 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1981 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1982 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1983 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1984 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1985 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1986 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1986 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1987 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1988 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1989 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1990 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1991 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1992 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1993 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1993 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1994 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1995 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1995 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1996 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1997 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1998 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1999 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2000 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2000 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2001 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2001 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2002 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2003 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2004 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2005 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2006 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2007 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2008 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2009 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2010 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2010 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2011 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2012 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2013 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2013 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2014 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2015 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2016 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2017 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2018 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2019 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2020 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2021 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2022 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2022 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2023 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2024 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2025 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2026 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2027 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2028 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2028 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2029 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2029 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2030 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2031 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2032 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2033 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2034 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2035 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2035 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2036 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2037 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2038 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2039 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2039 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2040 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2041 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2042 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2042 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2043 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2043 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2044 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2044 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2045 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2046 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2047 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2048 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2049 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2049 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2050 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2050 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2051 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2051 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2052 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2053 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2054 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2055 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2056 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2056 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2057 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2058 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2058 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2059 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2059 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2060 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2060 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2061 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2061 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2062 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2062 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2063 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2063 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2064 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2064 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2065 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2065 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2066 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2066 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2067 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2067 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2068 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2068 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2069 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2069 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2070 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2070 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2071 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2071 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2072 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2072 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2073 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2073 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2074 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2074 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2075 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2075 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2076 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2076 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2077 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2077 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2078 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2078 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2079 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2079 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2080 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2080 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2081 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2081 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2082 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2082 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2083 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2083 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2084 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2084 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2085 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2085 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2086 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2086 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2087 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2087 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2088 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2088 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2089 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2089 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2090 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2090 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2091 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2091 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2092 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2093 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2093 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2094 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2094 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2095 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2096 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2096 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2097 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2097 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2098 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2098 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2099 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2099 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2100 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2101 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2101 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2102 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2102 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2103 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2103 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2104 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2104 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2105 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2106 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2106 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2107 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2107 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2108 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2108 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2109 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2110 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2110 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2111 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2112 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2112 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2113 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2113 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2114 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2115 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2115 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2116 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2117 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2117 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2118 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2119 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2120 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2121 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2121 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2122 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2123 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2124 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2125 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2125 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2126 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2127 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2128 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2128 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2129 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2130 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2131 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2132 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2132 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2133 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2134 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2135 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2136 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2136 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2137 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2138 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2139 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2140 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2140 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2141 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2142 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2143 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2144 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2144 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2145 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2146 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2147 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2147 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2148 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2149 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2150 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2151 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2151 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2152 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2153 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2154 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2155 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2155 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2156 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2157 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2158 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2159 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2159 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2160 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2161 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2162 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2163 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2163 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2164 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2165 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2166 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2167 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2167 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2168 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2169 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2170 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2170 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2171 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2172 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2173 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2174 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2174 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2175 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2176 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2177 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2178 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2178 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2179 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2180 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2181 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2182 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2182 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2183 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2184 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2184 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2185 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2186 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2187 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2188 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2189 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2189 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2190 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2191 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2192 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2193 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2193 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2194 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2195 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2196 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2197 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2197 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2198 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2199 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2199 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2200 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2201 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2201 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2202 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2203 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2203 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2204 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2205 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2205 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2206 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2207 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2207 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2208 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2208 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2209 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2210 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2211 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2212 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2212 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2213 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2214 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2215 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2215 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2216 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2216 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2217 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2218 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2219 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2219 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2220 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2220 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2221 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2222 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2223 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2223 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2224 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2225 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2226 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2226 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2227 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2227 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2228 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2229 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2230 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2230 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2231 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2231 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2232 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2233 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2234 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2234 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2235 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2235 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2236 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2236 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2237 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2237 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2238 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2238 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2239 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2239 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2240 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2240 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2241 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2241 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2242 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2242 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2243 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2243 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2244 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2244 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2245 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2245 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2246 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2246 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2247 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2247 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2248 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2248 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2249 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2249 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2250 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2250 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2251 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2251 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2252 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2252 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2253 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2253 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2254 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2254 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2255 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2255 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2256 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2256 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2257 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2257 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2258 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2258 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2259 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2259 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2260 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2260 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2261 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2261 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2262 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2262 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2263 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2263 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2264 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2264 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2265 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2265 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2266 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2266 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2267 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2267 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2268 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2268 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2269 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2269 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2270 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2270 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2271 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2271 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2272 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2272 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2273 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2273 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2274 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2274 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2275 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2275 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2276 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2276 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2277 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2277 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2278 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2278 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2279 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2279 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2280 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2280 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2281 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2281 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2282 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2282 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2283 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2283 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2284 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2284 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2285 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2285 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2286 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2286 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2287 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2287 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2288 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2288 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2289 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2289 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2290 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2290 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2291 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2291 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2292 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2292 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2293 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2293 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2294 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2294 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2295 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2295 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2296 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2296 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2297 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2297 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2298 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2298 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2299 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2299 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2300 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2300 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2301 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2301 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2302 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2302 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2303 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2303 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2304 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2304 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2305 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2305 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2306 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2306 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2307 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2307 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2308 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2308 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2309 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2309 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2310 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2310 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2311 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2311 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2312 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2312 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2313 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2313 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2314 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2314 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2315 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2315 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2316 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2316 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2317 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2317 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2318 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2318 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2319 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2319 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2320 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2320 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2321 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2321 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2322 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2322 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2323 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2323 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2324 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2324 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2325 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2325 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2326 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2326 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2327 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2327 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2328 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2328 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2329 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2329 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2330 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2330 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2331 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2331 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2332 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2332 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2333 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2333 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2334 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2334 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2335 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2335 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2336 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2336 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2337 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2337 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2338 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2338 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2339 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2339 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2340 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2340 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2341 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2341 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2342 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2342 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2343 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2344 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2344 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2345 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2345 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2346 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2347 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2348 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2349 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2349 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2350 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2351 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2352 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2352 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2353 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2353 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2354 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2355 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2356 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2356 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2357 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2357 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2358 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2359 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2360 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2360 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2361 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2361 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2362 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2362 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2363 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2363 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2364 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2364 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2365 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2365 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2366 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2366 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2367 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2367 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2368 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2368 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2369 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2369 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2370 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2370 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2371 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2371 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2372 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2373 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2374 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2374 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2375 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2375 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2376 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2377 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2378 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2378 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2379 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2379 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2380 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2381 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2381 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2382 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2382 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2383 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2383 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2384 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2385 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2385 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2386 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2386 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2387 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2388 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2388 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2389 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2389 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2390 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2390 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2391 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2392 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2392 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2393 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2393 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2394 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2394 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2395 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2395 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2396 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2396 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2397 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2397 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2398 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2398 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2399 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2399 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2400 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2400 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2401 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2401 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2402 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2402 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2403 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2403 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2404 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2404 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2405 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2405 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2406 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2406 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2407 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2407 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2408 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2408 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2409 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2409 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2410 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2410 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2411 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2411 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2412 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2412 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2413 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2413 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2414 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2414 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2415 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2415 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2416 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2416 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2417 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2417 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2418 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2418 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2419 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2419 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2420 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2420 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2421 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2421 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2422 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2422 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2423 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2423 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2424 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2424 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2425 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2425 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2426 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2426 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2427 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2427 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2428 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2428 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2429 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2429 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2430 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2430 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2431 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2432 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2432 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2433 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2433 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2434 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2434 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2435 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2436 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2436 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2437 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2437 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2438 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2439 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2440 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2440 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2441 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2441 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2442 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2443 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2443 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2444 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2444 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2445 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2446 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2447 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2447 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2448 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2448 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2449 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2450 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2451 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2451 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2452 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2452 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2453 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2454 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2455 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2455 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2456 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2456 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2457 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2458 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2458 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2459 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2460 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2461 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2462 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2462 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2463 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2464 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2465 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2466 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2466 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2467 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2468 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2469 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2470 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2470 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2471 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2472 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2473 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2474 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2474 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2475 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2476 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2477 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2477 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2478 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2479 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2480 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2481 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2481 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2482 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2483 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2484 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2485 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2485 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2486 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2487 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2488 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2489 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2489 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2490 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2491 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2492 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2492 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2493 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2494 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2495 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2496 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2496 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2497 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2498 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2499 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2500 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2500 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2501 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2502 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2503 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2504 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2504 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2505 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2506 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2507 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2507 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2508 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2509 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2510 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2511 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2511 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2512 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2513 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2514 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2515 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2515 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2516 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2517 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2518 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2519 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2519 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2520 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2521 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2522 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2523 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2523 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2524 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2525 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2526 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2526 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2527 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2528 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2529 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2530 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2530 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2531 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2532 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2533 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2534 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2534 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2535 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2536 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2537 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2538 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2538 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2539 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2540 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2541 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2542 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2542 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2543 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2544 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2545 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2545 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2546 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2547 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2548 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2548 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2549 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2549 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2550 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2550 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2551 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2551 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2552 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2552 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2553 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2553 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2554 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2554 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2555 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2555 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2556 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2556 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2557 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2557 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2558 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2558 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2559 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2559 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2560 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2560 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2561 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2561 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2562 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2562 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2563 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2563 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2564 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2564 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2565 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2565 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2566 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2566 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2567 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2567 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2568 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2569 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2570 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2571 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2571 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2572 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2572 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2573 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2573 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2574 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2574 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2575 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2576 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2577 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2578 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2579 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2579 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2580 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2581 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2582 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2583 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2584 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2585 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2586 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2587 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2588 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2589 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2590 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2591 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2591 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2592 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2593 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2594 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2595 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2596 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2597 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2598 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2599 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2600 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2601 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2601 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2602 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2603 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2603 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2604 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2605 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2606 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2607 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2608 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2609 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2610 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2611 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2612 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2613 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2614 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2615 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2615 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2616 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2617 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2618 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2619 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2620 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2621 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2621 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2622 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2622 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2623 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2623 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2624 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2625 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2626 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2627 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2628 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2628 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2629 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2629 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2630 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2630 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2631 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2632 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2633 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2634 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2635 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2636 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2637 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2638 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2638 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2639 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2640 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2641 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2642 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2643 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2644 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2645 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2646 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2647 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2648 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2649 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2650 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2650 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2651 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2652 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2653 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2654 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2655 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2656 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2657 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2658 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2659 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2660 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2661 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2662 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2662 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2663 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2664 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2665 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2666 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2667 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2668 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2669 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2670 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2670 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2671 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2671 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2672 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2672 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2673 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2674 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2675 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2676 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2676 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2677 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2677 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2678 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2678 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2679 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2679 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2680 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2681 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2682 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2683 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2684 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2684 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2685 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2686 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2686 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2687 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2688 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2689 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2690 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2691 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2691 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2692 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2692 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2693 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2694 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2695 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2696 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2696 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2697 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2698 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2698 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2699 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2699 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2700 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2700 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2701 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2701 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2702 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2703 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2704 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2705 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2706 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2706 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2707 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2707 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2708 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2708 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2709 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2710 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2711 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2712 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2713 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2714 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2715 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2715 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2716 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2716 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2717 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2717 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2718 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2718 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2719 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2719 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2720 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2720 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2721 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2721 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2722 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2722 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2723 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2723 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2724 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2724 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2725 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2725 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2726 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2726 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2727 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2727 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2728 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2728 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2729 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2729 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2730 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2730 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2731 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2731 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2732 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2732 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2733 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2733 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2734 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2734 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2735 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2735 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2736 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2736 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2737 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2737 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2738 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2738 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2739 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2739 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2740 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2740 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2741 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2741 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2742 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2742 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2743 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2743 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2744 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2745 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2746 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2747 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2747 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2748 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2749 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2750 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2751 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2751 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2752 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2753 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2754 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2754 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2755 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2756 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2757 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2758 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2758 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2759 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2760 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2761 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2762 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2762 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2763 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2764 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2765 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2766 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2766 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2767 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2768 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2769 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2769 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2770 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2771 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2772 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2773 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2773 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2774 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2775 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2776 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2777 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2777 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2778 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2779 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2780 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2781 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2781 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2782 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2783 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2784 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2784 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2785 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2786 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2787 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2788 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2788 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2789 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2790 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2791 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2792 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2792 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2793 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2794 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2795 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2796 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2796 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2797 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2798 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2799 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2800 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2800 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2801 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2802 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2803 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2803 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2804 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2805 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2805 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2806 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2806 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2807 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2807 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2808 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2809 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2810 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2810 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2811 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2811 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2812 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2813 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2814 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2814 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2815 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2815 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2816 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2817 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2817 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2818 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2818 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2819 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2820 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2821 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2821 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2822 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2822 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2823 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2824 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2825 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2825 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2826 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2826 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2827 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2828 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2829 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2829 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2830 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2830 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2831 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2832 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2832 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2833 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2833 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2834 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2835 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2836 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2836 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2837 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2837 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2838 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2839 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2839 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2840 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2840 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2841 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2841 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2842 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2843 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2843 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2844 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2845 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2845 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2846 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2846 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2847 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2847 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2848 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2849 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2849 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2850 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2850 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2851 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2851 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2852 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2852 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2853 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2853 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2854 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2855 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2856 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2856 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2857 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2858 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2859 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2860 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2860 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2861 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2862 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2862 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2863 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2863 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2864 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2864 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2865 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2866 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2866 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2867 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2867 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2868 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2869 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2870 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2870 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2871 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2871 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2872 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2873 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2873 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2874 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2875 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2875 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2876 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2877 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2877 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2878 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2879 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2879 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2880 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2881 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2881 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2882 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2882 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2883 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2883 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2884 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2885 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2885 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2886 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2886 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2887 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2888 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2889 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2890 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2890 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2891 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2891 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2892 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2892 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2893 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2893 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2894 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2894 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2895 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2895 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2896 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2896 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2897 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2897 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2898 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2898 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2899 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2899 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2900 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2900 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2901 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2901 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2902 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2902 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2903 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2903 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2904 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2904 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2905 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2905 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2906 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2906 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2907 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2907 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2908 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2908 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2909 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2909 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2910 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2910 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2911 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2911 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2912 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2912 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2913 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2913 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2914 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2914 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2915 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2915 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2916 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2916 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2917 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2917 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2918 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2918 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2919 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2919 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2920 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2920 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2921 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2921 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2922 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2922 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2923 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2923 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2924 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2924 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2925 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2925 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2926 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2926 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2927 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2927 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2928 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2928 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2929 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2929 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2930 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2930 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2931 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2931 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2932 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2932 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2933 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2933 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2934 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2934 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2935 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2935 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2936 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2936 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2937 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2937 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2938 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2938 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2939 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2939 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2940 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2940 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2941 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2941 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2942 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2942 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2943 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2943 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2944 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2944 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2945 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2945 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2946 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2946 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2947 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2947 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2948 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2948 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2949 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2949 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2950 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2950 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2951 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2951 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2952 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2952 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2953 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2953 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2954 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2954 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2955 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2955 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2956 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2956 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2957 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2957 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2958 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2958 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2959 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2959 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2960 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2961 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2962 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2963 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2963 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2964 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2964 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2965 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2965 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2966 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2966 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2967 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2968 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2969 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2970 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2971 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2972 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2972 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2973 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2973 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2974 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2975 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2975 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2976 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2977 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2978 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2979 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2980 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2981 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2982 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2983 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2984 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2985 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2986 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2987 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2987 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2988 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2989 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2990 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2991 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2992 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2993 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2994 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2995 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2996 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2997 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2998 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2999 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2999 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3000 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3001 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3001 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3002 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3003 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3004 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3005 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3006 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3007 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3008 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3009 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3010 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3011 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3011 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3012 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3013 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3013 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3014 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3014 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3015 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3015 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3016 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3017 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3018 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3019 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3020 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3021 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3021 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3022 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3022 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3023 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3024 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3025 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3026 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3027 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3028 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3029 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3029 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3030 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3031 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3032 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3033 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3034 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3034 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3035 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3035 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3036 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3037 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3038 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3039 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3040 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3041 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3042 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3042 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3043 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3043 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3044 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3044 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3045 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3046 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3046 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3047 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3048 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3049 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3049 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3050 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3050 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3051 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3051 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3052 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3053 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3054 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3055 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3056 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3057 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3058 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3058 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3059 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3059 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3060 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3060 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3061 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3061 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3062 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3062 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3063 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3063 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3064 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3064 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3065 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3065 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3066 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3066 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3067 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3067 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3068 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3068 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3069 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3069 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3070 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3070 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3071 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3071 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3072 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3072 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3073 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3073 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3074 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3074 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3075 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3075 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3076 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3076 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3077 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3077 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3078 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3078 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3079 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3079 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3080 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3080 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3081 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3081 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3082 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3082 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3083 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3083 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3084 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3084 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3085 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3085 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3086 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3086 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3087 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3088 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3088 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3089 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3089 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3090 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3091 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3091 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3092 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3092 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3093 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3093 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3094 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3095 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3096 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3096 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3097 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3097 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3098 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3099 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3099 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3100 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3100 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3101 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3101 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3102 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3103 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3103 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3104 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3104 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3105 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3106 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3107 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3107 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3108 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3108 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3109 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3110 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3110 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3111 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3111 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3112 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3112 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3113 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3114 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3115 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3115 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3116 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3117 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3118 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3118 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3119 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3120 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3121 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3122 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3122 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3123 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3124 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3125 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3126 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3126 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3127 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3128 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3129 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3130 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3130 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3131 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3132 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3133 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3134 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3134 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3135 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3136 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3137 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3138 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3138 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3139 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3140 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3141 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3141 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3142 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3143 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3144 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3145 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3145 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3146 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3147 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3148 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3149 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3149 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3150 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3151 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3152 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3153 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3153 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3154 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3155 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3156 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3157 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3157 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3158 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3159 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3160 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3160 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3161 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3162 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3163 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3164 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3164 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3165 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3166 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3167 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3168 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3168 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3169 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3170 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3171 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3172 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3173 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3174 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3175 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3175 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3176 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3177 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3178 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3178 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3179 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3179 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3180 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3181 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3182 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3182 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3183 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3183 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3184 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3184 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3185 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3186 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3187 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3187 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3188 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3189 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3189 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3190 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3190 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3191 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3192 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3193 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3193 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3194 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3194 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3195 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3196 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3197 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3197 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3198 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3198 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3199 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3199 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3200 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3201 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3201 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3202 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3202 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3203 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3203 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3204 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3205 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3205 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3206 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3207 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3207 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3208 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3208 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3209 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3209 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3210 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3211 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3212 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3212 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3213 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3213 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3214 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3215 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3215 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3216 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3216 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3217 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3217 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3218 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3219 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3219 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3220 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3220 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3221 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3222 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3223 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3223 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3224 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3224 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3225 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3226 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3226 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3227 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3227 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3228 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3228 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3229 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3230 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3230 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3231 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3231 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3232 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3232 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3233 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3234 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3235 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3235 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3236 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3236 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3237 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3238 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3239 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3239 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3240 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3241 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3242 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3242 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3243 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3243 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3244 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3244 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3245 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3246 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3247 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3248 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3249 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3249 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3250 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3250 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3251 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3251 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3252 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3253 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3253 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3254 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3254 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3255 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3255 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3256 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3256 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3257 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3257 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3258 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3258 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3259 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3259 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3260 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3260 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3261 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3261 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3262 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3262 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3263 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3263 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3264 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3264 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3265 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3266 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3267 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3268 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3268 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3269 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3269 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3270 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3270 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3271 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3271 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3272 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3273 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3274 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3275 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3276 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3276 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3277 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3277 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3278 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3278 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3279 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3280 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3280 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3281 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3282 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3283 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3284 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3284 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3285 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3285 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3286 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3287 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3288 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3289 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3290 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3291 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3291 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3292 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3292 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3293 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3293 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3294 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3295 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3296 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3297 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3298 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3298 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3299 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3299 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3300 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3300 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3301 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3302 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3302 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3303 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3303 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3304 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3304 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3305 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3305 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3306 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3306 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3307 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3307 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3308 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3308 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3309 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3309 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3310 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3310 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3311 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3311 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3312 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3312 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3313 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3313 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3314 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3314 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3315 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3315 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3316 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3316 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3317 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3318 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3318 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3319 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3319 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3320 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3320 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3321 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3322 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3323 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3324 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3325 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3325 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3326 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3326 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3327 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3327 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3328 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3329 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3330 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3331 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3332 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3333 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3333 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3334 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3334 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3335 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3335 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3336 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3337 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3337 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3338 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3339 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3340 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3340 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3341 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3341 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3342 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3342 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3343 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3343 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3344 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3344 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3345 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3345 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3346 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3346 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3347 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3347 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3348 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3348 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3349 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3349 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3350 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3350 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3351 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3351 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3352 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3352 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3353 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3353 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3354 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3354 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3355 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3355 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3356 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3356 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3357 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3357 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3358 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3358 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3359 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3359 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3360 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3360 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3361 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3362 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3363 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3363 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3364 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3364 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3365 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3365 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3366 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3367 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3368 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3369 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3369 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3370 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3371 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3371 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3372 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3372 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3373 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3373 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3374 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3374 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3375 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3375 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3376 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3376 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3377 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3377 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3378 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3378 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3379 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3379 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3380 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3380 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3381 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3381 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3382 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3382 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3383 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3383 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3384 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3384 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3385 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3385 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3386 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3386 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3387 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3387 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3388 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3388 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3389 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3389 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3390 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3390 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3391 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3391 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3392 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3393 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3394 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3394 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3395 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3395 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3396 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3396 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3397 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3398 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3399 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3400 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3400 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3401 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3401 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3402 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3402 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3403 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3403 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3404 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3405 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3405 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3406 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3406 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3407 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3407 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3408 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3408 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3409 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3410 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3410 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3411 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3412 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3413 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3413 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3414 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3414 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3415 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3416 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3417 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3418 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3418 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3419 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3420 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3420 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3421 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3421 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3422 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3423 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3424 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3425 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3426 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3427 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3428 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3429 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3430 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3430 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3431 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3432 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3432 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3433 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3433 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3434 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3434 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3435 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3436 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3436 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3437 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3437 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3438 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3439 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3440 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3440 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3441 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3441 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3442 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3443 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3444 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3444 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3445 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3446 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3447 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3447 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3448 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3448 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3449 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3450 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3451 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3451 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3452 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3452 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3453 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3454 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3455 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3455 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3456 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3456 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3457 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3458 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3459 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3459 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3460 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3461 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3462 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3463 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3463 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3464 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3465 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3466 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3467 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3467 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3468 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3469 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3470 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3471 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3471 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3472 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3473 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3474 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3474 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3475 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3476 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3477 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3478 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3478 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3479 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3480 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3481 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3482 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3482 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3483 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3484 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3485 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3486 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3486 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3487 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3488 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3489 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3489 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3490 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3491 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3492 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3493 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3493 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3494 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3495 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3496 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3497 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3497 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3498 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3499 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3500 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3501 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3501 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3502 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3503 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3504 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3505 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3505 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3506 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3507 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3508 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3509 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3509 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3510 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3511 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3512 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3513 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3514 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3515 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3516 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3516 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3517 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3518 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3519 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3520 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3520 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3521 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3522 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3523 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3524 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3524 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3525 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3526 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3527 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3528 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3528 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3529 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3530 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3531 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3532 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3533 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3534 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3535 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3535 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3536 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3537 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3538 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3539 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3539 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3540 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3541 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3542 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3543 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3543 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3544 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3545 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3545 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3546 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3547 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3547 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3548 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3548 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3549 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3549 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3550 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3550 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3551 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3552 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3552 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3553 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3554 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3554 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3555 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3556 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3556 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3557 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3558 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3558 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3559 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3559 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3560 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3561 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3562 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3562 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3563 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3563 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3564 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3565 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3566 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3566 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3567 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3567 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3568 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3568 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3569 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3569 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3570 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3570 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3571 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3571 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3572 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3572 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3573 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3573 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3574 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3574 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3575 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3575 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3576 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3576 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3577 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3578 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3578 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3579 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3580 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3581 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3582 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3583 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3584 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3585 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3586 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3587 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3588 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3589 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3590 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3590 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3591 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3592 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3593 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3594 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3595 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3596 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3597 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3598 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3599 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3600 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3601 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3601 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3602 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3602 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3603 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3603 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3604 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3605 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3606 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3607 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3607 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3608 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3609 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3610 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3611 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3612 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3613 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3614 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3615 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3616 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3617 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3618 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3619 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3619 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3620 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3621 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3621 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3622 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3623 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3624 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3625 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3626 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3627 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3628 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3628 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3629 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3630 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3631 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3631 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3632 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3633 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3634 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3635 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3636 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3637 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3638 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3639 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3640 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3641 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3642 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3643 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3643 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3644 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3645 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3646 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3647 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3648 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3649 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3650 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3650 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3651 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3651 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3652 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3652 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3653 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3654 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3655 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3656 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3657 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3658 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3658 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3659 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3659 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3660 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3661 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3662 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3663 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3664 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3665 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3666 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3666 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3667 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3668 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3669 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3670 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3670 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3671 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3671 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3672 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3673 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3674 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3675 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3676 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3677 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3677 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3678 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3678 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3679 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3680 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3681 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3682 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3683 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3684 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3685 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3686 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3686 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3687 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3688 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3689 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3690 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3690 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3691 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3691 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3692 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3692 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3693 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3694 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3695 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3696 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3697 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3698 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3698 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3699 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3699 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3700 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3700 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3701 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3701 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3702 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3703 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3704 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3704 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3705 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3706 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3706 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3707 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3707 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3708 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3708 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3709 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3710 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3711 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3712 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3712 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3713 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3714 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3715 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3715 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3716 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3716 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3717 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3717 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3718 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3718 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3719 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3719 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3720 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3720 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3721 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3721 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3722 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3722 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3723 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3723 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3724 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3724 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3725 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3725 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3726 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3726 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3727 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3727 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3728 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3728 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3729 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3729 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3730 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3730 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3731 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3731 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3732 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3732 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3733 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3733 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3734 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3734 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3735 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3735 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3736 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3736 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3737 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3737 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3738 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3738 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3739 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3739 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3740 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3740 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3741 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3741 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3742 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3742 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3743 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3743 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3744 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3744 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3745 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3745 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3746 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3746 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3747 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3747 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3748 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3748 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3749 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3749 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3750 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3750 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3751 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3751 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3752 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3752 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3753 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3753 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3754 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3754 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3755 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3755 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3756 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3756 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3757 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3757 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3758 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3758 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3759 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3759 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3760 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3760 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3761 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3761 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3762 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3762 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3763 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3763 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3764 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3764 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3765 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3765 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3766 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3766 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3767 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3767 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3768 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3768 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3769 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3769 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3770 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3770 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3771 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3771 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3772 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3772 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3773 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3774 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3775 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3776 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3776 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3777 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3778 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3779 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3780 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3780 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3781 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3782 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3783 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3783 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3784 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3784 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3785 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3786 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3787 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3787 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3788 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3789 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3790 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3791 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3791 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3792 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3793 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3794 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3794 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3795 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3796 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3797 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3798 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3798 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3799 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3800 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3801 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3802 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3802 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3803 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3803 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3804 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3805 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3805 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3806 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3806 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3807 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3807 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3808 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3809 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3810 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3810 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3811 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3812 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3813 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3813 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3814 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3814 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3815 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3815 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3816 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3817 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3817 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3818 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3818 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3819 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3820 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3821 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3821 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3822 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3822 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3823 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3824 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3825 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3825 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3826 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3827 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3828 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3828 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3829 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3829 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3830 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3831 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3832 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3832 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3833 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3834 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3835 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3836 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3836 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3837 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3838 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3839 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3839 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3840 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3840 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3841 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3842 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3843 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3843 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3844 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3845 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3846 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3846 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3847 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3847 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3848 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3849 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3850 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3850 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3851 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3851 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3852 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3853 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3853 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3854 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3854 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3855 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3856 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3856 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3857 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3858 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3858 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3859 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3860 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3860 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3861 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3862 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3862 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3863 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3863 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3864 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3864 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3865 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3866 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3866 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3867 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3867 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3868 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3869 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3870 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3870 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3871 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3871 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3872 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3873 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3873 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3874 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3875 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3875 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3876 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3877 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3877 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3878 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3879 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3879 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3880 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3881 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3881 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3882 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3883 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3883 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3884 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3885 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3885 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3886 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3887 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3888 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3888 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3889 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3890 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3890 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3891 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3891 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3892 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3892 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3893 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3893 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3894 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3894 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3895 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3895 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3896 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3896 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3897 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3897 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3898 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3898 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3899 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3899 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3900 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3900 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3901 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3901 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3902 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3902 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3903 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3903 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3904 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3904 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3905 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3905 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3906 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3906 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3907 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3907 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3908 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3908 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3909 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3909 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3910 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3910 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3911 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3911 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3912 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3912 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3913 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3913 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3914 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3914 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3915 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3915 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3916 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3916 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3917 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3917 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3918 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3918 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3919 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3919 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3920 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3920 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3921 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3921 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3922 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3922 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3923 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3923 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3924 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3924 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3925 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3925 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3926 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3926 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3927 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3927 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3928 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3928 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3929 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3929 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3930 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3930 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3931 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3931 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3932 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3932 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3933 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3933 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3934 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3934 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3935 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3935 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3936 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3936 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3937 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3937 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3938 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3938 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3939 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3939 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3940 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3940 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3941 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3941 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3942 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3942 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3943 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3943 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3944 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3944 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3945 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3945 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3946 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3946 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3947 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3947 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3948 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3948 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3949 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3949 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3950 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3950 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3951 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3951 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3952 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3952 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3953 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3953 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3954 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3954 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3955 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3955 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3956 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3956 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3957 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3957 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3958 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3958 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3959 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3959 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3960 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3960 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3961 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3961 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3962 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3962 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3963 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3963 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3964 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3964 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3965 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3965 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3966 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3966 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3967 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3967 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3968 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3968 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3969 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3970 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3971 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3972 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3973 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3974 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3975 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3976 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3977 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3977 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3978 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3979 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3980 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3981 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3982 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3983 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3984 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3985 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3986 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3987 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3988 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3989 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3989 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3990 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3991 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3992 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3993 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3994 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3994 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3995 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3995 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3996 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3997 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3998 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3999 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4000 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4001 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4001 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4002 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4002 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4003 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4004 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4004 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4005 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4006 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4007 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4008 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4009 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4010 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4011 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4012 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4013 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4013 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4014 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4015 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4016 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4017 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4017 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4018 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4019 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4020 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4021 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4022 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4023 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4024 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4025 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4026 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4027 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4028 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4029 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4029 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4030 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4031 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4032 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4033 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4034 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4035 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4035 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4036 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4037 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4038 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4039 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4040 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4041 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4041 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4042 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4042 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4043 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4043 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4044 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4044 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4045 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4046 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4047 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4048 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4048 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4049 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4049 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4050 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4050 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4051 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4051 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4052 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4053 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4054 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4055 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4056 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4056 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4057 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4058 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4058 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4059 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4059 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4060 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4060 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4061 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4061 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4062 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4062 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4063 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4063 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4064 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4064 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4065 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4065 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4066 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4066 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4067 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4067 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4068 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4068 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4069 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4069 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4070 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4070 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4071 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4071 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4072 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4072 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4073 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4073 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4074 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4074 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4075 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4075 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4076 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4076 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4077 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4077 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4078 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4078 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4079 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4079 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4080 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4080 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4081 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4081 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4082 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4082 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4083 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4083 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4084 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4084 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4085 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4085 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4086 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4086 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4087 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4087 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4088 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4088 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4089 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4089 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4090 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4090 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4091 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4091 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4092 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4092 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4093 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4093 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4094 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4094 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4095 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4095 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4096 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4096 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4097 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4097 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4098 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4098 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4099 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4099 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4100 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4100 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4101 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4101 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4102 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4102 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4103 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4103 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4104 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4104 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4105 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4105 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4106 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4106 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4107 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4107 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4108 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4108 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4109 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4109 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4110 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4110 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4111 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4111 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4112 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4112 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4113 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4113 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4114 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4114 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4115 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4115 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4116 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4117 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4117 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4118 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4119 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4120 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4121 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4121 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4122 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4123 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4124 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4125 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4125 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4126 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4127 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4128 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4128 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4129 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4130 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4131 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4132 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4132 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4133 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4134 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4135 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4136 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4136 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4137 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4138 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4139 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4140 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4140 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4141 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4142 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4143 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4143 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4144 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4145 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4146 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4147 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4147 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4148 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4149 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4150 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4151 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4151 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4152 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4153 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4154 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4155 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4155 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4156 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4157 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4158 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4159 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4159 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4160 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4161 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4162 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4162 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4163 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4164 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4165 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4166 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4166 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4167 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4168 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4169 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4170 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4170 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4171 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4172 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4173 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4174 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4174 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4175 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4176 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4177 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4178 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4178 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4179 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4180 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4181 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4181 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4182 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4182 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4183 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4184 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4184 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4185 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4185 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4186 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4187 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4188 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4189 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4189 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4190 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4191 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4192 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4193 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4193 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4194 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4195 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4196 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4197 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4197 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4198 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4199 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4199 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4200 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4200 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4201 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4201 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4202 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4203 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4203 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4204 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4204 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4205 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4205 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4206 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4207 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4207 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4208 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4208 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4209 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4210 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4211 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4212 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4212 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4213 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4214 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4215 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4215 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4216 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4216 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4217 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4218 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4219 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4219 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4220 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4220 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4221 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4222 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4223 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4223 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4224 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4225 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4226 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4226 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4227 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4227 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4228 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4229 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4230 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4230 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4231 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4231 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4232 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4233 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4234 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4234 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4235 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4235 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4236 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4236 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4237 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4237 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4238 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4238 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4239 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4239 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4240 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4240 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4241 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4241 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4242 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4242 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4243 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4243 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4244 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4244 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4245 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4245 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4246 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4246 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4247 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4247 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4248 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4248 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4249 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4249 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4250 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4250 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4251 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4251 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4252 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4252 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4253 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4253 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4254 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4254 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4255 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4255 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4256 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4256 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4257 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4257 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4258 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4258 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4259 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4259 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4260 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4260 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4261 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4261 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4262 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4262 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4263 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4263 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4264 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4264 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4265 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4265 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4266 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4266 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4267 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4267 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4268 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4268 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4269 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4269 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4270 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4270 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4271 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4271 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4272 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4272 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4273 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4273 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4274 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4274 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4275 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4275 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4276 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4276 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4277 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4277 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4278 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4278 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4279 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4279 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4280 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4280 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4281 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4281 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4282 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4282 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4283 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4283 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4284 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4284 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4285 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4285 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4286 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4286 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4287 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4287 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4288 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4288 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4289 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4289 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4290 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4290 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4291 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4291 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4292 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4292 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4293 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4293 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4294 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4294 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4295 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4295 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4296 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4296 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4297 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4297 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4298 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4298 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4299 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4299 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4300 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4300 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4301 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4301 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4302 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4302 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4303 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4303 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4304 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4304 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4305 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4305 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4306 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4306 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4307 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4307 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4308 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4308 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4309 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4309 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4310 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4310 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4311 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4311 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4312 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4312 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4313 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4313 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4314 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4314 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4315 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4315 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4316 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4316 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4317 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4317 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4318 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4318 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4319 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4319 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4320 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4320 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4321 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4321 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4322 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4322 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4323 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4323 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4324 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4324 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4325 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4325 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4326 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4326 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4327 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4327 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4328 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4328 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4329 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4329 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4330 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4330 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4331 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4331 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4332 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4332 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4333 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4333 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4334 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4334 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4335 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4335 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4336 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4336 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4337 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4337 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4338 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4338 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4339 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4339 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4340 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4340 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4341 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4341 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4342 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4342 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4343 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4344 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4344 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4345 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4345 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4346 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4347 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4348 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4349 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4349 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4350 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4351 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4352 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4352 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4353 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4353 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4354 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4355 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4356 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4356 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4357 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4357 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4358 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4359 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4360 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4360 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4361 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4362 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4363 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4363 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4364 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4364 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4365 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4365 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4366 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4367 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4368 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4369 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4369 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4370 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4371 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4372 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4372 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4373 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4373 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4374 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4374 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4375 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4375 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4376 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4376 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4377 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4377 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4378 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4378 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4379 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4379 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4380 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4380 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4381 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4381 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4382 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4382 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4383 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4383 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4384 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4384 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4385 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4385 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4386 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4386 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4387 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4387 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4388 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4388 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4389 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4389 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4390 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4390 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4391 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4391 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4392 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4393 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4394 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4394 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4395 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4396 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4396 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4397 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4398 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4399 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4400 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4400 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4401 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4401 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4402 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4402 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4403 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4403 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4404 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4405 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4405 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4406 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4406 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4407 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4407 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4408 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4408 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4409 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4410 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4411 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4412 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4413 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4413 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4414 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4414 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4415 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4416 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4417 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4418 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4418 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4419 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4420 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4420 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4421 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4421 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4422 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4423 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4424 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4425 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4426 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4427 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4428 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4429 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4430 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4430 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4431 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4431 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4432 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4432 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4433 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4433 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4434 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4434 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4435 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4435 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4436 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4436 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4437 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4437 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4438 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4438 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4439 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4439 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4440 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4440 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4441 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4441 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4442 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4442 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4443 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4443 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4444 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4444 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4445 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4445 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4446 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4446 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4447 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4447 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4448 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4448 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4449 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4449 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4450 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4450 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4451 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4451 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4452 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4452 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4453 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4453 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4454 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4454 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4455 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4455 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4456 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4456 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4457 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4457 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4458 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4458 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4459 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4460 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4461 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4462 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4462 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4463 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4464 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4465 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4466 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4466 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4467 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4468 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4469 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4469 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4470 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4471 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4472 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4473 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4473 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4474 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4475 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4476 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4477 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4477 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4478 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4479 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4480 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4481 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4481 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4482 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4483 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4484 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4484 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4485 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4486 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4487 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4488 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4488 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4489 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4490 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4491 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4492 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4492 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4493 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4494 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4495 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4496 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4496 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4497 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4498 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4499 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4499 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4500 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4501 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4502 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4503 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4503 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4504 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4505 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4506 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4507 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4507 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4508 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4509 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4510 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4510 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4511 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4512 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4513 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4514 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4514 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4515 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4516 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4517 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4518 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4518 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4519 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4520 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4521 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4522 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4522 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4523 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4524 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4525 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4526 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4526 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4527 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4528 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4529 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4529 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4530 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4531 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4532 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4533 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4533 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4534 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4535 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4536 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4537 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4537 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4538 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4539 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4540 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4541 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4541 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4542 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4543 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4544 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4545 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4545 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4546 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4547 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4548 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4548 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4549 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4549 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4550 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4551 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4552 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4552 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4553 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4554 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4555 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4556 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4556 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4557 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4558 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4559 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4559 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4560 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4561 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4562 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4562 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4563 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4563 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4564 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4565 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4566 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4566 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4567 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4567 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4568 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4568 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4569 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4569 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4570 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4570 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4571 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4571 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4572 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4572 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4573 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4573 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4574 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4574 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4575 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4575 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4576 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4576 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4577 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4577 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4578 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4578 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4579 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4579 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4580 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4580 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4581 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4581 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4582 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4582 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4583 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4583 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4584 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4584 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4585 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4585 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4586 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4586 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4587 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4587 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4588 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4588 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4589 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4589 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4590 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4590 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4591 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4591 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4592 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4592 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4593 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4593 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4594 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4594 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4595 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4595 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4596 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4596 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4597 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4597 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4598 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4598 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4599 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4599 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4600 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4600 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4601 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4601 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4602 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4602 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4603 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4603 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4604 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4604 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4605 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4605 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4606 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4606 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4607 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4607 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4608 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4608 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4609 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4609 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4610 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4610 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4611 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4611 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4612 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4612 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4613 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4613 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4614 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4614 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4615 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4615 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4616 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4616 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4617 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4617 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4618 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4618 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4619 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4619 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4620 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4620 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4621 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4621 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4622 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4622 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4623 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4623 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4624 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4624 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4625 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4625 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4626 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4626 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4627 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4627 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4628 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4628 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4629 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4629 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4630 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4630 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4631 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4631 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4632 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4632 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4633 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4633 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4634 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4634 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4635 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4635 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4636 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4636 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4637 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4637 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4638 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4638 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4639 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4639 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4640 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4640 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4641 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4641 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4642 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4642 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4643 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4643 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4644 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4644 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4645 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4645 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4646 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4646 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4647 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4647 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4648 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4648 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4649 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4649 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4650 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4650 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4651 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4651 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4652 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4652 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4653 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4653 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4654 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4654 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4655 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4655 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4656 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4656 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4657 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4657 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4658 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4658 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4659 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4659 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4660 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4660 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4661 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4661 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4662 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4662 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4663 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4663 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4664 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4664 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4665 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4665 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4666 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4666 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4667 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4667 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4668 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4668 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4669 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4669 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4670 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4670 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4671 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4671 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4672 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4672 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4673 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4673 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4674 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4674 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4675 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4675 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4676 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4676 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4677 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4677 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4678 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4678 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4679 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4679 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4680 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4680 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4681 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4681 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4682 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4682 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4683 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4683 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4684 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4684 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4685 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4685 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4686 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4686 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4687 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4687 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4688 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4688 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4689 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4689 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4690 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4690 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4691 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4691 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4692 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4692 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4693 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4693 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4694 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4694 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4695 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4695 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4696 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4696 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4697 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4697 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4698 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4698 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4699 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4699 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4700 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4700 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4701 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4701 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4702 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4702 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4703 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4703 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4704 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4704 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4705 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4705 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4706 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4706 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4707 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4707 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4708 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4708 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4709 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4709 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4710 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4710 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4711 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4711 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4712 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4712 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4713 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4713 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4714 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4714 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4715 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4716 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4716 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4717 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4717 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4718 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4719 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4719 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4720 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4721 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4721 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4722 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4723 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4724 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4724 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4725 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4726 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4727 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4727 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4728 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4728 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4729 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4729 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4730 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4731 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4732 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4732 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4733 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4733 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4734 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4735 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4736 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4736 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4737 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4738 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4739 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4739 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4740 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4740 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4741 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4742 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4743 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4743 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4744 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4745 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4746 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4747 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4747 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4748 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4749 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4750 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4750 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4751 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4752 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4753 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4754 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4754 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4755 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4756 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4757 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4758 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4758 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4759 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4760 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4761 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4762 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4762 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4763 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4764 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4765 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4765 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4766 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4767 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4768 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4769 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4769 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4770 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4771 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4772 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4773 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4773 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4774 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4775 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4776 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4777 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4777 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4778 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4779 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4780 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4781 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4781 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4782 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4783 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4784 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4784 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4785 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4786 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4787 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4788 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4788 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4789 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4790 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4791 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4792 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4792 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4793 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4794 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4795 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4796 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4796 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4797 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4798 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4799 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4799 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4800 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4801 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4801 (2 ms) [----------] 4802 tests from TLSVersionRanges/TestPolicyVersionRange (7191 ms total) [----------] 16 tests from AllHashFuncs/TlsHkdfTest [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 Hash = SHA-256 Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 Hash = SHA-384 Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 Hash = SHA-256 Output: [32] 416c5392b9f36df188e90eb14d17bf0da190bfdb7f1f4956e6e566a569c8b15c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 Hash = SHA-384 Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 Hash = SHA-256 Output: [32] 16af00543a56c826a2a7fcb634668afd36dc8ecec4d26c7adce370363d60fa0b [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 Hash = SHA-384 Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 Hash = SHA-256 Output: [32] a568025a95c97f5538bcf797cc0fd5f6a88d15bc0e8574703ca365bd76cf9fd3 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 Hash = SHA-384 Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 Hash = SHA-256 Output: [32] 3e4e6ed0bcc4f4fff0f569d06c1e0e1032aad7a3eff6a8658ebeeec71f016d3c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 Hash = SHA-384 Output: [48] 41ea77098c900410ecbc37d85b54cd7b08151320ed1e3f5474f78b0638280637... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/0 Hash = SHA-256 Output: [32] b70800e38e486891b10f5e6f22536b846975aaa32ae7deaac3d1b405225c68f5 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/1 Hash = SHA-384 Output: [48] 13d3369f3c78a03240ee16e9111266c751add83ca1a39774d745ffa7889e5217... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/0 [ OK ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/1 [ OK ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/0 [ OK ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/1 [ OK ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/1 (0 ms) [----------] 16 tests from AllHashFuncs/TlsHkdfTest (1 ms total) [----------] 28 tests from EchAgentTest/TlsAgentEchTest [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/1 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.LongEchConfig/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.LongEchConfig/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.LongEchConfig/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.LongEchConfig/1 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/1 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/1 (0 ms) [----------] 28 tests from EchAgentTest/TlsAgentEchTest (10 ms total) [----------] 34 tests from Tls13PskTest/Tls13PskTest [ RUN ] Tls13PskTest/Tls13PskTest.NormalExternal/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.NormalExternal/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.NormalExternal/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.NormalExternal/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.KeyTooLarge/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.KeyTooLarge/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.KeyTooLarge/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.KeyTooLarge/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 0303ca409ce2175eb0033c51cefaa1d2afc1faf3e0e36dc4fa3f0a1b529df9a8... handshake new: [92] 0303ca409ce2175eb0033c51cefaa1d2afc1faf3e0e36dc4fa3f0a1b529df9a8... record old: [96] 0200005c0303ca409ce2175eb0033c51cefaa1d2afc1faf3e0e36dc4fa3f0a1b... record new: [96] 0200005c0303ca409ce2175eb0033c51cefaa1d2afc1faf3e0e36dc4fa3f0a1b... server: Filtered packet: [215] 16030300600200005c0303ca409ce2175eb0033c51cefaa1d2afc1faf3e0e36d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] fefd65895c66aa16e0aee06b902a1e1b70549d995738e7fcbc94cf29ab2737d6... handshake new: [92] fefd65895c66aa16e0aee06b902a1e1b70549d995738e7fcbc94cf29ab2737d6... record old: [104] 0200005c000000000000005cfefd65895c66aa16e0aee06b902a1e1b70549d99... record new: [104] 0200005c000000000000005cfefd65895c66aa16e0aee06b902a1e1b70549d99... server: Filtered packet: [269] 16fefd000000000000000000680200005c000000000000005cfefd65895c66aa... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.LabelMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.LabelMismatch/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.LabelMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.LabelMismatch/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/0 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/1 (9 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/0 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/1 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ClientOnly/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ClientOnly/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropKexModes/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [508] 0303072351d65f07dde7f4aabbcb7832a96de1d4afb98b07d000417e29de2e30... handshake new: [502] 0303072351d65f07dde7f4aabbcb7832a96de1d4afb98b07d000417e29de2e30... record old: [512] 010001fc0303072351d65f07dde7f4aabbcb7832a96de1d4afb98b07d000417e... record new: [506] 010001f60303072351d65f07dde7f4aabbcb7832a96de1d4afb98b07d000417e... client: Filtered packet: [511] 16030101fa010001f60303072351d65f07dde7f4aabbcb7832a96de1d4afb98b... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropKexModes/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropKexModes/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [263] fefd5afa89bd4befd6abe5a63e1d625772fab4d770446c6b87d07631f73f2381... handshake new: [257] fefd5afa89bd4befd6abe5a63e1d625772fab4d770446c6b87d07631f73f2381... record old: [275] 010001070000000000000107fefd5afa89bd4befd6abe5a63e1d625772fab4d7... record new: [269] 010001010000000000000101fefd5afa89bd4befd6abe5a63e1d625772fab4d7... client: Filtered packet: [282] 16feff0000000000000000010d010001010000000000000101fefd5afa89bd4b... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropKexModes/1 (2 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d002046bc3072e558ca4d4114344dd70c8d8229b94144b95fc47a4248a628... handshake old: [92] 030303ced5daef7930ae81f94bca11b28c70361e68476eff81aa4acb2bc2fc58... handshake new: [52] 030303ced5daef7930ae81f94bca11b28c70361e68476eff81aa4acb2bc2fc58... record old: [96] 0200005c030303ced5daef7930ae81f94bca11b28c70361e68476eff81aa4acb... record new: [56] 02000034030303ced5daef7930ae81f94bca11b28c70361e68476eff81aa4acb... server: Filtered packet: [175] 160303003802000034030303ced5daef7930ae81f94bca11b28c70361e68476e... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d00205b3c038eddf841af9acb2155cdc729eeacef2cb374de1d2d537dfd89... handshake old: [92] fefd3b45573f8765839c25af8aa8d4c1177f7ce12591bba880cf9941f3675794... handshake new: [52] fefd3b45573f8765839c25af8aa8d4c1177f7ce12591bba880cf9941f3675794... record old: [104] 0200005c000000000000005cfefd3b45573f8765839c25af8aa8d4c1177f7ce1... record new: [64] 020000340000000000000034fefd3b45573f8765839c25af8aa8d4c1177f7ce1... server: Filtered packet: [229] 16fefd00000000000000000040020000340000000000000034fefd3b45573f87... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0000 extension new: [2] 0001 handshake old: [92] 0303f11739ec48d2b247a6c1677ae25df54ff33efd9c1a57270eb39ba159d3c9... handshake new: [92] 0303f11739ec48d2b247a6c1677ae25df54ff33efd9c1a57270eb39ba159d3c9... record old: [96] 0200005c0303f11739ec48d2b247a6c1677ae25df54ff33efd9c1a57270eb39b... record new: [96] 0200005c0303f11739ec48d2b247a6c1677ae25df54ff33efd9c1a57270eb39b... server: Filtered packet: [215] 16030300600200005c0303f11739ec48d2b247a6c1677ae25df54ff33efd9c1a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_PRE_SHARED_KEY: SSL received an invalid PreSharedKey extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0000 extension new: [2] 0001 handshake old: [92] fefdf2be4f7a3c424cbbe17ea30069c9de726ca9f17bba5fce1269a509ab2a5b... handshake new: [92] fefdf2be4f7a3c424cbbe17ea30069c9de726ca9f17bba5fce1269a509ab2a5b... record old: [104] 0200005c000000000000005cfefdf2be4f7a3c424cbbe17ea30069c9de726ca9... record new: [104] 0200005c000000000000005cfefdf2be4f7a3c424cbbe17ea30069c9de726ca9... server: Filtered packet: [269] 16fefd000000000000000000680200005c000000000000005cfefdf2be4f7a3c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_PRE_SHARED_KEY: SSL received an invalid PreSharedKey extension. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.PreferEpsk/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.PreferEpsk/0 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.PreferEpsk/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.PreferEpsk/1 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/0 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/1 (9 ms) [ RUN ] Tls13PskTest/Tls13PskTest.BadConfigValues/0 Version: TLS 1.3 [ OK ] Tls13PskTest/Tls13PskTest.BadConfigValues/0 (0 ms) [ RUN ] Tls13PskTest/Tls13PskTest.BadConfigValues/1 Version: DTLS 1.3 [ OK ] Tls13PskTest/Tls13PskTest.BadConfigValues/1 (0 ms) [ RUN ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/0 (2 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/1 (2 ms) [----------] 34 tests from Tls13PskTest/Tls13PskTest (142 ms total) [----------] 12 tests from Tls13PskTestWithCiphers/Tls13PskTestWithCiphers [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/0 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/1 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/2 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/3 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/4 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/4 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/5 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/5 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/0 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/1 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/2 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/3 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/4 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/4 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/5 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/5 (4 ms) [----------] 12 tests from Tls13PskTestWithCiphers/Tls13PskTestWithCiphers (43 ms total) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileTest [ RUN ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/0 Version: DTLS 1.0 [ OK ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/0 (82 ms) [ RUN ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/1 Version: DTLS 1.2 [ OK ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/1 (81 ms) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileTest (163 ms total) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileTest [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/0 Version: TLS 1.0 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/0 (82 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/1 Version: TLS 1.1 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/1 (82 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/2 Version: TLS 1.2 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/2 (82 ms) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileTest (246 ms total) [----------] 1 test from KeyLogFileTLS13/KeyLogFileTest [ RUN ] KeyLogFileTLS13/KeyLogFileTest.KeyLogFile/0 Version: TLS 1.3 [ OK ] KeyLogFileTLS13/KeyLogFileTest.KeyLogFile/0 (86 ms) [----------] 1 test from KeyLogFileTLS13/KeyLogFileTest (86 ms total) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileUnsetTest [ RUN ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/0 Version: DTLS 1.0 [ OK ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/0 (81 ms) [ RUN ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/1 Version: DTLS 1.2 [ OK ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/1 (81 ms) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileUnsetTest (162 ms total) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileUnsetTest [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/0 Version: TLS 1.0 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/0 (82 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/1 Version: TLS 1.1 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/1 (80 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/2 Version: TLS 1.2 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/2 (81 ms) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileUnsetTest (243 ms total) [----------] 1 test from KeyLogFileTLS13/KeyLogFileUnsetTest [ RUN ] KeyLogFileTLS13/KeyLogFileUnsetTest.KeyLogFile/0 Version: TLS 1.3 [ OK ] KeyLogFileTLS13/KeyLogFileUnsetTest.KeyLogFile/0 (85 ms) [----------] 1 test from KeyLogFileTLS13/KeyLogFileUnsetTest (85 ms total) [----------] Global test environment tear-down [==========] 12780 tests from 103 test suites ran. (71193 ms total) [ PASSED ] 12278 tests. [ SKIPPED ] 502 tests, listed below: [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 [ SKIPPED ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 [ SKIPPED ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 [ SKIPPED ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 [ SKIPPED ] StreamOnly/TlsConnectStream.ShortRead/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 [ SKIPPED ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/1 YOU HAVE 64 DISABLED TESTS ssl_gtest.sh: #26: ssl_gtests ran successfully - PASSED DEBUG: Falling back to legacy XML report parsing using only sed TIMESTAMP ssl_gtests END: Tue Aug 3 00:58:37 UTC 2021 Running tests for policy TIMESTAMP policy BEGIN: Tue Aug 3 00:58:37 UTC 2021 policy.sh: CRYPTO-POLICY =============================== policy.sh: running "Standard policy" ---------------------------- policy.sh: policy: "disallow=ALL allow=HMAC-SHA256:HMAC-SHA1:HMAC-SHA384:HMAC-SHA512:SECP256R1:SECP384R1:SECP521R1:aes256-gcm:chacha20-poly1305:aes256-cbc:camellia256-cbc:aes128-gcm:aes128-cbc:camellia128-cbc:SHA256:SHA384:SHA512:SHA1:ECDHE-RSA:ECDHE-ECDSA:RSA:DHE-RSA:rsa-pkcs:rsa-pss:ecdsa:tls-version-min=tls1.0:dtls-version-min=dtls1.0:DH-MIN=1023:DSA-MIN=2048:RSA-MIN=2048" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: PRIME256V1 is enabled for KX NSS-POLICY-INFO: PRIME256V1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP256R1 is enabled for KX NSS-POLICY-INFO: SECP256R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA1 is enabled for KX NSS-POLICY-INFO: SHA1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA256 is enabled for KX NSS-POLICY-INFO: SHA256 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA384 is enabled for KX NSS-POLICY-INFO: SHA384 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA512 is enabled for KX NSS-POLICY-INFO: SHA512 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: HMAC-SHA1 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: AES128-CBC is enabled for SSL NSS-POLICY-INFO: AES256-CBC is enabled for SSL NSS-POLICY-INFO: AES128-GCM is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CAMELLIA128-CBC is enabled for SSL NSS-POLICY-INFO: CAMELLIA256-CBC is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: RSA-PSS is enabled for KX NSS-POLICY-INFO: RSA-PSS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: ECDSA is enabled for KX NSS-POLICY-INFO: ECDSA is enabled for CERT-SIGNATURE NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 15 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 11 NSS-POLICY-INFO: NUMBER-OF-CERT-SIG: 11 NSS-POLICY-INFO: NUMBER-OF-ECC: 4 NSS-POLICY-INFO: NUMBER-OF-HASH: 4 NSS-POLICY-INFO: NUMBER-OF-MAC: 4 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 7 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 4 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 3 NSS-POLICY-INFO: ciphersuite TLS_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 28 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 policy.sh: #1: "Standard policy" produced a returncode of 0, expected is 0 - PASSED NSS-POLICY-INFO: LOADED-SUCCESSFULLY policy.sh: #2: "Standard policy" output is expected to match "NSS-POLICY-INFO.*LOADED-SUCCESSFULLY" - PASSED policy.sh: running "Legacy policy" ---------------------------- policy.sh: policy: "disallow=ALL allow=HMAC-SHA1:HMAC-SHA256:HMAC-SHA384:HMAC-SHA512:SECP256R1:SECP384R1:SECP521R1:aes256-gcm:chacha20-poly1305:aes256-cbc:camellia256-cbc:aes128-gcm:aes128-cbc:camellia128-cbc:des-ede3-cbc:rc4:SHA256:SHA384:SHA512:SHA1:ECDHE-RSA:ECDHE-ECDSA:RSA:DHE-RSA:DHE-DSS:rsa-pkcs:rsa-pss:ecdsa:tls-version-min=tls1.0:dtls-version-min=tls1.0:DH-MIN=1023:DSA-MIN=1023:RSA-MIN=1023" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: PRIME256V1 is enabled for KX NSS-POLICY-INFO: PRIME256V1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP256R1 is enabled for KX NSS-POLICY-INFO: SECP256R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA1 is enabled for KX NSS-POLICY-INFO: SHA1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA256 is enabled for KX NSS-POLICY-INFO: SHA256 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA384 is enabled for KX NSS-POLICY-INFO: SHA384 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA512 is enabled for KX NSS-POLICY-INFO: SHA512 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: HMAC-SHA1 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: AES128-CBC is enabled for SSL NSS-POLICY-INFO: AES256-CBC is enabled for SSL NSS-POLICY-INFO: AES128-GCM is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CAMELLIA128-CBC is enabled for SSL NSS-POLICY-INFO: CAMELLIA256-CBC is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: DES-EDE3-CBC is enabled for SSL NSS-POLICY-INFO: RC4 is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: DHE-DSS is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: RSA-PSS is enabled for KX NSS-POLICY-INFO: RSA-PSS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: ECDSA is enabled for KX NSS-POLICY-INFO: ECDSA is enabled for CERT-SIGNATURE NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 16 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 13 NSS-POLICY-INFO: NUMBER-OF-CERT-SIG: 11 NSS-POLICY-INFO: NUMBER-OF-ECC: 4 NSS-POLICY-INFO: NUMBER-OF-HASH: 4 NSS-POLICY-INFO: NUMBER-OF-MAC: 4 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 9 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 5 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 3 NSS-POLICY-INFO: ciphersuite TLS_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_RC4_128_SHA is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 34 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 policy.sh: #3: "Legacy policy" produced a returncode of 0, expected is 0 - PASSED NSS-POLICY-INFO: LOADED-SUCCESSFULLY policy.sh: #4: "Legacy policy" output is expected to match "NSS-POLICY-INFO.*LOADED-SUCCESSFULLY" - PASSED policy.sh: running "Reduced policy" ---------------------------- policy.sh: policy: "disallow=ALL allow=HMAC-SHA256:HMAC-SHA384:HMAC-SHA512:SECP384R1:SECP521R1:aes256-gcm:chacha20-poly1305:SHA384:SHA512:ECDHE-RSA:ECDHE-ECDSA:RSA:DHE-RSA:rsa-pkcs:rsa-pss:ecdsa:tls-version-min=tls1.2:dtls-version-min=dtls1.2:DH-MIN=3072:DSA-MIN=3072:RSA-MIN=3072" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA384 is enabled for KX NSS-POLICY-INFO: SHA384 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SHA512 is enabled for KX NSS-POLICY-INFO: SHA512 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: RSA-PSS is enabled for KX NSS-POLICY-INFO: RSA-PSS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: ECDSA is enabled for KX NSS-POLICY-INFO: ECDSA is enabled for CERT-SIGNATURE NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 11 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 5 NSS-POLICY-INFO: NUMBER-OF-CERT-SIG: 7 NSS-POLICY-INFO: NUMBER-OF-ECC: 2 NSS-POLICY-INFO: NUMBER-OF-HASH: 2 NSS-POLICY-INFO: NUMBER-OF-MAC: 3 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 2 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 4 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 3 NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 9 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 2 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 1 policy.sh: #5: "Reduced policy" produced a returncode of 0, expected is 0 - PASSED NSS-POLICY-INFO: LOADED-SUCCESSFULLY policy.sh: #6: "Reduced policy" output is expected to match "NSS-POLICY-INFO.*LOADED-SUCCESSFULLY" - PASSED policy.sh: running "Missing value" ---------------------------- policy.sh: policy: "disallow=ALL allow=dtls-version-min=:dtls-version-max=" NSS-POLICY-FAIL dtls-version-min=: unknown value: NSS-POLICY-FAIL: policy config parsing failed, not loading module Policy Error: failed to load policy file NSS-POLICY-FAIL policy.sh: #7: "Missing value" produced a returncode of 2, expected is 2 - PASSED NSS-POLICY-FAIL dtls-version-min=: unknown value: NSS-POLICY-FAIL: policy config parsing failed, not loading module Policy NSS-POLICY-FAIL policy.sh: #8: "Missing value" output is expected to match "NSS-POLICY-FAIL" - PASSED policy.sh: running "Invalid value" ---------------------------- policy.sh: policy: "disallow=ALL allow=RSA-MIN=whatever" NSS-POLICY-FAIL RSA-MIN=whatever: unknown value: whatever NSS-POLICY-FAIL: policy config parsing failed, not loading module Policy Error: failed to load policy file NSS-POLICY-FAIL policy.sh: #9: "Invalid value" produced a returncode of 2, expected is 2 - PASSED NSS-POLICY-FAIL RSA-MIN=whatever: unknown value: whatever NSS-POLICY-FAIL: policy config parsing failed, not loading module Policy NSS-POLICY-FAIL policy.sh: #10: "Invalid value" output is expected to match "NSS-POLICY-FAIL" - PASSED policy.sh: running "Invalid identifier" ---------------------------- policy.sh: policy: "disallow=ALL allow=flower" NSS-POLICY-FAIL allow: unknown identifier: flower NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-FAIL policy.sh: #11: "Invalid identifier" produced a returncode of 2, expected is 2 - PASSED NSS-POLICY-FAIL allow: unknown identifier: flower NSS-POLICY-FAIL policy.sh: #12: "Invalid identifier" output is expected to match "NSS-POLICY-FAIL" - PASSED policy.sh: running "disallow all" ---------------------------- policy.sh: policy: "disallow=all" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #13: "disallow all" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 policy.sh: #14: "disallow all" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-CERT-SIG" - PASSED policy.sh: running "disallow all signatures" ---------------------------- policy.sh: policy: "disallow=all/signature" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: PRIME192V1 is enabled for KX NSS-POLICY-INFO: PRIME192V2 is enabled for KX NSS-POLICY-INFO: PRIME192V3 is enabled for KX NSS-POLICY-INFO: PRIME239V1 is enabled for KX NSS-POLICY-INFO: PRIME239V2 is enabled for KX NSS-POLICY-INFO: PRIME239V3 is enabled for KX NSS-POLICY-INFO: PRIME256V1 is enabled for KX NSS-POLICY-INFO: SECP112R1 is enabled for KX NSS-POLICY-INFO: SECP112R2 is enabled for KX NSS-POLICY-INFO: SECP128R1 is enabled for KX NSS-POLICY-INFO: SECP128R2 is enabled for KX NSS-POLICY-INFO: SECP160K1 is enabled for KX NSS-POLICY-INFO: SECP160R1 is enabled for KX NSS-POLICY-INFO: SECP160R2 is enabled for KX NSS-POLICY-INFO: SECP192K1 is enabled for KX NSS-POLICY-INFO: SECP192R1 is enabled for KX NSS-POLICY-INFO: SECP224K1 is enabled for KX NSS-POLICY-INFO: SECP256K1 is enabled for KX NSS-POLICY-INFO: SECP256R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: CURVE25519 is enabled for KX NSS-POLICY-INFO: C2PNB163V1 is enabled for KX NSS-POLICY-INFO: C2PNB163V2 is enabled for KX NSS-POLICY-INFO: C2PNB163V3 is enabled for KX NSS-POLICY-INFO: C2PNB176V1 is enabled for KX NSS-POLICY-INFO: C2TNB191V1 is enabled for KX NSS-POLICY-INFO: C2TNB191V2 is enabled for KX NSS-POLICY-INFO: C2TNB191V3 is enabled for KX NSS-POLICY-INFO: C2ONB191V4 is enabled for KX NSS-POLICY-INFO: C2ONB191V5 is enabled for KX NSS-POLICY-INFO: C2PNB208W1 is enabled for KX NSS-POLICY-INFO: C2TNB239V1 is enabled for KX NSS-POLICY-INFO: C2TNB239V2 is enabled for KX NSS-POLICY-INFO: C2TNB239V3 is enabled for KX NSS-POLICY-INFO: C2ONB239V4 is enabled for KX NSS-POLICY-INFO: C2ONB239V5 is enabled for KX NSS-POLICY-INFO: C2PNB272W1 is enabled for KX NSS-POLICY-INFO: C2PNB304W1 is enabled for KX NSS-POLICY-INFO: C2TNB359V1 is enabled for KX NSS-POLICY-INFO: C2PNB368W1 is enabled for KX NSS-POLICY-INFO: C2TNB431R1 is enabled for KX NSS-POLICY-INFO: SECT113R1 is enabled for KX NSS-POLICY-INFO: SECT131R1 is enabled for KX NSS-POLICY-INFO: SECT131R1 is enabled for KX NSS-POLICY-INFO: SECT131R2 is enabled for KX NSS-POLICY-INFO: SECT163K1 is enabled for KX NSS-POLICY-INFO: SECT163R1 is enabled for KX NSS-POLICY-INFO: SECT163R2 is enabled for KX NSS-POLICY-INFO: SECT193R1 is enabled for KX NSS-POLICY-INFO: SECT193R2 is enabled for KX NSS-POLICY-INFO: SECT233K1 is enabled for KX NSS-POLICY-INFO: SECT233R1 is enabled for KX NSS-POLICY-INFO: SECT239K1 is enabled for KX NSS-POLICY-INFO: SECT283K1 is enabled for KX NSS-POLICY-INFO: SECT283R1 is enabled for KX NSS-POLICY-INFO: SECT409K1 is enabled for KX NSS-POLICY-INFO: SECT409R1 is enabled for KX NSS-POLICY-INFO: SECT571K1 is enabled for KX NSS-POLICY-INFO: SECT571R1 is enabled for KX NSS-POLICY-INFO: SHA1 is enabled for KX NSS-POLICY-INFO: SHA224 is enabled for KX NSS-POLICY-INFO: SHA256 is enabled for KX NSS-POLICY-INFO: SHA384 is enabled for KX NSS-POLICY-INFO: SHA512 is enabled for KX NSS-POLICY-INFO: HMAC-SHA1 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA224 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: HMAC-MD5 is enabled for SSL NSS-POLICY-INFO: AES128-CBC is enabled for SSL NSS-POLICY-INFO: AES192-CBC is enabled for SSL NSS-POLICY-INFO: AES256-CBC is enabled for SSL NSS-POLICY-INFO: AES128-GCM is enabled for SSL NSS-POLICY-INFO: AES192-GCM is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CAMELLIA128-CBC is enabled for SSL NSS-POLICY-INFO: CAMELLIA192-CBC is enabled for SSL NSS-POLICY-INFO: CAMELLIA256-CBC is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: SEED-CBC is enabled for SSL NSS-POLICY-INFO: DES-EDE3-CBC is enabled for SSL NSS-POLICY-INFO: DES-40-CBC is enabled for SSL NSS-POLICY-INFO: DES-CBC is enabled for SSL NSS-POLICY-INFO: NULL-CIPHER is enabled for SSL NSS-POLICY-INFO: RC2 is enabled for SSL NSS-POLICY-INFO: RC4 is enabled for SSL NSS-POLICY-INFO: IDEA is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: RSA-EXPORT is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: DHE-DSS is enabled for KX NSS-POLICY-INFO: DH-RSA is enabled for KX NSS-POLICY-INFO: DH-DSS is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: ECDH-ECDSA is enabled for KX NSS-POLICY-INFO: ECDH-RSA is enabled for KX NSS-POLICY-INFO: DSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PSS is enabled for KX NSS-POLICY-INFO: ECDSA is enabled for KX NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 79 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 24 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-INFO: NUMBER-OF-ECC: 60 NSS-POLICY-INFO: NUMBER-OF-HASH: 5 NSS-POLICY-INFO: NUMBER-OF-MAC: 6 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 18 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 10 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 4 NSS-POLICY-INFO: ciphersuite TLS_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_GCM_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_128_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_CBC_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_3DES_EDE_CBC_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_RC4_128_SHA is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_RC4_128_MD5 is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 35 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #15: "disallow all signatures" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 policy.sh: #16: "disallow all signatures" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-CERT-SIG" - PASSED policy.sh: running "No Hashes" ---------------------------- policy.sh: policy: "disallow=ALL allow=HMAC-SHA256:HMAC-SHA384:HMAC-SHA512:SECP384R1:SECP521R1:aes256-gcm:chacha20-poly1305:ECDHE-RSA:ECDHE-ECDSA:RSA:DHE-RSA:rsa-pkcs:tls-version-min=tls1.2:dtls-version-min=dtls1.2:DH-MIN=3072:DSA-MIN=3072:RSA-MIN=3072" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-INFO: SECP384R1 is enabled for KX NSS-POLICY-INFO: SECP384R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: SECP521R1 is enabled for KX NSS-POLICY-INFO: SECP521R1 is enabled for CERT-SIGNATURE NSS-POLICY-INFO: HMAC-SHA256 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA384 is enabled for SSL NSS-POLICY-INFO: HMAC-SHA512 is enabled for SSL NSS-POLICY-INFO: AES256-GCM is enabled for SSL NSS-POLICY-INFO: CHACHA20-POLY1305 is enabled for SSL NSS-POLICY-INFO: RSA is enabled for KX NSS-POLICY-INFO: DHE-RSA is enabled for KX NSS-POLICY-INFO: ECDHE-ECDSA is enabled for KX NSS-POLICY-INFO: ECDHE-RSA is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for KX NSS-POLICY-INFO: RSA-PKCS is enabled for CERT-SIGNATURE NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 7 NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 5 NSS-POLICY-INFO: NUMBER-OF-CERT-SIG: 3 NSS-POLICY-INFO: NUMBER-OF-ECC: 2 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-INFO: NUMBER-OF-MAC: 3 NSS-POLICY-INFO: NUMBER-OF-CIPHER: 2 NSS-POLICY-INFO: NUMBER-OF-OTHER-KX: 4 NSS-POLICY-INFO: NUMBER-OF-OTHER-SIGN: 1 NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 is enabled NSS-POLICY-INFO: ciphersuite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: ciphersuite TLS_RSA_WITH_AES_256_GCM_SHA384 is enabled NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 9 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 2 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 1 NSS-POLICY-WARN policy.sh: #17: "No Hashes" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-HASH: 0 policy.sh: #18: "No Hashes" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-HASH" - PASSED policy.sh: running "All TLS versions disabled" ---------------------------- policy.sh: policy: "disallow=ALL allow=tls-version-min=0:tls-version-max=0" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-WARN: NUMBER-OF-TLS-VERSIONS: 0 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #19: "All TLS versions disabled" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-TLS-VERSIONS: 0 policy.sh: #20: "All TLS versions disabled" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-TLS-VERSIONS" - PASSED policy.sh: running "All DTLS versions disabled" ---------------------------- policy.sh: policy: "disallow=ALL allow=dtls-version-min=0:dtls-version-max=0" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-WARN: NUMBER-OF-DTLS-VERSIONS: 0 NSS-POLICY-WARN policy.sh: #21: "All DTLS versions disabled" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-DTLS-VERSIONS: 0 policy.sh: #22: "All DTLS versions disabled" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-DTLS-VERSIONS" - PASSED policy.sh: running "Invalid range of TLS versions" ---------------------------- policy.sh: policy: "disallow=ALL allow=tls-version-min=tls1.2:tls-version-max=tls1.1" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-WARN: NUMBER-OF-TLS-VERSIONS: 0 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #23: "Invalid range of TLS versions" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-TLS-VERSIONS: 0 policy.sh: #24: "Invalid range of TLS versions" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-TLS-VERSIONS" - PASSED policy.sh: running "Invalid range of DTLS versions" ---------------------------- policy.sh: policy: "disallow=ALL allow=dtls-version-min=tls1.2:dtls-version-max=tls1.1" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-WARN: NUMBER-OF-DTLS-VERSIONS: 0 NSS-POLICY-WARN policy.sh: #25: "Invalid range of DTLS versions" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-WARN: NUMBER-OF-DTLS-VERSIONS: 0 policy.sh: #26: "Invalid range of DTLS versions" output is expected to match "NSS-POLICY-WARN.*NUMBER-OF-DTLS-VERSIONS" - PASSED policy.sh: running "Valid range of TLS versions" ---------------------------- policy.sh: policy: "disallow=ALL allow=tls-version-min=tls1.1:tls-version-max=tls1.2" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 2 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #27: "Valid range of TLS versions" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 2 policy.sh: #28: "Valid range of TLS versions" output is expected to match "NSS-POLICY-INFO.*NUMBER-OF-TLS-VERSIONS" - PASSED policy.sh: running "Valid range of DTLS versions" ---------------------------- policy.sh: policy: "disallow=ALL allow=dtls-version-min=tls1.1:dtls-version-max=tls1.2" NSS-POLICY-INFO: LOADED-SUCCESSFULLY NSS-POLICY-WARN: NUMBER-OF-SSL-ALG-KX: 0 NSS-POLICY-WARN: NUMBER-OF-SSL-ALG: 0 NSS-POLICY-WARN: NUMBER-OF-CERT-SIG: 0 NSS-POLICY-WARN: NUMBER-OF-ECC: 0 NSS-POLICY-WARN: NUMBER-OF-HASH: 0 NSS-POLICY-WARN: NUMBER-OF-MAC: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHER: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-KX: 0 NSS-POLICY-WARN: NUMBER-OF-OTHER-SIGN: 0 NSS-POLICY-WARN: NUMBER-OF-CIPHERSUITES: 0 NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 4 NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 NSS-POLICY-WARN policy.sh: #29: "Valid range of DTLS versions" produced a returncode of 1, expected is 1 - PASSED NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2 policy.sh: #30: "Valid range of DTLS versions" output is expected to match "NSS-POLICY-INFO.*NUMBER-OF-DTLS-VERSIONS" - PASSED TIMESTAMP policy END: Tue Aug 3 00:58:37 UTC 2021 policy.sh: Testing with non-threadsafe softoken =============================== Running test cycle: THREAD_UNSAFE ---------------------- List of tests that will be executed: ssl ssl_gtests Running tests for ssl TIMESTAMP ssl BEGIN: Tue Aug 3 00:58:37 UTC 2021 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #81: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_server -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #87: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #113: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ext_client -i /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #116: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 803665d49680549a627f79eff35fbd719074b019 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 0fa3d1ead064edfd7efe4067684a18598c39ab7c -s CN=orphan -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:4c:af:89:1b:4d:79:9b:7a:f1:c0:f4:5c:c6:82:62: 8d:e0:0f:77:d3:f9:58:81:a2:69:8c:b5:e2:af:05:60: a4:05:71:53:15:0f:39:c8:1b:3a:21:ec:e4:09:ce:7d: b6:c4:b1:af:b7:f9:6e:bb:53:5d:cc:48:56:32:bc:a6: 86:e7:aa:02:c7:99:fc:27:c8:21:35:34:c6:4b:66:d3: 04:d5:40:84:78:34:cd:d7:77:d8:51:bb:05:82:21:b8: 78:f6:8a:da:ab:19:ab:d2:01:cd:1f:b2:e6:cc:cc:aa: d4:72:7c:bb:4d:9c:a9:94:49:7a:01:9e:e2:4a:0b:87: 0f:9f:32:85:d5:c5:e4:7c:1a:ea:37:a8:b6:d1:cb:4d: c9:47:5b:81:4e:c9:59:a5:9f:a9:b7:ec:22:bd:65:20: fd:14:1c:11:a4:ea:3e:30:f6:37:ab:a3:b9:05:e2:1f: 9c:3f:5f:85:21:23:35:0f:41:0b:ed:09:95:04:da:25: 14:68:f1:45:9d:51:d2:ed:79:e2:25:d3:db:86:67:d9: af:1f:77:1a:0e:d1:8c:a5:4a:eb:bd:a8:ca:07:b7:19: 68:d8:fc:61:01:af:f7:aa:79:b4:65:43:a5:19:70:cc: 2d:69:cc:78:79:fa:6d:5b:94:1d:d3:67:08:6f:fa:b9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:09:6c:44:47:9c:26:b1:6e:88:6c:4a:a0:83:ce:9a: f2:48:98:4a:2f:4b:1d:66:70:e3:90:35:ab:e7:e4:8c: 8c:eb:b9:0c:e0:e7:cd:ab:f9:53:1b:5a:69:d7:b4:57: bf:ef:5a:21:4e:d4:77:77:68:20:b6:ed:1d:a7:1a:77: 2a:9f:12:3f:e9:81:6c:fd:c8:ae:7e:2a:49:f1:35:97: c0:5c:c7:5c:7f:a7:7d:b8:25:b6:b7:65:0d:6e:14:da: 34:44:74:3d:4a:d9:40:b5:f6:36:80:0b:1b:dc:07:db: 8c:7f:06:68:0b:2e:17:ac:fc:ec:07:f6:df:53:e4:df: 93:05:ee:1c:f1:04:b1:24:ba:5b:3e:f5:89:44:e7:86: 2c:12:cb:e5:86:d6:36:5d:96:14:24:3c:e5:3e:5d:45: 19:27:f8:f7:f9:73:af:5f:c9:bc:17:7b:01:b1:f7:b9: 0d:3e:1c:22:9c:5e:a2:69:b6:48:5b:7d:e5:97:16:36: bf:56:b3:0f:0b:0e:1e:bf:5c:c9:ec:a0:3d:78:42:9e: 90:41:8c:08:b5:24:da:99:f4:16:71:67:13:4c:47:18: af:9c:70:97:aa:d0:e3:50:ab:74:d8:b0:7d:d4:a1:bb: 5c:88:c1:7a:66:20:26:7a:34:2a:30:a5:16:c7:84:f3 Fingerprint (SHA-256): 24:C8:23:9B:79:FC:B0:DE:44:BA:29:1C:33:31:98:22:CC:03:2E:FA:CE:4A:39:80:F1:5E:A1:A1:4F:78:62:F6 Fingerprint (SHA1): 72:83:EA:8F:02:AE:73:D3:D8:04:BC:EE:55:6E:B9:85:95:91:15:41 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Verify that small RSA exponents still work ============== cert.sh: Attempt to generate a key with exponent of 3 -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -z ../tests_noise -f ../tests.pw Generating key. This may take a few moments... cert.sh: #289: Attempt to generate a key with exponent of 3 - PASSED cert.sh: Attempt to generate a key with exponent of 17 -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -z ../tests_noise -f ../tests.pw Generating key. This may take a few moments... cert.sh: #290: Attempt to generate a key with exponent of 17 - PASSED cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw cert.sh: #291: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #292: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #293: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #294: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #295: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #296: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #297: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #298: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #299: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #300: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #301: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #302: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw cert.sh: #303: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #304: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #305: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #306: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #307: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #308: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #309: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #310: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #311: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #312: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #313: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #314: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #315: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #316: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #317: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #318: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #319: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #320: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #321: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #322: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #323: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #324: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #325: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt1 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:4e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:26 2021 Not After : Wed Nov 03 00:59:26 2021 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:99:bf:73:8e:c7:09:83:6b:60:45:b1:94:b7:01:fc: 9f:09:41:ed:41:22:9d:cf:ae:14:b8:ab:66:d7:55:e4: bc:f3:4c:1f:3e:84:a0:dc:78:d9:d7:0e:57:ce:90:0f: f3:f3:bc:5c:70:53:b7:2f:ce:11:64:87:42:28:10:cf: 7b:55:f7:5e:09:9d:f1:3e:89:7d:28:9c:52:05:27:d0: df:fb:f9:ba:ed:dc:77:d8:04:ad:d8:19:fd:d9:9d:d0: d1:a6:97:1c:76:de:ea:12:c4:59:b1:5b:e7:cf:9b:8a: 64:7a:bc:5e:76:6f:64:07:c6:37:30:b8:4a:38:4a:9a: df:c6:6d:0f:f0:d7:93:2d:cb:d8:18:bc:a0:da:27:0a: ff:c5:b0:3b:23:ca:81:8d:4f:6d:46:24:f6:fc:78:18: 0d:f0:12:64:9b:8c:36:fe:0d:19:f7:3c:0b:c6:a0:e8: 81:29:f4:30:76:31:44:99:e4:26:3c:1f:be:61:d3:5b: 61:2f:74:72:d9:73:b4:6f:1d:4f:b8:5c:b8:41:a7:db: a9:12:72:6d:37:92:f9:ad:6b:b5:d2:2e:67:58:d4:af: a3:33:c2:1a:e7:81:63:78:72:d7:15:72:9f:f2:2b:01: 36:2a:63:64:17:3b:3a:87:ab:ea:d1:28:9d:e6:88:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:06:f6:84:69:b5:f3:34:a8:07:3a:ec:45:2d:ad:d1: d3:ac:e3:67:85:f6:8a:4b:81:b0:63:45:2a:50:d5:c9: 78:43:40:ab:76:23:07:29:87:fd:02:00:64:48:0d:88: be:50:4d:0b:58:37:91:90:77:0b:01:c2:f4:3c:a3:50: 1e:ff:22:40:cb:5d:62:e4:28:c5:6d:9c:35:ea:a4:29: 69:19:63:f0:07:eb:cf:ed:33:8d:fb:64:61:c1:44:a4: 26:c2:6c:62:20:56:9b:64:d2:09:71:a3:b4:2b:0d:39: 2f:91:ed:39:0f:12:34:ba:47:7d:41:43:f9:17:53:fe: 1e:2c:f0:54:85:ac:cd:47:f4:c5:80:52:17:ac:64:93: c2:d6:e5:2a:a4:e5:33:39:e0:9c:bf:8a:5a:13:87:8c: e6:10:69:56:39:02:2f:18:53:9f:e2:67:a5:8d:28:2a: 38:c5:6f:7c:6a:08:f6:4f:db:b5:03:b9:15:3a:9c:a1: ee:28:2f:f7:8c:59:cd:99:68:f6:95:f8:8f:ba:9f:0a: 16:07:65:8f:e3:84:b3:22:d8:5f:ef:0a:76:5a:12:b6: 35:3f:0a:32:ac:41:cc:a8:bd:b3:6a:15:0c:e7:7e:be: cf:3e:58:9b:1c:ec:d8:e6:eb:e0:90:c8:db:6a:9c:2d Fingerprint (SHA-256): FE:DA:38:59:B8:EC:9E:F8:9E:D4:E5:A0:02:7F:E4:D4:8D:6F:6C:83:97:D1:47:F8:A0:1E:6B:0B:F8:C4:6B:4B Fingerprint (SHA1): E5:12:7D:A8:A4:65:90:B4:38:47:A1:8E:25:2D:AA:37:36:AE:9C:9B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #326: Certificate Key Usage Extension (1) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt2 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:50 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:27 2021 Not After : Wed Nov 03 00:59:27 2021 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:24:82:4f:82:aa:37:ad:9f:0d:f0:12:61:ef:e0:14: a5:58:6a:94:ca:19:df:94:94:28:c8:19:c7:83:9a:4d: 7a:09:57:66:a9:63:b1:b7:fe:ae:cb:27:92:91:8d:a9: f1:31:5e:d5:99:01:1b:2b:36:ae:e2:ee:23:62:15:80: 63:72:dc:9b:c6:d0:36:46:d7:93:79:9b:ee:c6:d5:ea: 68:da:12:2d:71:98:30:f4:9d:31:06:59:77:e7:f2:7e: 1d:86:92:98:20:6b:1a:c9:cd:53:5a:6e:fa:0b:20:dc: 89:c5:d1:dc:76:e6:c3:f6:e5:d7:37:62:66:98:da:a5: fb:d8:5e:9f:21:33:82:f9:09:2b:8c:fa:b3:89:71:d9: 45:f2:8f:a9:ea:06:e6:d8:ac:1d:aa:ab:7d:e0:80:9e: c0:45:96:a8:21:eb:a9:8f:e8:d4:48:d9:51:f0:bc:5a: 23:4a:cd:b7:33:17:7b:80:b6:3b:93:5e:8f:32:2f:ef: 51:2e:8b:e5:fe:16:84:4d:87:62:21:6f:a7:2d:96:e4: 4b:00:db:32:b5:ed:a4:8f:06:1c:ce:26:bc:4a:7b:89: ec:60:dc:26:ee:e6:8f:b9:7c:fc:54:5f:1c:ad:37:be: 58:29:b3:05:54:0b:cc:a6:ea:ca:09:1c:6c:16:6f:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:e1:de:fd:73:ea:7c:d6:5b:5a:2b:d2:fd:7f:61:72: 15:5b:78:15:6e:67:43:6c:9a:c2:1c:6f:27:7c:57:19: 61:4a:67:e7:ef:13:1f:35:4b:bf:7f:eb:80:d0:ea:fd: 4f:52:a4:f4:58:f8:ba:8a:59:95:d7:d5:e8:a1:cb:19: d0:3d:3d:70:18:fb:ea:e6:96:ed:1a:e8:52:9c:ad:9d: 5d:73:32:52:c5:f1:fc:5a:cf:b8:ec:d0:c4:d4:2d:29: 6d:16:2f:c0:23:ad:68:f9:bb:bc:d5:f9:48:98:ce:73: d4:de:df:03:aa:f0:38:11:9b:7c:a4:5d:71:9f:20:f2: e7:ff:97:d8:8e:cf:6d:21:36:14:ea:69:e6:62:eb:2a: 4d:ab:0b:65:3c:cf:78:f8:84:e0:15:ad:25:6a:c6:a7: 25:6a:34:21:ed:b9:e0:c8:2d:82:1e:ed:12:23:b1:3d: 84:42:97:cf:d1:31:a6:c6:2e:ce:d4:82:bd:c5:7b:52: bb:23:4d:e6:53:f4:32:56:5b:d4:dc:25:ab:a1:22:89: 8d:a8:67:92:2c:62:36:1f:98:70:32:25:38:ee:3d:54: 2f:78:57:e5:ea:5a:3a:3c:28:00:bf:bc:73:9f:cb:16: 8a:3d:ed:65:10:98:03:93:0d:bf:da:8d:5a:20:73:ff Fingerprint (SHA-256): 16:D8:B1:C7:19:CF:0C:EB:E0:61:5C:23:47:18:FB:79:95:EA:B6:84:87:05:CF:5B:B2:6A:E4:33:4B:13:A6:97 Fingerprint (SHA1): 15:92:5D:AF:36:9A:36:40:37:E9:9C:6A:FD:27:27:AE:40:DC:BD:14 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #327: Certificate Key Usage Extension (2) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt3 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:52 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:28 2021 Not After : Wed Nov 03 00:59:28 2021 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:c5:de:e7:07:ed:e9:04:a4:9c:08:e9:02:c0:88:55: d5:68:dc:15:92:48:5a:8d:c4:83:75:91:52:d2:f7:bb: 09:54:b3:59:d2:df:31:45:8a:0b:f4:5d:4b:c4:3c:82: 1e:59:95:f5:3a:76:da:a5:ae:34:7e:2b:f2:06:5c:50: 6a:85:a8:24:a0:2a:c3:da:12:03:f1:50:36:a4:db:0e: 46:ec:99:51:fb:d2:f5:af:37:da:85:79:85:23:23:00: 65:1b:69:8e:06:23:e8:85:fa:25:2e:ac:b1:40:72:14: c2:04:21:8c:37:bd:cf:d9:7c:68:44:d2:67:90:7c:4c: a9:ad:fc:09:92:39:3c:27:b2:49:e4:c5:2f:da:86:bc: 84:0d:76:d4:eb:48:3c:55:3f:41:8e:7f:da:ac:79:7f: cf:ce:c3:de:94:e3:ea:9c:60:81:08:1c:c4:8b:59:bb: 13:9f:96:96:0a:e8:22:ab:66:58:b0:6d:44:88:41:2b: ed:40:58:80:d2:69:3f:3d:3a:4d:be:3f:72:f0:e8:85: f8:ce:04:7b:1b:2e:9e:3a:b5:7d:b8:4b:1b:fb:9e:92: bf:e0:0b:a1:59:e8:63:2c:b1:8f:53:b8:e1:a3:71:9b: 4f:9f:1e:e6:7b:17:1f:57:8e:36:59:bd:2c:36:7d:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:f8:3d:cb:3f:b2:40:30:06:a4:2c:92:27:27:c1:16: 1f:aa:5c:10:b7:42:64:be:82:3e:df:7a:74:e4:ef:b5: 4e:50:df:a9:73:80:a8:1f:0c:b8:a1:a8:76:80:fd:84: 6a:0f:a7:4c:ca:42:8a:99:50:fd:ab:ec:fc:30:e7:90: 57:67:41:ec:d4:15:cb:67:8f:f7:d0:5c:32:47:6e:3e: 50:3c:d2:f4:4f:4a:6e:fa:74:39:a9:87:89:3a:a4:57: ac:4b:3e:dc:25:bf:d1:ee:32:44:1b:14:e6:a3:eb:c3: 2a:38:bf:43:17:90:8d:44:02:74:fa:0b:f3:8c:9b:4b: c9:c8:77:e2:4d:4e:ba:f0:2d:31:a2:f3:a9:95:8c:7c: 48:2e:51:80:68:01:e3:cd:33:27:12:fc:e6:88:8e:06: 23:dc:50:4f:94:25:75:93:9f:5d:83:1f:5c:83:8d:18: 14:74:3d:fc:b7:92:0b:d7:77:9e:42:5e:1f:ac:1c:ce: 0e:ae:ec:ab:b1:89:3a:1e:27:2f:09:28:72:1e:de:25: 61:bd:92:a5:c6:ff:2b:32:a7:29:8e:d2:3d:5f:be:3a: eb:fe:12:06:eb:11:75:fd:5c:21:34:ff:24:a8:7e:74: 21:cb:04:ae:09:12:24:0a:4d:39:d5:6d:e5:4c:12:c3 Fingerprint (SHA-256): 55:0A:49:70:C7:F1:89:70:71:61:D4:F2:9C:4E:95:60:DB:8B:19:E8:81:AB:02:31:42:60:4F:A7:24:D0:76:9A Fingerprint (SHA1): 27:73:6B:9E:FA:92:5D:0A:90:EF:87:65:FC:D7:3C:91:33:F8:FF:E9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #328: Certificate Basic Constraints Extension (3) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt4 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:54 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:29 2021 Not After : Wed Nov 03 00:59:29 2021 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:10:c8:c6:5e:7d:56:59:46:5e:b5:47:05:55:dc:ca: 12:86:87:35:29:ba:41:40:b2:98:c5:04:97:d8:f1:37: 7b:f5:2c:86:14:b6:f1:8f:2a:d7:94:b4:8a:79:5d:23: b8:17:c7:9e:41:7f:78:50:36:8c:b9:37:53:03:b5:57: f1:3e:39:33:a1:c4:a2:63:77:60:75:63:21:78:0e:7e: b5:a7:60:00:3c:f2:a0:c4:06:b2:8a:43:33:05:3a:de: 9c:10:56:33:8b:4f:d2:ed:59:7c:b8:13:35:00:fe:d2: 22:21:36:b6:bb:c9:84:16:66:28:91:d5:38:1a:fa:75: b0:cd:bb:24:78:b4:e9:a6:41:97:c0:e9:9e:16:8b:d2: 81:4a:18:2c:18:e3:91:96:cf:9e:04:70:37:db:bc:fa: a2:68:79:19:b8:b3:07:8f:20:ed:7b:0e:68:a3:92:7d: 5c:16:3a:23:b8:14:fb:70:9e:fd:ae:69:12:45:5f:9c: 08:1f:97:3d:ab:fe:46:f3:3b:ac:ea:60:ed:d4:2c:7c: 39:32:df:d5:10:72:70:9d:4b:5c:b8:73:15:40:a4:d2: ce:d5:70:f3:07:bd:8c:a3:9d:1b:0f:54:82:f0:a9:46: bd:bf:f6:41:93:f6:fe:2b:9b:38:2e:38:ae:73:c4:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:b6:2c:8f:ad:0c:c4:79:44:d6:8c:71:50:45:31:49: 00:49:55:fa:58:99:f2:fd:33:a1:be:50:75:13:82:b9: 60:ab:68:e1:e7:57:47:a8:65:fc:5e:75:fd:86:6f:80: 8d:87:1c:f2:02:de:7e:1e:04:7f:51:e9:b9:32:cd:3a: 00:17:b5:76:60:d1:c0:89:90:6f:97:4b:77:45:29:66: 78:77:c1:35:b5:ba:c8:71:09:1e:e4:28:a2:a4:d7:ad: 54:ce:d8:45:28:5a:e4:32:25:a4:94:06:c6:0c:51:51: c3:a5:ed:52:1b:35:f8:71:66:91:57:6d:b8:96:66:9d: a1:de:b3:dc:bb:c1:19:ab:c8:58:32:47:3a:e2:0a:94: fe:e2:f8:be:10:39:0c:2d:ee:bd:4a:5f:06:b2:20:99: bf:fc:5d:0f:92:81:08:2b:9e:10:9f:34:3d:86:1a:4a: c9:c0:8e:4f:50:55:7a:3c:77:a4:f8:15:8e:62:66:aa: 77:69:73:41:b4:aa:64:0e:9e:0b:eb:32:90:c2:62:db: 78:27:bf:64:70:33:58:33:ac:11:e0:91:ed:70:73:77: 9f:05:b0:b2:d0:37:7b:81:48:42:4f:27:bb:c9:56:73: 6c:54:71:bc:a8:4c:3e:6d:e7:f8:28:98:6f:e2:dc:25 Fingerprint (SHA-256): D3:5C:FA:50:25:92:EA:CB:13:82:36:A0:23:0C:A8:3B:7E:B0:36:63:6A:5C:51:53:7C:C8:A4:A8:DD:2C:46:70 Fingerprint (SHA1): 98:4C:C6:A7:DA:82:EF:4E:80:D2:D5:7B:A2:67:02:78:5C:51:51:F8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #329: Certificate Basic Constraints Extension (4) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt5 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:56 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:30 2021 Not After : Wed Nov 03 00:59:30 2021 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:d8:56:22:5c:3f:c4:ef:4e:3b:4a:51:47:23:03:4e: 4c:ff:9e:fb:61:4e:1d:62:8b:2e:03:d3:99:40:ee:5b: 61:d3:18:bd:ab:0e:c1:fa:3e:6c:14:8f:58:12:f0:1e: 69:3e:d2:da:49:07:27:57:ae:37:2a:57:7a:49:73:c0: 15:05:5d:ad:49:46:93:0d:66:20:1b:8b:65:38:04:14: 6b:a4:a4:9c:4d:82:da:49:45:af:7f:8c:6f:46:1b:c9: b6:d3:0c:a0:4b:dc:52:b1:29:e2:28:b0:07:10:2d:04: 49:d0:d7:88:4d:63:ff:14:0e:1d:9e:98:58:d8:2c:cf: fc:87:a0:eb:f0:57:3e:dc:cf:7d:3d:fe:2d:b5:0f:11: 32:7d:1d:87:fe:85:9f:dd:4e:fd:89:d3:3f:ec:69:b3: 07:f7:21:cb:ca:8b:19:98:8d:1e:a5:0f:8a:4b:63:46: b5:1a:40:4e:ad:17:e4:74:92:51:d3:e5:6a:1b:14:82: 14:ea:85:72:dd:17:b0:18:0a:5d:ef:03:4f:df:f8:4e: 90:fa:6c:a5:48:69:13:c9:ee:fa:bb:78:cc:9e:46:db: 52:47:33:65:fd:90:e0:3e:8e:6c:5c:f0:27:54:52:b6: 53:3f:34:c7:de:d6:20:fa:05:db:d1:75:d2:ed:d2:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:e6:4c:d5:1f:25:dc:44:e8:75:e8:be:a8:54:d4:77: 59:41:24:b6:b2:35:32:56:83:7b:6c:19:5c:6c:99:fd: 40:f8:72:92:a4:2f:70:dd:33:5c:a5:9b:c3:5c:66:d4: 92:6e:d2:6a:c1:99:42:7f:7a:97:f8:c9:d6:11:46:a1: 63:96:98:bd:73:7f:1d:57:de:75:05:23:de:c8:c3:9b: c4:58:9c:4b:45:78:c9:b6:79:3d:2d:6c:9e:c7:59:09: 92:e4:31:99:24:32:ca:63:4d:0e:ff:f8:fc:79:f5:91: 3f:7a:81:48:7b:26:d8:fe:01:52:af:85:3d:7a:57:32: 12:ff:58:93:72:f7:fd:96:b4:87:c7:ac:3a:8a:47:5d: b5:76:48:48:e2:67:19:08:c1:6f:83:0b:8a:ea:3c:7d: e8:1a:e0:49:28:94:41:c1:3b:79:db:ec:47:bd:a9:bc: d9:e3:6e:7a:f4:a9:a9:b2:0f:76:3f:83:b8:88:1f:d8: ef:5f:23:45:47:a2:bc:96:a3:0b:2f:e5:ab:4a:b8:d6: b9:c4:ac:a4:62:2d:51:63:07:5d:e2:eb:47:2e:db:35: 44:34:bd:a5:1c:ec:b0:97:d9:97:7e:b1:81:d4:f6:01: b0:d0:71:0b:36:40:64:71:4b:b1:5d:af:e5:be:aa:e8 Fingerprint (SHA-256): 88:2B:AF:06:15:DC:F9:11:A4:DC:9E:60:A1:EA:1D:2A:36:CC:5B:8D:AF:29:35:A1:1F:74:F4:0C:41:63:2B:DE Fingerprint (SHA1): DD:C4:CE:7C:5B:36:DA:D9:B1:82:C7:3E:15:57:F4:04:01:E7:47:B3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #330: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt6 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:57 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:31 2021 Not After : Wed Nov 03 00:59:31 2021 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:af:71:49:21:11:09:c2:09:fe:46:2f:be:2a:37:8b: d5:14:46:aa:58:55:f7:c8:2a:37:85:1c:ce:bd:c8:93: 50:7c:e0:4e:9f:d7:3e:79:f8:a9:1e:77:ac:90:f4:22: a6:7d:16:a2:0d:4e:94:d1:62:f3:88:31:9e:38:e8:e1: 3b:96:a2:73:70:b6:95:5a:a0:d4:35:e4:ae:1f:f0:1c: b4:20:4e:69:1e:21:e2:0d:1c:df:c4:e6:94:86:af:1d: 97:3b:40:06:eb:eb:49:a0:b3:4e:c4:88:a7:24:a5:97: 43:2b:00:8b:71:85:5d:5b:30:1a:25:f1:eb:73:fd:55: f2:19:da:2b:43:5a:6c:7d:f7:e9:26:7a:d4:2f:95:fd: 2f:65:e6:80:7a:28:68:d1:9a:98:b1:03:f2:fa:fd:4a: c6:8f:9c:d5:fc:80:21:a2:18:ee:c2:ef:7b:61:5c:9e: 49:0d:5b:f0:49:4c:da:d0:27:e8:25:d1:b6:17:47:5b: ec:a6:d3:8e:56:e1:37:61:23:71:f4:62:85:50:d0:59: 66:60:55:98:1c:2d:5f:79:ca:9f:67:48:e9:92:b2:2d: 90:f7:a9:70:6f:13:31:7b:77:a8:fa:a2:94:db:49:76: 67:f3:77:d7:1f:1f:65:eb:d9:e2:d1:ac:6c:78:e6:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:5a:d1:8f:0b:f3:cc:83:40:e4:41:da:df:19:fa:7b: be:8f:64:ea:c6:26:31:4c:b9:40:39:4d:49:f8:d0:1a: 96:49:01:b6:36:c2:a3:d1:d1:2e:60:00:b5:c4:65:44: 04:8f:f6:e5:10:7d:5e:1b:6c:f8:17:63:b4:7f:61:f0: df:4d:78:58:9c:90:00:68:4a:04:26:f2:01:a8:db:7b: 96:93:54:80:18:de:6b:90:c6:8c:45:11:63:6c:67:d3: ce:d6:f0:1b:c8:50:be:58:c5:02:36:eb:42:8d:37:20: 0e:7d:25:52:20:38:a0:d0:a6:4e:3c:c7:86:a1:a1:41: be:8c:fa:ca:60:86:a4:c7:32:50:3d:5a:5e:21:64:6c: f6:24:25:37:18:02:eb:cf:de:3f:f3:bd:b3:03:cd:07: e9:b9:2a:1f:5e:2c:99:b5:66:2d:e3:3d:f6:fe:96:48: 40:fe:ff:5b:90:53:56:b0:e1:1e:c7:d5:45:b0:f6:c0: ab:5d:1c:ea:4d:32:e9:68:71:4a:2f:32:3e:36:d1:22: 1d:8f:c4:2a:4c:61:68:5f:f2:42:9c:34:b6:30:e9:ec: 50:bd:6a:fc:77:ab:45:27:e8:79:8d:95:b4:70:63:af: 2e:5f:a0:be:b1:1b:d3:c2:6b:a4:0f:f1:35:45:10:46 Fingerprint (SHA-256): B3:D2:FC:6C:30:EB:2F:38:67:95:3F:69:65:CE:EE:8D:55:60:BE:A7:5C:82:A6:EF:C6:24:55:B0:1D:B0:69:79 Fingerprint (SHA1): FD:D7:F6:B7:D7:D1:C5:67:BF:C4:5D:6C:9A:54:B5:C6:EE:59:5F:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt7 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:59 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:32 2021 Not After : Wed Nov 03 00:59:32 2021 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:92:36:4f:8c:67:76:d8:71:7c:a0:32:04:a1:40:ea: 51:67:e6:ed:1e:ce:52:5e:31:ae:fa:6f:4d:6c:dc:cb: 42:2e:64:fe:2e:a9:5d:da:af:96:95:50:ed:98:db:3e: 38:8a:ef:65:0f:ea:73:8c:86:50:f5:e6:48:32:7b:12: 5b:19:51:6e:1f:4c:aa:2c:fe:10:5f:21:17:48:11:d9: 5b:bd:0c:24:e0:39:0a:da:79:d1:e9:ee:4c:cb:5b:66: 29:e3:f4:73:c4:3b:c5:b6:7d:1f:77:e9:d3:85:bf:94: e3:2f:63:b7:f9:44:78:bd:32:df:7b:28:09:88:e0:d5: 27:26:02:aa:72:7f:43:11:86:6d:0f:bf:5d:72:67:c7: 5e:c7:62:14:74:bb:93:86:d8:a8:0a:6d:44:74:3f:b3: be:f9:cc:65:c3:a9:3f:b1:ec:3d:c2:e7:44:e3:eb:15: 2f:23:4e:5e:4b:9a:13:50:3a:3c:7a:fc:e2:69:8b:33: 3f:4f:66:29:09:81:98:5b:e5:55:ca:e1:65:49:b5:cc: 55:30:1d:36:b6:90:fd:bd:a1:ac:ca:29:48:69:a8:26: 7e:c0:38:79:cd:a9:dc:df:e9:1c:ab:73:a7:53:1f:dd: 66:30:06:d1:2b:d6:29:05:45:3a:b0:70:d7:86:8a:01 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:36:78:97:2f:96:7a:f7:09:8a:6f:09:c3:7b:71:a9: 7c:48:9c:2a:3a:2d:71:61:3e:4a:ff:dc:6e:78:da:10: 4d:9c:55:30:e2:3a:b8:d0:0e:98:6e:2e:24:a8:05:bd: 7a:e2:91:da:5d:55:0b:cc:95:53:ae:ea:35:a7:32:a6: ba:34:9b:92:63:c0:dc:2e:d6:e7:41:c3:a9:02:55:5d: ea:b3:c9:ce:e5:e7:cf:5c:47:6c:51:6f:83:40:50:97: b9:2a:96:e8:62:de:1d:ad:76:92:45:de:71:28:4f:4c: 5e:83:7e:12:94:fa:dc:f4:3b:fc:9e:18:9e:77:63:45: 29:85:9c:f6:f9:d9:f7:75:31:e2:e1:fd:78:d1:d7:04: 94:43:c6:55:76:aa:a3:f0:a1:52:a0:55:54:3d:88:dd: 01:ef:d6:1d:4b:61:8e:18:4c:71:b5:e4:0c:4b:61:e1: 8e:67:f9:c0:04:4b:10:83:30:dc:ac:37:cb:bd:9e:51: 80:8d:8e:9f:03:99:33:15:9a:03:bf:fc:a7:f1:b2:fd: c7:a8:d2:ec:bd:d0:2c:c0:82:70:a2:86:1a:82:23:4c: ab:7d:2f:7e:42:be:47:0d:c9:d4:d2:fb:7d:3a:ca:fc: c7:17:6c:cd:96:8c:17:b7:8b:9e:8d:c7:f3:d1:d3:17 Fingerprint (SHA-256): 8F:28:97:3D:F9:4F:30:C4:CA:39:33:5B:4B:A3:2F:6B:6C:56:E2:E4:3E:DB:D9:A3:83:7A:4D:6C:73:B1:DB:13 Fingerprint (SHA1): 08:48:87:40:15:4C:21:44:C6:29:9F:15:F9:59:E6:DC:16:D8:60:46 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: CRL Distribution Points Extension (7) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt8 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:5b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:33 2021 Not After : Wed Nov 03 00:59:33 2021 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:07:06:db:db:05:12:eb:11:a9:95:ba:89:45:8c:1e: c2:8b:4d:c0:53:9b:44:f9:9e:f7:9a:34:96:1f:f0:81: 94:26:5e:e8:2d:32:b6:43:99:ea:96:c0:c0:c6:49:27: 35:8f:b9:22:a0:28:b9:69:54:83:40:8c:18:f1:ce:4d: 8e:2b:81:d0:3b:cd:1b:63:75:80:35:fa:af:41:ac:dd: 65:0a:93:dc:15:63:91:74:b7:68:2f:1c:8a:48:0e:ba: 80:20:eb:41:30:62:31:f9:f2:5e:c9:b7:0f:0f:0e:62: a0:23:5e:09:24:97:2f:d5:bd:de:45:d3:41:6d:e6:07: 16:10:39:ec:08:5e:df:68:34:79:2e:5c:f4:6f:ef:f2: 79:04:91:b6:17:10:cf:c3:b8:93:f2:ac:48:44:14:23: 29:db:52:66:92:74:d8:50:00:c8:25:2d:4e:77:d1:37: 28:c7:80:71:c1:e4:40:a5:c4:86:32:b7:26:6b:78:9a: 9b:4e:94:73:a2:b5:bc:9b:b6:d8:61:3d:a4:e7:96:99: c5:7a:c5:4b:6e:33:ab:da:e4:98:b9:0d:d8:09:d8:85: e0:7d:84:7f:81:58:49:5e:23:02:af:ce:7d:2e:cc:9f: 4c:17:d9:e6:07:e0:06:e9:bb:09:a4:05:2a:6d:04:31 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:9e:b7:8b:93:f3:ee:cd:12:74:87:27:ba:ea:54:bd: 5b:42:7a:86:ae:6b:f2:4a:83:cf:f1:6c:80:ce:72:5d: c7:4f:f0:7c:c1:1e:67:5c:15:ca:e2:e0:06:2b:d4:e4: 57:a0:1b:37:b9:b1:d6:e5:28:cf:90:7c:f0:66:1f:71: 0e:2c:5a:23:f8:b2:e6:c1:a5:5e:11:7a:51:7d:f3:9d: 6d:9b:5c:32:02:74:f3:7b:69:6e:bd:ac:ce:1d:9b:6d: bd:1b:5c:b1:f0:8c:3a:27:4b:52:7f:65:d1:b3:b3:c9: df:7b:92:f3:d9:ec:b9:2b:48:ef:9c:1d:47:73:ee:d4: cb:01:57:b9:0a:ad:40:0d:15:80:e3:c8:d0:7b:0f:b9: 36:05:f3:fd:1b:31:ad:56:b0:61:67:0f:82:63:63:44: 80:80:20:d4:cd:fc:cb:d7:a4:5e:fb:a6:28:0b:95:3f: 73:58:c3:19:c7:5d:df:00:0d:78:b2:1a:35:c7:4c:31: 57:0c:08:84:1e:e7:b7:eb:c3:59:27:6a:68:35:7a:6e: 61:21:1f:08:d6:cc:4d:06:77:71:50:f6:7e:25:bc:b6: 08:8e:f5:9e:06:79:e0:46:e0:65:8a:e3:ec:51:3f:54: 8f:7e:03:55:0d:46:26:0d:7f:c1:4e:30:08:5c:4f:ff Fingerprint (SHA-256): C1:56:70:26:CE:89:72:29:BF:72:87:F8:0A:00:15:CA:14:6E:86:1D:5A:AF:AC:F3:CE:D3:04:E7:57:FB:A1:19 Fingerprint (SHA1): EE:C3:D6:F0:C4:1A:6F:FF:01:D0:35:F0:64:00:F7:BF:B4:44:99:BB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: CRL Distribution Points Extension (8) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt9 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:5d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:34 2021 Not After : Wed Nov 03 00:59:34 2021 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:88:62:08:a0:e5:8b:df:41:48:70:83:92:37:22:d7: 43:4b:18:a5:8b:38:c3:b7:2a:ae:8c:16:21:45:fa:b8: d0:9e:73:bb:89:cf:78:21:b2:2d:5f:1a:05:a5:a4:44: 2e:7f:24:f5:3a:9a:b6:65:1d:c3:69:c0:b2:0b:b7:41: 0c:5f:75:4a:68:0c:f8:33:ab:a2:74:3a:0e:a7:70:4e: cb:d8:bb:5d:7c:f0:24:cb:83:c2:ba:f8:55:e9:6a:79: 15:ce:46:4a:d5:24:ae:0b:54:a7:16:d6:b4:98:b1:e9: 4e:5e:c4:8c:ad:5e:47:6c:17:d7:6b:84:ea:7e:88:2b: a3:43:8c:32:76:59:c3:cf:b5:d7:92:72:45:7b:65:26: b9:db:ec:6b:7c:60:dd:40:7d:92:0b:86:d9:98:4d:06: 85:6b:3e:77:ed:62:44:8a:93:87:5a:da:5d:ff:2a:b7: 37:c3:b9:ee:57:63:82:31:17:26:45:84:d8:3b:bd:7f: 89:4d:38:3a:11:e8:da:76:bb:f7:75:a2:53:1b:55:57: b4:ff:0c:bd:3c:07:be:a9:83:1c:27:19:91:f7:fc:13: a5:94:58:45:2c:2f:40:21:80:57:b8:5f:9a:ce:14:2e: 68:05:ff:0a:4c:83:91:75:03:73:5c:b3:11:42:f5:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:72:83:f5:f6:a5:b4:8b:50:af:8a:f4:de:f4:33:61: 7d:60:91:cb:fa:ef:ce:3c:07:d0:58:f3:d8:8f:01:cd: 3a:00:2a:35:53:a4:35:ee:05:4e:b1:31:d7:65:6e:36: 7f:87:8a:ab:b9:63:9d:1d:8a:c4:73:36:53:06:8a:1c: 7c:91:0f:1b:56:5b:ad:73:44:54:82:cb:2d:f9:77:9f: 9c:7e:a3:1e:f8:14:ab:a3:42:a2:da:15:53:94:60:83: 90:01:4e:e8:37:fe:87:a0:23:2d:8a:35:d6:53:76:e2: de:68:f5:d7:1b:1c:6f:d8:81:aa:9d:42:21:fe:e0:74: 5b:fd:47:13:f0:e1:90:e1:8f:4c:bb:2d:34:9f:b2:a0: 55:af:1b:57:99:b5:49:10:ec:e8:49:04:0a:48:75:94: 13:45:40:a0:db:d8:dd:a5:c9:c4:e2:4f:74:aa:10:ce: ee:52:79:07:bf:bd:20:1d:c1:e7:60:a3:3d:2f:9b:72: 50:f4:40:6f:f9:b9:0b:7b:94:df:ea:41:9b:66:98:5d: ec:c2:f9:b5:79:e4:b2:76:e2:cc:ee:d5:88:4a:5a:4f: d7:71:cb:0c:fe:ca:db:21:7a:24:21:f4:84:e3:c5:48: 0d:b2:2a:7a:65:34:79:06:94:ad:38:47:bf:9b:a4:64 Fingerprint (SHA-256): 58:FC:96:BC:18:9A:4C:4E:4C:0C:CD:63:CA:51:1A:FE:A8:F8:EA:29:2C:BB:A6:FB:B9:79:5B:61:A6:49:FE:60 Fingerprint (SHA1): 4D:A2:5D:9C:92:B7:B8:CA:09:59:4D:92:73:92:6C:B4:E2:AB:D0:31 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Type Extension (9) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt10 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:5f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:35 2021 Not After : Wed Nov 03 00:59:35 2021 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:be:09:49:7c:a6:05:fb:06:61:c7:60:45:33:e4:80: 57:d2:36:3f:fb:9a:74:9c:89:73:6e:b9:de:a3:8b:5d: ad:41:12:ee:e3:7d:48:28:d6:1b:5b:b4:79:b1:06:c1: 3b:85:ce:57:14:a8:ed:de:3b:56:4d:f0:80:a0:0d:11: be:b8:64:9e:cb:d5:43:89:a4:f2:5a:59:5a:b3:86:11: b6:38:6c:f8:6d:ac:13:d4:8e:94:5a:89:96:91:0f:fe: 4d:b6:fe:08:74:1c:1f:0a:3b:3a:95:3e:4e:84:dd:79: 5e:96:8a:eb:81:e6:7d:3f:42:83:9a:56:0c:be:a7:57: 52:90:68:dd:cb:ec:0b:14:52:fa:5f:31:75:6d:cf:b8: 50:26:3d:cc:65:10:d0:ac:68:4e:60:c0:08:c6:f2:8b: c2:3f:d2:a6:05:33:d1:9e:5c:87:f8:95:06:a0:1b:d0: d8:96:09:49:5a:61:56:5f:5f:38:b3:f5:fc:3b:b7:bb: 64:3a:e4:2f:2b:37:32:5f:d0:f9:9d:27:e0:6a:4c:de: 90:7b:96:87:7f:aa:04:0d:c0:6b:e8:0a:d3:11:16:a6: 23:ae:95:b2:77:2b:3c:9c:37:3b:bb:6e:e5:cd:87:d7: 0c:ed:99:11:02:a4:bd:8b:8e:9d:bb:62:19:70:69:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:30:23:ee:37:68:67:c8:59:75:73:87:2c:0b:6b:b3: 53:18:28:49:f8:ba:02:57:91:30:59:c2:4c:e0:a3:0f: fe:5d:f6:12:ec:4f:cd:13:7f:5e:8a:2e:6e:4a:54:f0: 44:58:13:48:34:a9:82:c0:40:90:4a:46:99:01:6b:25: 52:f5:76:7a:97:b5:50:17:f6:f5:06:9e:f2:a8:85:50: ba:a9:05:c2:c3:3a:fc:2b:e3:8b:2a:c1:89:64:6f:b2: 32:ec:9a:d5:3e:16:ea:3b:92:8b:7a:39:05:c0:e1:96: 8d:77:55:bf:40:c6:23:a7:64:ae:a7:2c:00:7d:b5:70: 04:ee:f7:b8:ab:aa:ae:84:c5:60:be:31:9d:9e:bf:d7: 1a:3a:09:8c:87:16:67:f7:5e:e3:6c:fb:67:5f:79:eb: 31:d4:b9:b8:94:ed:c6:7d:5e:78:a4:91:ac:c7:e2:77: 4b:86:2c:93:05:91:09:dc:f8:39:14:bf:7c:f0:70:47: 93:69:04:43:fe:29:b9:27:c1:9c:a2:18:2d:72:b1:6d: 98:2b:3b:d9:eb:a8:ad:33:24:f3:ff:0d:d3:0d:3e:8a: 2e:7c:59:69:99:71:22:61:64:b3:12:c1:17:82:8f:04: 2c:4c:6a:c5:87:da:19:c3:ee:d6:1f:75:90:63:43:34 Fingerprint (SHA-256): DD:6B:CB:72:C5:2A:5D:33:C1:AE:37:BA:2D:18:10:F0:4B:03:80:11:CB:70:9C:09:4A:F6:A0:6B:E1:57:31:D3 Fingerprint (SHA1): 85:DC:AC:F0:4D:C8:E0:6B:F2:B9:E2:DF:23:C1:61:45:9C:5A:37:F2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Extended Key Usage Extension (10) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt11 -t u,u,u -o /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:61 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Tue Aug 03 00:59:36 2021 Not After : Wed Nov 03 00:59:36 2021 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:f5:8f:07:bf:31:db:b8:e2:2b:5d:b6:f8:79:b2:07: d4:ea:de:02:b3:5e:5d:dc:8c:90:8c:d6:42:32:ab:0c: 24:87:bb:51:8a:a6:75:e6:aa:50:e6:a1:a0:03:d9:a5: e2:e6:c8:7f:54:83:94:9c:3e:4d:41:90:45:b4:83:10: 56:59:7b:89:28:38:6b:d9:eb:05:66:cc:00:ab:18:c2: 99:37:1f:85:20:92:ea:b4:a1:04:bb:9e:0e:94:c0:9e: 87:ea:ae:0d:0f:30:45:ef:7d:c0:c3:1c:5b:75:ce:fe: 9a:55:c6:2d:a7:3d:a4:7d:78:60:1d:f6:49:dd:19:df: 99:36:31:9f:45:9e:cb:d5:4a:fb:2b:72:68:8e:b9:07: a6:09:ca:98:0b:80:82:a3:8f:ea:6e:b5:94:ca:f6:ac: 1c:9b:91:52:b5:09:a3:92:18:bc:78:06:d0:2a:56:1b: f4:2d:ae:80:c1:df:fd:44:e4:bb:4a:bf:cb:64:7d:3a: 4c:1e:ec:9c:33:ea:31:5b:d6:60:f2:fd:cc:79:07:7e: a7:7f:90:85:92:2b:0d:82:c4:66:51:f9:ef:f1:ac:fe: e4:79:7e:a3:08:21:a5:ad:f2:3d:cc:ff:34:cc:14:e3: 55:e4:44:af:1c:41:7c:53:6d:f8:e1:b9:30:b7:1b:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:53:7a:b5:08:e7:8a:e5:cb:9d:b9:59:93:b1:e9:0e: 96:0f:8a:c8:76:bf:65:4f:65:32:95:94:3c:9b:a4:45: 1b:38:b9:6d:db:a9:d2:01:93:66:a2:d0:54:2a:a6:2b: ec:95:12:1f:02:a0:c6:93:04:7b:1c:c1:5e:6c:fb:c4: 88:e3:20:07:f3:58:35:9d:67:33:b3:74:0b:4d:99:e5: 8d:a4:1f:e9:de:64:0c:3b:27:d3:e9:b6:e4:dc:64:a4: 6a:83:3c:7d:a7:01:3f:5a:4a:0e:6a:be:15:2a:83:e4: e5:5b:2d:44:dc:60:14:ab:99:3d:73:87:df:da:45:13: 17:cc:58:64:47:30:ae:1c:88:8a:ce:e5:ae:0a:c2:85: db:e3:10:16:e5:a4:92:ae:65:6f:0a:13:50:5a:c3:28: 48:f7:31:8a:6a:6f:b8:c8:a2:43:7c:06:b3:d1:4c:9b: c0:0d:01:fc:f3:0e:2a:22:0a:cc:9a:a6:c0:ff:60:27: be:f1:c4:0f:9f:b8:5e:46:27:17:6e:5a:62:e9:36:e9: 6f:3f:df:b1:1a:70:18:58:ce:26:0d:60:60:26:3c:10: 97:0d:36:4f:a3:b1:36:3c:4c:cc:77:7b:12:75:98:34: e5:a6:56:90:cc:1b:65:c1:fe:b8:57:d1:c3:bd:41:42 Fingerprint (SHA-256): 82:E4:0C:C4:56:5D:40:B9:72:18:13:0F:39:80:4B:EC:9C:4C:9A:7A:6C:73:55:07:FC:53:1E:BE:B3:91:85:0C Fingerprint (SHA1): A5:39:BD:80:A4:3D:C2:5B:C9:9C:BE:6E:7B:DB:80:55:21:EE:51:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Key Usage Extension (11) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #337: create cert with invalid SAN parameter (12) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #338: create cert with invalid SAN parameter (13) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #339: create cert with valid SAN parameter (14) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:66 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Aug 03 00:59:38 2021 Not After : Wed Nov 03 00:59:38 2021 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:ab:eb:fd:d4:ab:b6:5c:5f:1b:05:88:55:2c:d5:7a: 60:56:38:03:04:30:66:71:a6:e0:2a:0d:52:7b:ac:5b: 19:8d:d2:5d:39:f4:51:4e:a5:04:db:f8:c7:9f:dd:f5: 3a:d8:9a:f3:b9:9c:01:01:f9:13:4f:27:d0:4a:a2:56: d4:8d:ff:db:c4:4f:83:70:58:aa:d2:c2:72:83:48:dc: 83:85:5e:62:5d:34:5a:7e:d5:88:b2:d5:c0:9d:55:89: e3:cd:74:84:e8:48:13:ab:67:d7:3c:0c:c6:f6:18:36: ee:a9:6c:8a:45:5a:37:ec:92:85:c9:0c:40:0f:e7:cd: cf:30:0a:7d:f7:10:19:43:44:4c:73:a3:9b:c9:fb:a3: 9b:cf:f4:92:8c:75:95:4c:c1:96:41:30:f0:f5:d2:9e: e2:7d:88:21:03:83:96:00:db:96:03:32:11:fa:84:ad: 9f:4d:14:ed:c0:6c:a3:12:7e:42:68:d7:3e:80:96:a6: cc:77:bf:3e:ab:ec:20:7a:e2:6c:d2:74:9a:f6:53:9d: 52:b0:f0:4a:99:bd:be:2a:d4:27:1a:f6:2a:6f:5a:bd: 2a:bd:5e:c4:6c:da:9f:e9:1f:e3:e1:07:a3:1c:d2:27: a5:03:e8:f8:09:f5:60:57:3b:f8:43:a0:7e:7e:8a:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:72:e8:16:86:ab:5f:d2:c4:5a:03:cf:96:e4:3f:56: 88:77:a2:d7:6d:ad:d2:57:a2:4c:fe:5b:bf:0e:75:2b: b5:f2:d8:69:df:e7:be:92:df:79:65:46:ee:fa:31:1f: 6a:fd:02:cf:ea:6e:12:78:68:0d:1a:b6:21:c4:00:55: 56:c7:16:83:1f:ec:79:1d:d6:b5:f3:bc:00:80:4c:69: 43:2b:6c:22:2e:76:f4:de:d5:54:c5:27:2f:d1:2d:23: 58:cd:29:da:1e:67:28:f7:98:d5:02:d9:70:12:0f:f5: 87:4c:46:13:cb:e0:9c:b6:5e:d0:e5:12:42:fd:94:7b: 77:2a:bd:2a:2d:f4:a5:a2:4b:44:9e:7f:87:b7:11:4e: 02:04:1c:ca:5f:9a:9b:5d:b2:9b:9e:66:2a:b7:71:ed: 9d:e7:42:1c:4b:5c:a4:11:95:51:32:5c:7c:b0:cf:70: d2:6c:a7:e1:08:36:4f:70:33:bd:04:98:6b:db:6b:63: 1d:46:98:12:b0:77:da:b4:2b:2e:11:8b:c6:99:a3:30: 7e:cf:74:37:99:47:5f:62:fe:5a:32:7a:c3:59:1e:80: 6e:d8:5a:e3:0f:ef:25:af:0d:b0:56:52:f5:fa:49:2e: 16:04:26:b0:9a:e7:d2:bc:b2:00:da:28:c1:aa:11:b8 Fingerprint (SHA-256): A2:07:FE:E0:7C:6F:29:D7:AE:B2:EC:E5:A8:6D:51:D0:F1:E8:2D:9B:E6:C3:01:32:89:6F:27:07:52:09:BA:EB Fingerprint (SHA1): B3:0E:6B:DB:F4:8D:C7:5A:B8:E1:01:A6:71:52:8E:7A:33:23:7C:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: create cert with valid SAN parameter (15) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der cert.sh: #341: dump extension 2.5.29.17 to file /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der (16) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #342: create cert with valid SAN parameter (17) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #343: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #344: create cert with invalid generic ext parameter (19) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #345: create cert with invalid generic ext parameter (20) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #346: create cert with invalid generic ext parameter (21) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #347: create cert with valid generic ext parameter (22) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:b9:13:a6:6c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Tue Aug 03 00:59:41 2021 Not After : Wed Nov 03 00:59:41 2021 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:74:2f:77:ab:5a:ca:7d:c7:c7:4b:d3:00:91:b7:b9: af:09:a0:5f:2f:8c:bf:42:8c:a5:12:56:94:5a:38:4b: f3:cc:de:eb:c3:c8:df:fc:fb:de:e9:d5:ca:26:44:d4: 6c:de:07:cc:49:a5:a8:61:9a:25:79:17:48:a2:09:46: 8c:19:b1:79:3c:d6:8e:00:58:ee:fe:6f:a9:80:d9:f6: f7:2b:7e:a1:71:2d:29:99:89:2a:9b:ea:22:5d:9b:34: e5:b3:82:2a:68:69:bf:38:c2:d7:f1:a1:32:5e:10:fa: ce:0c:7f:33:bc:26:5d:12:0e:8a:65:a6:61:c7:df:93: b8:54:87:c1:40:34:21:e8:9f:9d:f7:9b:2b:44:83:be: 06:35:39:fd:59:18:e9:47:95:a6:de:63:75:ab:fe:42: bd:33:12:e4:08:3b:1e:eb:63:e8:6b:ef:b0:ee:2d:2e: 9d:85:a2:2d:67:4c:2a:fb:79:94:01:fc:75:5b:0a:77: e6:f3:bd:36:19:ed:60:81:07:7d:db:29:90:69:51:30: ce:0b:84:70:3a:29:15:c8:b8:d4:ed:c3:48:f7:f0:5e: 6a:47:dd:c3:54:68:b7:24:19:77:39:54:d4:19:f1:56: 5f:8b:a7:1e:e9:29:68:5b:36:96:00:cc:ad:66:37:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:12:d1:b7:43:75:36:6f:45:7d:11:2d:ab:74:0b:da: 52:51:14:bf:8a:81:58:71:87:8e:7d:34:7a:31:c3:7a: 3d:59:02:6f:87:0c:a8:b2:1f:85:f1:02:f6:c7:6c:91: 1f:48:91:13:ae:e2:b6:b5:50:fa:80:95:ae:de:6d:4a: 74:42:2e:a0:58:36:61:8f:d0:77:65:c9:bc:59:a1:e5: 1a:e2:48:cc:49:31:1d:45:94:09:e6:0e:d4:20:3b:20: 9e:0b:d0:a5:97:7c:0a:14:7e:0f:2c:05:1f:05:48:aa: 9d:68:4a:a6:0e:0f:25:12:72:d6:e8:04:9c:ca:41:c9: b6:ee:8f:0e:3f:f4:24:74:03:0c:07:09:60:70:9c:52: bc:d9:23:64:eb:6b:14:9f:a6:14:7e:78:8a:c3:71:98: bf:2a:2b:55:50:1d:c3:62:2a:4d:e0:c8:e8:67:fb:29: 86:84:76:64:d5:f2:31:98:a0:eb:e1:f7:29:d2:25:de: d8:ea:6a:40:1a:0b:48:8d:65:02:5e:55:9c:9f:4e:c6: ca:14:09:a9:6e:56:31:62:1f:e1:b3:f1:36:db:91:24: cf:55:21:46:3c:d9:ad:75:da:75:3f:58:34:6c:7b:a8: 1a:5d:6d:2b:ed:a0:cc:5b:c6:ff:29:2e:db:77:6a:52 Fingerprint (SHA-256): 26:A7:0A:75:9D:69:2F:26:D5:CC:BA:35:3C:E8:F3:15:7F:62:FC:F8:36:2E:65:FF:69:86:A7:86:3B:4A:53:65 Fingerprint (SHA1): F8:78:40:90:21:17:C0:6A:AF:FE:22:1D:ED:BE:16:F9:D6:7A:3A:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #348: create cert with valid generic ext parameter (23) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #349: create cert with valid generic ext parameter (24) - PASSED certutil -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #350: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw cert.sh: #351: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #352: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #353: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dbpass -o root.cert cert.sh: #354: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #355: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #356: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #357: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #358: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/lib/libnssckbi.so -dbdir /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #359: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA.ca.cert cert.sh: #360: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #361: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #362: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #363: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #364: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #365: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #366: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #367: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #368: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #369: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #370: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #371: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #372: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #373: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #374: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #375: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #376: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #377: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #378: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #379: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #380: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #381: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #382: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #383: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #384: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #385: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #386: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #387: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #388: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #389: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #390: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #391: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #392: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #397: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #400: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw cert.sh: #401: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #402: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #403: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #404: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #405: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #406: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #407: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #408: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #409: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #410: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #411: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #412: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #413: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #414: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #417: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #422: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #427: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #432: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #437: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #441: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #442: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #443: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #444: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #445: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #446: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #449: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #454: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #458: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 64284a987f457ca229688123b87ac81828c3b230 NSS Certificate DB:localhost.localdomain < 1> dsa fbc19b4a4e534053a4c5cac3e0178eee496f9a98 NSS Certificate DB:localhost.localdomain-dsa < 2> dsa e4855e3299ea9b8701e90a44cec7af68ca953614 NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec b7f0591c0ccb2e844c4809e9cc1cbb1d8b6a73b5 NSS Certificate DB:localhost.localdomain-ec < 4> ec 90bea02bb0a9de69903885a2c42faf3b9780a111 NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa b0ff5270da76b85523d0a3bfb192ba3e42372f2e NSS Certificate DB:localhost-sni.localdomain < 7> dsa 30514d366f3ff448504c33e97ef9a3a47573339a NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa 2159c4d73b999ee227b979a6286af9b362fd07a7 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec f12c86dac33c8f3ded19996668892acc3985d809 NSS Certificate DB:localhost-sni.localdomain-ec <10> ec 8edd04f4c1e3566a6572449f4b61cbaaeca6b48e NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa 0fa3d1ead064edfd7efe4067684a18598c39ab7c (orphan) cert.sh: #459: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #460: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #461: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #462: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #463: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #464: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #465: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #466: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #467: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #468: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #469: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #470: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #471: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #472: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #473: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #474: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #475: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #476: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #477: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #478: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #479: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #480: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #481: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #482: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #483: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #484: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #485: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #486: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #487: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #488: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #489: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #490: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #491: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #492: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #493: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #494: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #495: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #496: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #497: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #498: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #499: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #500: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #501: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #502: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #503: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #504: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #505: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #506: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #507: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #508: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #509: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #510: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #511: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #512: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #513: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #514: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #515: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #516: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #517: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #518: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #519: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #520: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #521: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #522: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #523: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #524: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #525: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #526: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #527: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #528: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #529: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #530: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #531: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #532: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #533: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #534: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #535: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #536: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #537: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #538: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #539: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #540: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #541: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #542: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #543: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #544: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #545: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #546: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #547: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #548: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #549: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #550: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #551: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #552: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #553: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #554: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #555: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #556: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #557: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #558: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #559: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #560: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #561: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #562: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #563: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #564: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #565: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #566: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #567: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #568: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #569: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #570: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #571: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #572: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #573: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #574: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #575: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #576: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #577: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #578: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #579: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #580: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #581: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #582: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #583: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #584: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #585: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #586: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #587: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #588: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #589: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #590: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #591: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #592: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #593: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #594: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #595: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #596: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #597: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #598: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #599: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #600: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #601: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #602: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #603: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #604: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #605: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #606: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #607: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #608: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #609: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #610: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #611: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #612: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #613: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #614: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #615: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #616: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #617: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #618: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #619: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #620: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #621: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #622: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #623: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #624: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #625: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #626: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #627: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #628: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #629: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #630: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #631: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #632: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #633: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #634: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #635: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #636: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #637: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #638: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #639: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #640: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #641: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #642: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #643: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #644: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #645: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #646: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #647: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #648: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #649: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #650: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #651: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #652: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #653: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #654: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #655: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #656: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #657: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #658: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #659: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #660: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #661: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #662: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #663: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #664: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #665: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #666: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #667: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #668: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #669: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #670: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #671: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #672: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #673: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #674: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #675: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #676: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #677: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #678: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #679: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #680: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #681: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #682: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #683: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #684: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #685: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #686: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #687: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #688: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #689: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #690: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #691: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #692: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #693: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #694: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #695: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #696: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #697: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #698: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #699: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #700: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #701: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #702: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #703: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #704: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #705: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #706: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #707: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #708: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #709: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #710: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #711: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:00:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3378456 >/dev/null 2>/dev/null selfserv with PID 3378456 found at Tue Aug 3 01:00:41 UTC 2021 selfserv with PID 3378456 started at Tue Aug 3 01:00:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #712: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3378456 at Tue Aug 3 01:00:41 UTC 2021 kill -USR1 3378456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3378456 killed at Tue Aug 3 01:00:41 UTC 2021 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:00:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3378514 >/dev/null 2>/dev/null selfserv with PID 3378514 found at Tue Aug 3 01:00:41 UTC 2021 selfserv with PID 3378514 started at Tue Aug 3 01:00:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #713: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3378514 at Tue Aug 3 01:00:42 UTC 2021 kill -USR1 3378514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3378514 killed at Tue Aug 3 01:00:42 UTC 2021 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:00:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3378571 >/dev/null 2>/dev/null selfserv with PID 3378571 found at Tue Aug 3 01:00:42 UTC 2021 selfserv with PID 3378571 started at Tue Aug 3 01:00:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #714: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3378571 at Tue Aug 3 01:00:43 UTC 2021 kill -USR1 3378571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3378571 killed at Tue Aug 3 01:00:43 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:00:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3378657 >/dev/null 2>/dev/null selfserv with PID 3378657 found at Tue Aug 3 01:00:43 UTC 2021 selfserv with PID 3378657 started at Tue Aug 3 01:00:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #715: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3378657 at Tue Aug 3 01:00:44 UTC 2021 kill -USR1 3378657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3378657 killed at Tue Aug 3 01:00:44 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:00:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3378736 >/dev/null 2>/dev/null selfserv with PID 3378736 found at Tue Aug 3 01:00:44 UTC 2021 selfserv with PID 3378736 started at Tue Aug 3 01:00:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #716: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3378736 at Tue Aug 3 01:00:45 UTC 2021 kill -USR1 3378736 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3378736 killed at Tue Aug 3 01:00:45 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:00:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3378800 >/dev/null 2>/dev/null selfserv with PID 3378800 found at Tue Aug 3 01:00:45 UTC 2021 selfserv with PID 3378800 started at Tue Aug 3 01:00:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #717: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3378800 at Tue Aug 3 01:00:45 UTC 2021 kill -USR1 3378800 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3378800 killed at Tue Aug 3 01:00:45 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:00:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3378885 >/dev/null 2>/dev/null selfserv with PID 3378885 found at Tue Aug 3 01:00:45 UTC 2021 selfserv with PID 3378885 started at Tue Aug 3 01:00:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #718: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3378885 at Tue Aug 3 01:00:46 UTC 2021 kill -USR1 3378885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3378885 killed at Tue Aug 3 01:00:46 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:00:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379067 >/dev/null 2>/dev/null selfserv with PID 3379067 found at Tue Aug 3 01:00:47 UTC 2021 selfserv with PID 3379067 started at Tue Aug 3 01:00:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #719: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3379067 at Tue Aug 3 01:00:48 UTC 2021 kill -USR1 3379067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379067 killed at Tue Aug 3 01:00:48 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:00:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379128 >/dev/null 2>/dev/null selfserv with PID 3379128 found at Tue Aug 3 01:00:48 UTC 2021 selfserv with PID 3379128 started at Tue Aug 3 01:00:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #720: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3379128 at Tue Aug 3 01:00:49 UTC 2021 kill -USR1 3379128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379128 killed at Tue Aug 3 01:00:49 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:00:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379209 >/dev/null 2>/dev/null selfserv with PID 3379209 found at Tue Aug 3 01:00:49 UTC 2021 selfserv with PID 3379209 started at Tue Aug 3 01:00:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #721: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3379209 at Tue Aug 3 01:00:50 UTC 2021 kill -USR1 3379209 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379209 killed at Tue Aug 3 01:00:50 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:00:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379286 >/dev/null 2>/dev/null selfserv with PID 3379286 found at Tue Aug 3 01:00:50 UTC 2021 selfserv with PID 3379286 started at Tue Aug 3 01:00:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #722: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3379286 at Tue Aug 3 01:00:50 UTC 2021 kill -USR1 3379286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379286 killed at Tue Aug 3 01:00:50 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:00:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379344 >/dev/null 2>/dev/null selfserv with PID 3379344 found at Tue Aug 3 01:00:50 UTC 2021 selfserv with PID 3379344 started at Tue Aug 3 01:00:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #723: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3379344 at Tue Aug 3 01:00:51 UTC 2021 kill -USR1 3379344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379344 killed at Tue Aug 3 01:00:51 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:00:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379418 >/dev/null 2>/dev/null selfserv with PID 3379418 found at Tue Aug 3 01:00:51 UTC 2021 selfserv with PID 3379418 started at Tue Aug 3 01:00:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #724: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3379418 at Tue Aug 3 01:00:52 UTC 2021 kill -USR1 3379418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379418 killed at Tue Aug 3 01:00:52 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:00:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379480 >/dev/null 2>/dev/null selfserv with PID 3379480 found at Tue Aug 3 01:00:52 UTC 2021 selfserv with PID 3379480 started at Tue Aug 3 01:00:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #725: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3379480 at Tue Aug 3 01:00:53 UTC 2021 kill -USR1 3379480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379480 killed at Tue Aug 3 01:00:53 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:00:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379539 >/dev/null 2>/dev/null selfserv with PID 3379539 found at Tue Aug 3 01:00:53 UTC 2021 selfserv with PID 3379539 started at Tue Aug 3 01:00:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #726: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3379539 at Tue Aug 3 01:00:54 UTC 2021 kill -USR1 3379539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379539 killed at Tue Aug 3 01:00:54 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:00:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379605 >/dev/null 2>/dev/null selfserv with PID 3379605 found at Tue Aug 3 01:00:54 UTC 2021 selfserv with PID 3379605 started at Tue Aug 3 01:00:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #727: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3379605 at Tue Aug 3 01:00:55 UTC 2021 kill -USR1 3379605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379605 killed at Tue Aug 3 01:00:55 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:00:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379671 >/dev/null 2>/dev/null selfserv with PID 3379671 found at Tue Aug 3 01:00:55 UTC 2021 selfserv with PID 3379671 started at Tue Aug 3 01:00:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #728: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3379671 at Tue Aug 3 01:00:56 UTC 2021 kill -USR1 3379671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379671 killed at Tue Aug 3 01:00:56 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:00:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379735 >/dev/null 2>/dev/null selfserv with PID 3379735 found at Tue Aug 3 01:00:56 UTC 2021 selfserv with PID 3379735 started at Tue Aug 3 01:00:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #729: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3379735 at Tue Aug 3 01:00:57 UTC 2021 kill -USR1 3379735 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379735 killed at Tue Aug 3 01:00:57 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:00:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379804 >/dev/null 2>/dev/null selfserv with PID 3379804 found at Tue Aug 3 01:00:57 UTC 2021 selfserv with PID 3379804 started at Tue Aug 3 01:00:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #730: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3379804 at Tue Aug 3 01:00:58 UTC 2021 kill -USR1 3379804 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379804 killed at Tue Aug 3 01:00:58 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:00:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379867 >/dev/null 2>/dev/null selfserv with PID 3379867 found at Tue Aug 3 01:00:58 UTC 2021 selfserv with PID 3379867 started at Tue Aug 3 01:00:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #731: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3379867 at Tue Aug 3 01:00:59 UTC 2021 kill -USR1 3379867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379867 killed at Tue Aug 3 01:00:59 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:00:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3379943 >/dev/null 2>/dev/null selfserv with PID 3379943 found at Tue Aug 3 01:00:59 UTC 2021 selfserv with PID 3379943 started at Tue Aug 3 01:00:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #732: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3379943 at Tue Aug 3 01:00:59 UTC 2021 kill -USR1 3379943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3379943 killed at Tue Aug 3 01:00:59 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:00:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:00:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380019 >/dev/null 2>/dev/null selfserv with PID 3380019 found at Tue Aug 3 01:01:00 UTC 2021 selfserv with PID 3380019 started at Tue Aug 3 01:01:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #733: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3380019 at Tue Aug 3 01:01:00 UTC 2021 kill -USR1 3380019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380019 killed at Tue Aug 3 01:01:00 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:01:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380093 >/dev/null 2>/dev/null selfserv with PID 3380093 found at Tue Aug 3 01:01:00 UTC 2021 selfserv with PID 3380093 started at Tue Aug 3 01:01:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #734: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3380093 at Tue Aug 3 01:01:01 UTC 2021 kill -USR1 3380093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380093 killed at Tue Aug 3 01:01:01 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:01:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380158 >/dev/null 2>/dev/null selfserv with PID 3380158 found at Tue Aug 3 01:01:01 UTC 2021 selfserv with PID 3380158 started at Tue Aug 3 01:01:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #735: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3380158 at Tue Aug 3 01:01:02 UTC 2021 kill -USR1 3380158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380158 killed at Tue Aug 3 01:01:02 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:01:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380341 >/dev/null 2>/dev/null selfserv with PID 3380341 found at Tue Aug 3 01:01:02 UTC 2021 selfserv with PID 3380341 started at Tue Aug 3 01:01:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #736: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3380341 at Tue Aug 3 01:01:03 UTC 2021 kill -USR1 3380341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380341 killed at Tue Aug 3 01:01:03 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:01:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380409 >/dev/null 2>/dev/null selfserv with PID 3380409 found at Tue Aug 3 01:01:03 UTC 2021 selfserv with PID 3380409 started at Tue Aug 3 01:01:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #737: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3380409 at Tue Aug 3 01:01:04 UTC 2021 kill -USR1 3380409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380409 killed at Tue Aug 3 01:01:04 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:01:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380501 >/dev/null 2>/dev/null selfserv with PID 3380501 found at Tue Aug 3 01:01:04 UTC 2021 selfserv with PID 3380501 started at Tue Aug 3 01:01:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #738: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3380501 at Tue Aug 3 01:01:05 UTC 2021 kill -USR1 3380501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380501 killed at Tue Aug 3 01:01:05 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380576 >/dev/null 2>/dev/null selfserv with PID 3380576 found at Tue Aug 3 01:01:05 UTC 2021 selfserv with PID 3380576 started at Tue Aug 3 01:01:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #739: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3380576 at Tue Aug 3 01:01:06 UTC 2021 kill -USR1 3380576 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380576 killed at Tue Aug 3 01:01:06 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380634 >/dev/null 2>/dev/null selfserv with PID 3380634 found at Tue Aug 3 01:01:06 UTC 2021 selfserv with PID 3380634 started at Tue Aug 3 01:01:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #740: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3380634 at Tue Aug 3 01:01:07 UTC 2021 kill -USR1 3380634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380634 killed at Tue Aug 3 01:01:07 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380694 >/dev/null 2>/dev/null selfserv with PID 3380694 found at Tue Aug 3 01:01:07 UTC 2021 selfserv with PID 3380694 started at Tue Aug 3 01:01:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #741: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3380694 at Tue Aug 3 01:01:07 UTC 2021 kill -USR1 3380694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380694 killed at Tue Aug 3 01:01:07 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:01:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380767 >/dev/null 2>/dev/null selfserv with PID 3380767 found at Tue Aug 3 01:01:08 UTC 2021 selfserv with PID 3380767 started at Tue Aug 3 01:01:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #742: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3380767 at Tue Aug 3 01:01:08 UTC 2021 kill -USR1 3380767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380767 killed at Tue Aug 3 01:01:08 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:01:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380831 >/dev/null 2>/dev/null selfserv with PID 3380831 found at Tue Aug 3 01:01:08 UTC 2021 selfserv with PID 3380831 started at Tue Aug 3 01:01:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #743: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3380831 at Tue Aug 3 01:01:09 UTC 2021 kill -USR1 3380831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380831 killed at Tue Aug 3 01:01:09 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:01:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380898 >/dev/null 2>/dev/null selfserv with PID 3380898 found at Tue Aug 3 01:01:09 UTC 2021 selfserv with PID 3380898 started at Tue Aug 3 01:01:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #744: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3380898 at Tue Aug 3 01:01:10 UTC 2021 kill -USR1 3380898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380898 killed at Tue Aug 3 01:01:10 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:01:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3380975 >/dev/null 2>/dev/null selfserv with PID 3380975 found at Tue Aug 3 01:01:10 UTC 2021 selfserv with PID 3380975 started at Tue Aug 3 01:01:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #745: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3380975 at Tue Aug 3 01:01:11 UTC 2021 kill -USR1 3380975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3380975 killed at Tue Aug 3 01:01:11 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:01:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381037 >/dev/null 2>/dev/null selfserv with PID 3381037 found at Tue Aug 3 01:01:11 UTC 2021 selfserv with PID 3381037 started at Tue Aug 3 01:01:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #746: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3381037 at Tue Aug 3 01:01:12 UTC 2021 kill -USR1 3381037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381037 killed at Tue Aug 3 01:01:12 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:01:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381113 >/dev/null 2>/dev/null selfserv with PID 3381113 found at Tue Aug 3 01:01:12 UTC 2021 selfserv with PID 3381113 started at Tue Aug 3 01:01:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #747: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3381113 at Tue Aug 3 01:01:13 UTC 2021 kill -USR1 3381113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381113 killed at Tue Aug 3 01:01:13 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381202 >/dev/null 2>/dev/null selfserv with PID 3381202 found at Tue Aug 3 01:01:13 UTC 2021 selfserv with PID 3381202 started at Tue Aug 3 01:01:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #748: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3381202 at Tue Aug 3 01:01:14 UTC 2021 kill -USR1 3381202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381202 killed at Tue Aug 3 01:01:14 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381266 >/dev/null 2>/dev/null selfserv with PID 3381266 found at Tue Aug 3 01:01:14 UTC 2021 selfserv with PID 3381266 started at Tue Aug 3 01:01:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #749: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3381266 at Tue Aug 3 01:01:15 UTC 2021 kill -USR1 3381266 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381266 killed at Tue Aug 3 01:01:15 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381333 >/dev/null 2>/dev/null selfserv with PID 3381333 found at Tue Aug 3 01:01:15 UTC 2021 selfserv with PID 3381333 started at Tue Aug 3 01:01:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #750: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3381333 at Tue Aug 3 01:01:16 UTC 2021 kill -USR1 3381333 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381333 killed at Tue Aug 3 01:01:16 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381409 >/dev/null 2>/dev/null selfserv with PID 3381409 found at Tue Aug 3 01:01:16 UTC 2021 selfserv with PID 3381409 started at Tue Aug 3 01:01:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #751: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3381409 at Tue Aug 3 01:01:16 UTC 2021 kill -USR1 3381409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381409 killed at Tue Aug 3 01:01:16 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381483 >/dev/null 2>/dev/null selfserv with PID 3381483 found at Tue Aug 3 01:01:16 UTC 2021 selfserv with PID 3381483 started at Tue Aug 3 01:01:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #752: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3381483 at Tue Aug 3 01:01:17 UTC 2021 kill -USR1 3381483 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381483 killed at Tue Aug 3 01:01:17 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381630 >/dev/null 2>/dev/null selfserv with PID 3381630 found at Tue Aug 3 01:01:17 UTC 2021 selfserv with PID 3381630 started at Tue Aug 3 01:01:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #753: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3381630 at Tue Aug 3 01:01:18 UTC 2021 kill -USR1 3381630 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381630 killed at Tue Aug 3 01:01:18 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381704 >/dev/null 2>/dev/null selfserv with PID 3381704 found at Tue Aug 3 01:01:18 UTC 2021 selfserv with PID 3381704 started at Tue Aug 3 01:01:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #754: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3381704 at Tue Aug 3 01:01:19 UTC 2021 kill -USR1 3381704 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381704 killed at Tue Aug 3 01:01:19 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381767 >/dev/null 2>/dev/null selfserv with PID 3381767 found at Tue Aug 3 01:01:19 UTC 2021 selfserv with PID 3381767 started at Tue Aug 3 01:01:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #755: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3381767 at Tue Aug 3 01:01:20 UTC 2021 kill -USR1 3381767 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381767 killed at Tue Aug 3 01:01:20 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381826 >/dev/null 2>/dev/null selfserv with PID 3381826 found at Tue Aug 3 01:01:20 UTC 2021 selfserv with PID 3381826 started at Tue Aug 3 01:01:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #756: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3381826 at Tue Aug 3 01:01:21 UTC 2021 kill -USR1 3381826 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381826 killed at Tue Aug 3 01:01:21 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381903 >/dev/null 2>/dev/null selfserv with PID 3381903 found at Tue Aug 3 01:01:22 UTC 2021 selfserv with PID 3381903 started at Tue Aug 3 01:01:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #757: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3381903 at Tue Aug 3 01:01:22 UTC 2021 kill -USR1 3381903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381903 killed at Tue Aug 3 01:01:22 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3381982 >/dev/null 2>/dev/null selfserv with PID 3381982 found at Tue Aug 3 01:01:22 UTC 2021 selfserv with PID 3381982 started at Tue Aug 3 01:01:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #758: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3381982 at Tue Aug 3 01:01:23 UTC 2021 kill -USR1 3381982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3381982 killed at Tue Aug 3 01:01:23 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382059 >/dev/null 2>/dev/null selfserv with PID 3382059 found at Tue Aug 3 01:01:23 UTC 2021 selfserv with PID 3382059 started at Tue Aug 3 01:01:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #759: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3382059 at Tue Aug 3 01:01:24 UTC 2021 kill -USR1 3382059 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382059 killed at Tue Aug 3 01:01:24 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382128 >/dev/null 2>/dev/null selfserv with PID 3382128 found at Tue Aug 3 01:01:24 UTC 2021 selfserv with PID 3382128 started at Tue Aug 3 01:01:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #760: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3382128 at Tue Aug 3 01:01:25 UTC 2021 kill -USR1 3382128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382128 killed at Tue Aug 3 01:01:25 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382188 >/dev/null 2>/dev/null selfserv with PID 3382188 found at Tue Aug 3 01:01:25 UTC 2021 selfserv with PID 3382188 started at Tue Aug 3 01:01:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #761: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3382188 at Tue Aug 3 01:01:26 UTC 2021 kill -USR1 3382188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382188 killed at Tue Aug 3 01:01:26 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382247 >/dev/null 2>/dev/null selfserv with PID 3382247 found at Tue Aug 3 01:01:26 UTC 2021 selfserv with PID 3382247 started at Tue Aug 3 01:01:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #762: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3382247 at Tue Aug 3 01:01:26 UTC 2021 kill -USR1 3382247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382247 killed at Tue Aug 3 01:01:26 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382315 >/dev/null 2>/dev/null selfserv with PID 3382315 found at Tue Aug 3 01:01:27 UTC 2021 selfserv with PID 3382315 started at Tue Aug 3 01:01:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #763: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3382315 at Tue Aug 3 01:01:27 UTC 2021 kill -USR1 3382315 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382315 killed at Tue Aug 3 01:01:28 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382373 >/dev/null 2>/dev/null selfserv with PID 3382373 found at Tue Aug 3 01:01:28 UTC 2021 selfserv with PID 3382373 started at Tue Aug 3 01:01:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #764: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3382373 at Tue Aug 3 01:01:29 UTC 2021 kill -USR1 3382373 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382373 killed at Tue Aug 3 01:01:29 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382438 >/dev/null 2>/dev/null selfserv with PID 3382438 found at Tue Aug 3 01:01:29 UTC 2021 selfserv with PID 3382438 started at Tue Aug 3 01:01:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #765: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3382438 at Tue Aug 3 01:01:30 UTC 2021 kill -USR1 3382438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382438 killed at Tue Aug 3 01:01:30 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382510 >/dev/null 2>/dev/null selfserv with PID 3382510 found at Tue Aug 3 01:01:30 UTC 2021 selfserv with PID 3382510 started at Tue Aug 3 01:01:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #766: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3382510 at Tue Aug 3 01:01:31 UTC 2021 kill -USR1 3382510 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382510 killed at Tue Aug 3 01:01:31 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382572 >/dev/null 2>/dev/null selfserv with PID 3382572 found at Tue Aug 3 01:01:31 UTC 2021 selfserv with PID 3382572 started at Tue Aug 3 01:01:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #767: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3382572 at Tue Aug 3 01:01:31 UTC 2021 kill -USR1 3382572 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382572 killed at Tue Aug 3 01:01:31 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382645 >/dev/null 2>/dev/null selfserv with PID 3382645 found at Tue Aug 3 01:01:32 UTC 2021 selfserv with PID 3382645 started at Tue Aug 3 01:01:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #768: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3382645 at Tue Aug 3 01:01:32 UTC 2021 kill -USR1 3382645 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382645 killed at Tue Aug 3 01:01:32 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382807 >/dev/null 2>/dev/null selfserv with PID 3382807 found at Tue Aug 3 01:01:32 UTC 2021 selfserv with PID 3382807 started at Tue Aug 3 01:01:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #769: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3382807 at Tue Aug 3 01:01:33 UTC 2021 kill -USR1 3382807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382807 killed at Tue Aug 3 01:01:33 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:33 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382904 >/dev/null 2>/dev/null selfserv with PID 3382904 found at Tue Aug 3 01:01:33 UTC 2021 selfserv with PID 3382904 started at Tue Aug 3 01:01:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #770: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3382904 at Tue Aug 3 01:01:34 UTC 2021 kill -USR1 3382904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382904 killed at Tue Aug 3 01:01:34 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3382965 >/dev/null 2>/dev/null selfserv with PID 3382965 found at Tue Aug 3 01:01:34 UTC 2021 selfserv with PID 3382965 started at Tue Aug 3 01:01:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #771: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3382965 at Tue Aug 3 01:01:35 UTC 2021 kill -USR1 3382965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3382965 killed at Tue Aug 3 01:01:35 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383060 >/dev/null 2>/dev/null selfserv with PID 3383060 found at Tue Aug 3 01:01:35 UTC 2021 selfserv with PID 3383060 started at Tue Aug 3 01:01:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #772: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383060 at Tue Aug 3 01:01:36 UTC 2021 kill -USR1 3383060 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383060 killed at Tue Aug 3 01:01:36 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383159 >/dev/null 2>/dev/null selfserv with PID 3383159 found at Tue Aug 3 01:01:36 UTC 2021 selfserv with PID 3383159 started at Tue Aug 3 01:01:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #773: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3383159 at Tue Aug 3 01:01:37 UTC 2021 kill -USR1 3383159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383159 killed at Tue Aug 3 01:01:37 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383246 >/dev/null 2>/dev/null selfserv with PID 3383246 found at Tue Aug 3 01:01:37 UTC 2021 selfserv with PID 3383246 started at Tue Aug 3 01:01:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #774: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383246 at Tue Aug 3 01:01:38 UTC 2021 kill -USR1 3383246 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383246 killed at Tue Aug 3 01:01:38 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383348 >/dev/null 2>/dev/null selfserv with PID 3383348 found at Tue Aug 3 01:01:38 UTC 2021 selfserv with PID 3383348 started at Tue Aug 3 01:01:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #775: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383348 at Tue Aug 3 01:01:39 UTC 2021 kill -USR1 3383348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383348 killed at Tue Aug 3 01:01:39 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383406 >/dev/null 2>/dev/null selfserv with PID 3383406 found at Tue Aug 3 01:01:39 UTC 2021 selfserv with PID 3383406 started at Tue Aug 3 01:01:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #776: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383406 at Tue Aug 3 01:01:40 UTC 2021 kill -USR1 3383406 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383406 killed at Tue Aug 3 01:01:40 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383469 >/dev/null 2>/dev/null selfserv with PID 3383469 found at Tue Aug 3 01:01:40 UTC 2021 selfserv with PID 3383469 started at Tue Aug 3 01:01:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #777: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383469 at Tue Aug 3 01:01:41 UTC 2021 kill -USR1 3383469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383469 killed at Tue Aug 3 01:01:41 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383544 >/dev/null 2>/dev/null selfserv with PID 3383544 found at Tue Aug 3 01:01:41 UTC 2021 selfserv with PID 3383544 started at Tue Aug 3 01:01:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #778: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383544 at Tue Aug 3 01:01:42 UTC 2021 kill -USR1 3383544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383544 killed at Tue Aug 3 01:01:42 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383607 >/dev/null 2>/dev/null selfserv with PID 3383607 found at Tue Aug 3 01:01:42 UTC 2021 selfserv with PID 3383607 started at Tue Aug 3 01:01:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #779: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383607 at Tue Aug 3 01:01:43 UTC 2021 kill -USR1 3383607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383607 killed at Tue Aug 3 01:01:43 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383681 >/dev/null 2>/dev/null selfserv with PID 3383681 found at Tue Aug 3 01:01:43 UTC 2021 selfserv with PID 3383681 started at Tue Aug 3 01:01:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #780: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383681 at Tue Aug 3 01:01:43 UTC 2021 kill -USR1 3383681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383681 killed at Tue Aug 3 01:01:43 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383761 >/dev/null 2>/dev/null selfserv with PID 3383761 found at Tue Aug 3 01:01:44 UTC 2021 selfserv with PID 3383761 started at Tue Aug 3 01:01:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #781: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383761 at Tue Aug 3 01:01:45 UTC 2021 kill -USR1 3383761 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383761 killed at Tue Aug 3 01:01:45 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383832 >/dev/null 2>/dev/null selfserv with PID 3383832 found at Tue Aug 3 01:01:45 UTC 2021 selfserv with PID 3383832 started at Tue Aug 3 01:01:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #782: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3383832 at Tue Aug 3 01:01:46 UTC 2021 kill -USR1 3383832 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383832 killed at Tue Aug 3 01:01:46 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383889 >/dev/null 2>/dev/null selfserv with PID 3383889 found at Tue Aug 3 01:01:46 UTC 2021 selfserv with PID 3383889 started at Tue Aug 3 01:01:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #783: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3383889 at Tue Aug 3 01:01:47 UTC 2021 kill -USR1 3383889 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383889 killed at Tue Aug 3 01:01:47 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3383974 >/dev/null 2>/dev/null selfserv with PID 3383974 found at Tue Aug 3 01:01:47 UTC 2021 selfserv with PID 3383974 started at Tue Aug 3 01:01:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3383974 at Tue Aug 3 01:01:48 UTC 2021 kill -USR1 3383974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3383974 killed at Tue Aug 3 01:01:48 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384143 >/dev/null 2>/dev/null selfserv with PID 3384143 found at Tue Aug 3 01:01:48 UTC 2021 selfserv with PID 3384143 started at Tue Aug 3 01:01:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3384143 at Tue Aug 3 01:01:48 UTC 2021 kill -USR1 3384143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384143 killed at Tue Aug 3 01:01:48 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384218 >/dev/null 2>/dev/null selfserv with PID 3384218 found at Tue Aug 3 01:01:49 UTC 2021 selfserv with PID 3384218 started at Tue Aug 3 01:01:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3384218 at Tue Aug 3 01:01:49 UTC 2021 kill -USR1 3384218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384218 killed at Tue Aug 3 01:01:49 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384323 >/dev/null 2>/dev/null selfserv with PID 3384323 found at Tue Aug 3 01:01:49 UTC 2021 selfserv with PID 3384323 started at Tue Aug 3 01:01:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #787: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3384323 at Tue Aug 3 01:01:50 UTC 2021 kill -USR1 3384323 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384323 killed at Tue Aug 3 01:01:50 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384403 >/dev/null 2>/dev/null selfserv with PID 3384403 found at Tue Aug 3 01:01:50 UTC 2021 selfserv with PID 3384403 started at Tue Aug 3 01:01:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #788: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3384403 at Tue Aug 3 01:01:51 UTC 2021 kill -USR1 3384403 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384403 killed at Tue Aug 3 01:01:51 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384469 >/dev/null 2>/dev/null selfserv with PID 3384469 found at Tue Aug 3 01:01:51 UTC 2021 selfserv with PID 3384469 started at Tue Aug 3 01:01:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3384469 at Tue Aug 3 01:01:52 UTC 2021 kill -USR1 3384469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384469 killed at Tue Aug 3 01:01:52 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384538 >/dev/null 2>/dev/null selfserv with PID 3384538 found at Tue Aug 3 01:01:52 UTC 2021 selfserv with PID 3384538 started at Tue Aug 3 01:01:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #790: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3384538 at Tue Aug 3 01:01:53 UTC 2021 kill -USR1 3384538 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384538 killed at Tue Aug 3 01:01:53 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384601 >/dev/null 2>/dev/null selfserv with PID 3384601 found at Tue Aug 3 01:01:53 UTC 2021 selfserv with PID 3384601 started at Tue Aug 3 01:01:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3384601 at Tue Aug 3 01:01:54 UTC 2021 kill -USR1 3384601 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384601 killed at Tue Aug 3 01:01:54 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:01:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384661 >/dev/null 2>/dev/null selfserv with PID 3384661 found at Tue Aug 3 01:01:54 UTC 2021 selfserv with PID 3384661 started at Tue Aug 3 01:01:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #792: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3384661 at Tue Aug 3 01:01:55 UTC 2021 kill -USR1 3384661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384661 killed at Tue Aug 3 01:01:55 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384748 >/dev/null 2>/dev/null selfserv with PID 3384748 found at Tue Aug 3 01:01:55 UTC 2021 selfserv with PID 3384748 started at Tue Aug 3 01:01:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3384748 at Tue Aug 3 01:01:56 UTC 2021 kill -USR1 3384748 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384748 killed at Tue Aug 3 01:01:56 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384810 >/dev/null 2>/dev/null selfserv with PID 3384810 found at Tue Aug 3 01:01:56 UTC 2021 selfserv with PID 3384810 started at Tue Aug 3 01:01:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3384810 at Tue Aug 3 01:01:57 UTC 2021 kill -USR1 3384810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384810 killed at Tue Aug 3 01:01:57 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:01:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384878 >/dev/null 2>/dev/null selfserv with PID 3384878 found at Tue Aug 3 01:01:57 UTC 2021 selfserv with PID 3384878 started at Tue Aug 3 01:01:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #795: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3384878 at Tue Aug 3 01:01:57 UTC 2021 kill -USR1 3384878 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384878 killed at Tue Aug 3 01:01:57 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3384950 >/dev/null 2>/dev/null selfserv with PID 3384950 found at Tue Aug 3 01:01:58 UTC 2021 selfserv with PID 3384950 started at Tue Aug 3 01:01:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #796: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3384950 at Tue Aug 3 01:01:58 UTC 2021 kill -USR1 3384950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3384950 killed at Tue Aug 3 01:01:58 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3385086 >/dev/null 2>/dev/null selfserv with PID 3385086 found at Tue Aug 3 01:01:58 UTC 2021 selfserv with PID 3385086 started at Tue Aug 3 01:01:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #797: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3385086 at Tue Aug 3 01:01:59 UTC 2021 kill -USR1 3385086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3385086 killed at Tue Aug 3 01:01:59 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:01:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:01:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3385273 >/dev/null 2>/dev/null selfserv with PID 3385273 found at Tue Aug 3 01:01:59 UTC 2021 selfserv with PID 3385273 started at Tue Aug 3 01:01:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #798: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3385273 at Tue Aug 3 01:02:00 UTC 2021 kill -USR1 3385273 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3385273 killed at Tue Aug 3 01:02:00 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:02:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3385391 >/dev/null 2>/dev/null selfserv with PID 3385391 found at Tue Aug 3 01:02:00 UTC 2021 selfserv with PID 3385391 started at Tue Aug 3 01:02:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #799: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3385391 at Tue Aug 3 01:02:01 UTC 2021 kill -USR1 3385391 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3385391 killed at Tue Aug 3 01:02:01 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:02:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3385524 >/dev/null 2>/dev/null selfserv with PID 3385524 found at Tue Aug 3 01:02:01 UTC 2021 selfserv with PID 3385524 started at Tue Aug 3 01:02:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3385524 at Tue Aug 3 01:02:02 UTC 2021 kill -USR1 3385524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3385524 killed at Tue Aug 3 01:02:02 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:02:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3385861 >/dev/null 2>/dev/null selfserv with PID 3385861 found at Tue Aug 3 01:02:02 UTC 2021 selfserv with PID 3385861 started at Tue Aug 3 01:02:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #801: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3385861 at Tue Aug 3 01:02:03 UTC 2021 kill -USR1 3385861 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3385861 killed at Tue Aug 3 01:02:03 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:02:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3386034 >/dev/null 2>/dev/null selfserv with PID 3386034 found at Tue Aug 3 01:02:03 UTC 2021 selfserv with PID 3386034 started at Tue Aug 3 01:02:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #802: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3386034 at Tue Aug 3 01:02:04 UTC 2021 kill -USR1 3386034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3386034 killed at Tue Aug 3 01:02:04 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:02:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3386205 >/dev/null 2>/dev/null selfserv with PID 3386205 found at Tue Aug 3 01:02:04 UTC 2021 selfserv with PID 3386205 started at Tue Aug 3 01:02:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3386205 at Tue Aug 3 01:02:05 UTC 2021 kill -USR1 3386205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3386205 killed at Tue Aug 3 01:02:05 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:02:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3386367 >/dev/null 2>/dev/null selfserv with PID 3386367 found at Tue Aug 3 01:02:05 UTC 2021 selfserv with PID 3386367 started at Tue Aug 3 01:02:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #804: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3386367 at Tue Aug 3 01:02:06 UTC 2021 kill -USR1 3386367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3386367 killed at Tue Aug 3 01:02:06 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:02:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3386522 >/dev/null 2>/dev/null selfserv with PID 3386522 found at Tue Aug 3 01:02:06 UTC 2021 selfserv with PID 3386522 started at Tue Aug 3 01:02:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #805: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3386522 at Tue Aug 3 01:02:07 UTC 2021 kill -USR1 3386522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3386522 killed at Tue Aug 3 01:02:07 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:02:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3386714 >/dev/null 2>/dev/null selfserv with PID 3386714 found at Tue Aug 3 01:02:07 UTC 2021 selfserv with PID 3386714 started at Tue Aug 3 01:02:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #806: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3386714 at Tue Aug 3 01:02:08 UTC 2021 kill -USR1 3386714 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3386714 killed at Tue Aug 3 01:02:08 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:02:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3386939 >/dev/null 2>/dev/null selfserv with PID 3386939 found at Tue Aug 3 01:02:08 UTC 2021 selfserv with PID 3386939 started at Tue Aug 3 01:02:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #807: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3386939 at Tue Aug 3 01:02:09 UTC 2021 kill -USR1 3386939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3386939 killed at Tue Aug 3 01:02:09 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:02:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3387188 >/dev/null 2>/dev/null selfserv with PID 3387188 found at Tue Aug 3 01:02:09 UTC 2021 selfserv with PID 3387188 started at Tue Aug 3 01:02:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3387188 at Tue Aug 3 01:02:10 UTC 2021 kill -USR1 3387188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3387188 killed at Tue Aug 3 01:02:10 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:02:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3387257 >/dev/null 2>/dev/null selfserv with PID 3387257 found at Tue Aug 3 01:02:10 UTC 2021 selfserv with PID 3387257 started at Tue Aug 3 01:02:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3387257 at Tue Aug 3 01:02:11 UTC 2021 kill -USR1 3387257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3387257 killed at Tue Aug 3 01:02:11 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:02:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3387379 >/dev/null 2>/dev/null selfserv with PID 3387379 found at Tue Aug 3 01:02:11 UTC 2021 selfserv with PID 3387379 started at Tue Aug 3 01:02:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3387379 at Tue Aug 3 01:02:12 UTC 2021 kill -USR1 3387379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3387379 killed at Tue Aug 3 01:02:12 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:02:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3387551 >/dev/null 2>/dev/null selfserv with PID 3387551 found at Tue Aug 3 01:02:12 UTC 2021 selfserv with PID 3387551 started at Tue Aug 3 01:02:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #811: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3387551 at Tue Aug 3 01:02:12 UTC 2021 kill -USR1 3387551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3387551 killed at Tue Aug 3 01:02:12 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:02:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3387724 >/dev/null 2>/dev/null selfserv with PID 3387724 found at Tue Aug 3 01:02:13 UTC 2021 selfserv with PID 3387724 started at Tue Aug 3 01:02:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #812: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3387724 at Tue Aug 3 01:02:13 UTC 2021 kill -USR1 3387724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3387724 killed at Tue Aug 3 01:02:13 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:02:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3387808 >/dev/null 2>/dev/null selfserv with PID 3387808 found at Tue Aug 3 01:02:13 UTC 2021 selfserv with PID 3387808 started at Tue Aug 3 01:02:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #813: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3387808 at Tue Aug 3 01:02:14 UTC 2021 kill -USR1 3387808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3387808 killed at Tue Aug 3 01:02:14 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 01:02:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3387895 >/dev/null 2>/dev/null selfserv with PID 3387895 found at Tue Aug 3 01:02:14 UTC 2021 selfserv with PID 3387895 started at Tue Aug 3 01:02:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3387895 at Tue Aug 3 01:02:15 UTC 2021 kill -USR1 3387895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3387895 killed at Tue Aug 3 01:02:15 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 01:02:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3387975 >/dev/null 2>/dev/null selfserv with PID 3387975 found at Tue Aug 3 01:02:15 UTC 2021 selfserv with PID 3387975 started at Tue Aug 3 01:02:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3387975 at Tue Aug 3 01:02:16 UTC 2021 kill -USR1 3387975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3387975 killed at Tue Aug 3 01:02:16 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 01:02:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3388197 >/dev/null 2>/dev/null selfserv with PID 3388197 found at Tue Aug 3 01:02:16 UTC 2021 selfserv with PID 3388197 started at Tue Aug 3 01:02:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3388197 at Tue Aug 3 01:02:17 UTC 2021 kill -USR1 3388197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3388197 killed at Tue Aug 3 01:02:17 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3388401 >/dev/null 2>/dev/null selfserv with PID 3388401 found at Tue Aug 3 01:02:17 UTC 2021 selfserv with PID 3388401 started at Tue Aug 3 01:02:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #817: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3388401 at Tue Aug 3 01:02:18 UTC 2021 kill -USR1 3388401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3388401 killed at Tue Aug 3 01:02:18 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3388496 >/dev/null 2>/dev/null selfserv with PID 3388496 found at Tue Aug 3 01:02:18 UTC 2021 selfserv with PID 3388496 started at Tue Aug 3 01:02:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3388496 at Tue Aug 3 01:02:19 UTC 2021 kill -USR1 3388496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3388496 killed at Tue Aug 3 01:02:19 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3388562 >/dev/null 2>/dev/null selfserv with PID 3388562 found at Tue Aug 3 01:02:19 UTC 2021 selfserv with PID 3388562 started at Tue Aug 3 01:02:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3388562 at Tue Aug 3 01:02:20 UTC 2021 kill -USR1 3388562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3388562 killed at Tue Aug 3 01:02:20 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3388717 >/dev/null 2>/dev/null selfserv with PID 3388717 found at Tue Aug 3 01:02:20 UTC 2021 selfserv with PID 3388717 started at Tue Aug 3 01:02:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #820: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3388717 at Tue Aug 3 01:02:21 UTC 2021 kill -USR1 3388717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3388717 killed at Tue Aug 3 01:02:21 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3388860 >/dev/null 2>/dev/null selfserv with PID 3388860 found at Tue Aug 3 01:02:21 UTC 2021 selfserv with PID 3388860 started at Tue Aug 3 01:02:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3388860 at Tue Aug 3 01:02:22 UTC 2021 kill -USR1 3388860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3388860 killed at Tue Aug 3 01:02:22 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3389026 >/dev/null 2>/dev/null selfserv with PID 3389026 found at Tue Aug 3 01:02:22 UTC 2021 selfserv with PID 3389026 started at Tue Aug 3 01:02:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #822: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3389026 at Tue Aug 3 01:02:22 UTC 2021 kill -USR1 3389026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3389026 killed at Tue Aug 3 01:02:22 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3389178 >/dev/null 2>/dev/null selfserv with PID 3389178 found at Tue Aug 3 01:02:23 UTC 2021 selfserv with PID 3389178 started at Tue Aug 3 01:02:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #823: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3389178 at Tue Aug 3 01:02:23 UTC 2021 kill -USR1 3389178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3389178 killed at Tue Aug 3 01:02:23 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3389253 >/dev/null 2>/dev/null selfserv with PID 3389253 found at Tue Aug 3 01:02:23 UTC 2021 selfserv with PID 3389253 started at Tue Aug 3 01:02:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #824: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3389253 at Tue Aug 3 01:02:24 UTC 2021 kill -USR1 3389253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3389253 killed at Tue Aug 3 01:02:24 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3389330 >/dev/null 2>/dev/null selfserv with PID 3389330 found at Tue Aug 3 01:02:24 UTC 2021 selfserv with PID 3389330 started at Tue Aug 3 01:02:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #825: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3389330 at Tue Aug 3 01:02:25 UTC 2021 kill -USR1 3389330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3389330 killed at Tue Aug 3 01:02:25 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3389403 >/dev/null 2>/dev/null selfserv with PID 3389403 found at Tue Aug 3 01:02:25 UTC 2021 selfserv with PID 3389403 started at Tue Aug 3 01:02:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #826: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3389403 at Tue Aug 3 01:02:26 UTC 2021 kill -USR1 3389403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3389403 killed at Tue Aug 3 01:02:26 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3389485 >/dev/null 2>/dev/null selfserv with PID 3389485 found at Tue Aug 3 01:02:26 UTC 2021 selfserv with PID 3389485 started at Tue Aug 3 01:02:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3389485 at Tue Aug 3 01:02:27 UTC 2021 kill -USR1 3389485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3389485 killed at Tue Aug 3 01:02:27 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3389619 >/dev/null 2>/dev/null selfserv with PID 3389619 found at Tue Aug 3 01:02:27 UTC 2021 selfserv with PID 3389619 started at Tue Aug 3 01:02:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #828: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3389619 at Tue Aug 3 01:02:28 UTC 2021 kill -USR1 3389619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3389619 killed at Tue Aug 3 01:02:28 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3389769 >/dev/null 2>/dev/null selfserv with PID 3389769 found at Tue Aug 3 01:02:28 UTC 2021 selfserv with PID 3389769 started at Tue Aug 3 01:02:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3389769 at Tue Aug 3 01:02:29 UTC 2021 kill -USR1 3389769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3389769 killed at Tue Aug 3 01:02:29 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3389930 >/dev/null 2>/dev/null selfserv with PID 3389930 found at Tue Aug 3 01:02:29 UTC 2021 selfserv with PID 3389930 started at Tue Aug 3 01:02:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3389930 at Tue Aug 3 01:02:29 UTC 2021 kill -USR1 3389930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3389930 killed at Tue Aug 3 01:02:29 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3390126 >/dev/null 2>/dev/null selfserv with PID 3390126 found at Tue Aug 3 01:02:30 UTC 2021 selfserv with PID 3390126 started at Tue Aug 3 01:02:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3390126 at Tue Aug 3 01:02:30 UTC 2021 kill -USR1 3390126 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3390126 killed at Tue Aug 3 01:02:30 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3390299 >/dev/null 2>/dev/null selfserv with PID 3390299 found at Tue Aug 3 01:02:30 UTC 2021 selfserv with PID 3390299 started at Tue Aug 3 01:02:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #832: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3390299 at Tue Aug 3 01:02:31 UTC 2021 kill -USR1 3390299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3390299 killed at Tue Aug 3 01:02:31 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3390420 >/dev/null 2>/dev/null selfserv with PID 3390420 found at Tue Aug 3 01:02:31 UTC 2021 selfserv with PID 3390420 started at Tue Aug 3 01:02:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3390420 at Tue Aug 3 01:02:32 UTC 2021 kill -USR1 3390420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3390420 killed at Tue Aug 3 01:02:32 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3390599 >/dev/null 2>/dev/null selfserv with PID 3390599 found at Tue Aug 3 01:02:32 UTC 2021 selfserv with PID 3390599 started at Tue Aug 3 01:02:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #834: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3390599 at Tue Aug 3 01:02:33 UTC 2021 kill -USR1 3390599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3390599 killed at Tue Aug 3 01:02:33 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:33 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3390769 >/dev/null 2>/dev/null selfserv with PID 3390769 found at Tue Aug 3 01:02:33 UTC 2021 selfserv with PID 3390769 started at Tue Aug 3 01:02:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #835: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3390769 at Tue Aug 3 01:02:34 UTC 2021 kill -USR1 3390769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3390769 killed at Tue Aug 3 01:02:34 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3390961 >/dev/null 2>/dev/null selfserv with PID 3390961 found at Tue Aug 3 01:02:34 UTC 2021 selfserv with PID 3390961 started at Tue Aug 3 01:02:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #836: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3390961 at Tue Aug 3 01:02:35 UTC 2021 kill -USR1 3390961 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3390961 killed at Tue Aug 3 01:02:35 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3391196 >/dev/null 2>/dev/null selfserv with PID 3391196 found at Tue Aug 3 01:02:35 UTC 2021 selfserv with PID 3391196 started at Tue Aug 3 01:02:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #837: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3391196 at Tue Aug 3 01:02:36 UTC 2021 kill -USR1 3391196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3391196 killed at Tue Aug 3 01:02:36 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3391313 >/dev/null 2>/dev/null selfserv with PID 3391313 found at Tue Aug 3 01:02:36 UTC 2021 selfserv with PID 3391313 started at Tue Aug 3 01:02:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #838: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3391313 at Tue Aug 3 01:02:37 UTC 2021 kill -USR1 3391313 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3391313 killed at Tue Aug 3 01:02:37 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3391500 >/dev/null 2>/dev/null selfserv with PID 3391500 found at Tue Aug 3 01:02:37 UTC 2021 selfserv with PID 3391500 started at Tue Aug 3 01:02:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3391500 at Tue Aug 3 01:02:38 UTC 2021 kill -USR1 3391500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3391500 killed at Tue Aug 3 01:02:38 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3391711 >/dev/null 2>/dev/null selfserv with PID 3391711 found at Tue Aug 3 01:02:38 UTC 2021 selfserv with PID 3391711 started at Tue Aug 3 01:02:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #840: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3391711 at Tue Aug 3 01:02:39 UTC 2021 kill -USR1 3391711 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3391711 killed at Tue Aug 3 01:02:39 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3391994 >/dev/null 2>/dev/null selfserv with PID 3391994 found at Tue Aug 3 01:02:39 UTC 2021 selfserv with PID 3391994 started at Tue Aug 3 01:02:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3391994 at Tue Aug 3 01:02:40 UTC 2021 kill -USR1 3391994 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3391994 killed at Tue Aug 3 01:02:40 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3392252 >/dev/null 2>/dev/null selfserv with PID 3392252 found at Tue Aug 3 01:02:40 UTC 2021 selfserv with PID 3392252 started at Tue Aug 3 01:02:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3392252 at Tue Aug 3 01:02:41 UTC 2021 kill -USR1 3392252 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3392252 killed at Tue Aug 3 01:02:41 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3392462 >/dev/null 2>/dev/null selfserv with PID 3392462 found at Tue Aug 3 01:02:41 UTC 2021 selfserv with PID 3392462 started at Tue Aug 3 01:02:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3392462 at Tue Aug 3 01:02:41 UTC 2021 kill -USR1 3392462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3392462 killed at Tue Aug 3 01:02:41 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3392624 >/dev/null 2>/dev/null selfserv with PID 3392624 found at Tue Aug 3 01:02:41 UTC 2021 selfserv with PID 3392624 started at Tue Aug 3 01:02:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #844: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3392624 at Tue Aug 3 01:02:42 UTC 2021 kill -USR1 3392624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3392624 killed at Tue Aug 3 01:02:42 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3392775 >/dev/null 2>/dev/null selfserv with PID 3392775 found at Tue Aug 3 01:02:42 UTC 2021 selfserv with PID 3392775 started at Tue Aug 3 01:02:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3392775 at Tue Aug 3 01:02:43 UTC 2021 kill -USR1 3392775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3392775 killed at Tue Aug 3 01:02:43 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3392960 >/dev/null 2>/dev/null selfserv with PID 3392960 found at Tue Aug 3 01:02:43 UTC 2021 selfserv with PID 3392960 started at Tue Aug 3 01:02:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #846: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3392960 at Tue Aug 3 01:02:44 UTC 2021 kill -USR1 3392960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3392960 killed at Tue Aug 3 01:02:44 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3393286 >/dev/null 2>/dev/null selfserv with PID 3393286 found at Tue Aug 3 01:02:44 UTC 2021 selfserv with PID 3393286 started at Tue Aug 3 01:02:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #847: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3393286 at Tue Aug 3 01:02:45 UTC 2021 kill -USR1 3393286 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3393286 killed at Tue Aug 3 01:02:45 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3393465 >/dev/null 2>/dev/null selfserv with PID 3393465 found at Tue Aug 3 01:02:45 UTC 2021 selfserv with PID 3393465 started at Tue Aug 3 01:02:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #848: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3393465 at Tue Aug 3 01:02:46 UTC 2021 kill -USR1 3393465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3393465 killed at Tue Aug 3 01:02:46 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3393626 >/dev/null 2>/dev/null selfserv with PID 3393626 found at Tue Aug 3 01:02:46 UTC 2021 selfserv with PID 3393626 started at Tue Aug 3 01:02:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #849: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3393626 at Tue Aug 3 01:02:47 UTC 2021 kill -USR1 3393626 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3393626 killed at Tue Aug 3 01:02:47 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3393783 >/dev/null 2>/dev/null selfserv with PID 3393783 found at Tue Aug 3 01:02:47 UTC 2021 selfserv with PID 3393783 started at Tue Aug 3 01:02:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #850: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3393783 at Tue Aug 3 01:02:48 UTC 2021 kill -USR1 3393783 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3393783 killed at Tue Aug 3 01:02:48 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3393973 >/dev/null 2>/dev/null selfserv with PID 3393973 found at Tue Aug 3 01:02:48 UTC 2021 selfserv with PID 3393973 started at Tue Aug 3 01:02:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3393973 at Tue Aug 3 01:02:49 UTC 2021 kill -USR1 3393973 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3393973 killed at Tue Aug 3 01:02:49 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394092 >/dev/null 2>/dev/null selfserv with PID 3394092 found at Tue Aug 3 01:02:49 UTC 2021 selfserv with PID 3394092 started at Tue Aug 3 01:02:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #852: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3394092 at Tue Aug 3 01:02:50 UTC 2021 kill -USR1 3394092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394092 killed at Tue Aug 3 01:02:50 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394217 >/dev/null 2>/dev/null selfserv with PID 3394217 found at Tue Aug 3 01:02:50 UTC 2021 selfserv with PID 3394217 started at Tue Aug 3 01:02:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #853: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3394217 at Tue Aug 3 01:02:50 UTC 2021 kill -USR1 3394217 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394217 killed at Tue Aug 3 01:02:50 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394306 >/dev/null 2>/dev/null selfserv with PID 3394306 found at Tue Aug 3 01:02:51 UTC 2021 selfserv with PID 3394306 started at Tue Aug 3 01:02:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #854: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3394306 at Tue Aug 3 01:02:51 UTC 2021 kill -USR1 3394306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394306 killed at Tue Aug 3 01:02:51 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394386 >/dev/null 2>/dev/null selfserv with PID 3394386 found at Tue Aug 3 01:02:51 UTC 2021 selfserv with PID 3394386 started at Tue Aug 3 01:02:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #855: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3394386 at Tue Aug 3 01:02:52 UTC 2021 kill -USR1 3394386 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394386 killed at Tue Aug 3 01:02:52 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394477 >/dev/null 2>/dev/null selfserv with PID 3394477 found at Tue Aug 3 01:02:52 UTC 2021 selfserv with PID 3394477 started at Tue Aug 3 01:02:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #856: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3394477 at Tue Aug 3 01:02:53 UTC 2021 kill -USR1 3394477 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394477 killed at Tue Aug 3 01:02:53 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394575 >/dev/null 2>/dev/null selfserv with PID 3394575 found at Tue Aug 3 01:02:53 UTC 2021 selfserv with PID 3394575 started at Tue Aug 3 01:02:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #857: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3394575 at Tue Aug 3 01:02:54 UTC 2021 kill -USR1 3394575 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394575 killed at Tue Aug 3 01:02:54 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394679 >/dev/null 2>/dev/null selfserv with PID 3394679 found at Tue Aug 3 01:02:54 UTC 2021 selfserv with PID 3394679 started at Tue Aug 3 01:02:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #858: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3394679 at Tue Aug 3 01:02:55 UTC 2021 kill -USR1 3394679 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394679 killed at Tue Aug 3 01:02:55 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394775 >/dev/null 2>/dev/null selfserv with PID 3394775 found at Tue Aug 3 01:02:55 UTC 2021 selfserv with PID 3394775 started at Tue Aug 3 01:02:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #859: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3394775 at Tue Aug 3 01:02:56 UTC 2021 kill -USR1 3394775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394775 killed at Tue Aug 3 01:02:56 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394851 >/dev/null 2>/dev/null selfserv with PID 3394851 found at Tue Aug 3 01:02:56 UTC 2021 selfserv with PID 3394851 started at Tue Aug 3 01:02:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #860: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3394851 at Tue Aug 3 01:02:57 UTC 2021 kill -USR1 3394851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394851 killed at Tue Aug 3 01:02:57 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:02:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3394929 >/dev/null 2>/dev/null selfserv with PID 3394929 found at Tue Aug 3 01:02:57 UTC 2021 selfserv with PID 3394929 started at Tue Aug 3 01:02:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #861: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3394929 at Tue Aug 3 01:02:58 UTC 2021 kill -USR1 3394929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3394929 killed at Tue Aug 3 01:02:58 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3395026 >/dev/null 2>/dev/null selfserv with PID 3395026 found at Tue Aug 3 01:02:58 UTC 2021 selfserv with PID 3395026 started at Tue Aug 3 01:02:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #862: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3395026 at Tue Aug 3 01:02:59 UTC 2021 kill -USR1 3395026 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3395026 killed at Tue Aug 3 01:02:59 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:02:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:02:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3395118 >/dev/null 2>/dev/null selfserv with PID 3395118 found at Tue Aug 3 01:02:59 UTC 2021 selfserv with PID 3395118 started at Tue Aug 3 01:02:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #863: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3395118 at Tue Aug 3 01:03:00 UTC 2021 kill -USR1 3395118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3395118 killed at Tue Aug 3 01:03:00 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:03:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3395227 >/dev/null 2>/dev/null selfserv with PID 3395227 found at Tue Aug 3 01:03:00 UTC 2021 selfserv with PID 3395227 started at Tue Aug 3 01:03:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #864: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3395227 at Tue Aug 3 01:03:00 UTC 2021 kill -USR1 3395227 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3395227 killed at Tue Aug 3 01:03:00 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:03:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3395342 >/dev/null 2>/dev/null selfserv with PID 3395342 found at Tue Aug 3 01:03:01 UTC 2021 selfserv with PID 3395342 started at Tue Aug 3 01:03:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #865: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3395342 at Tue Aug 3 01:03:01 UTC 2021 kill -USR1 3395342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3395342 killed at Tue Aug 3 01:03:01 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:03:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3395502 >/dev/null 2>/dev/null selfserv with PID 3395502 found at Tue Aug 3 01:03:01 UTC 2021 selfserv with PID 3395502 started at Tue Aug 3 01:03:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #866: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3395502 at Tue Aug 3 01:03:02 UTC 2021 kill -USR1 3395502 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3395502 killed at Tue Aug 3 01:03:02 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:03:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3395700 >/dev/null 2>/dev/null selfserv with PID 3395700 found at Tue Aug 3 01:03:02 UTC 2021 selfserv with PID 3395700 started at Tue Aug 3 01:03:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #867: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3395700 at Tue Aug 3 01:03:03 UTC 2021 kill -USR1 3395700 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3395700 killed at Tue Aug 3 01:03:03 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:03:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3395923 >/dev/null 2>/dev/null selfserv with PID 3395923 found at Tue Aug 3 01:03:03 UTC 2021 selfserv with PID 3395923 started at Tue Aug 3 01:03:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #868: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3395923 at Tue Aug 3 01:03:04 UTC 2021 kill -USR1 3395923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3395923 killed at Tue Aug 3 01:03:04 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:03:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3396063 >/dev/null 2>/dev/null selfserv with PID 3396063 found at Tue Aug 3 01:03:04 UTC 2021 selfserv with PID 3396063 started at Tue Aug 3 01:03:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #869: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3396063 at Tue Aug 3 01:03:05 UTC 2021 kill -USR1 3396063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3396063 killed at Tue Aug 3 01:03:05 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:03:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3396341 >/dev/null 2>/dev/null selfserv with PID 3396341 found at Tue Aug 3 01:03:05 UTC 2021 selfserv with PID 3396341 started at Tue Aug 3 01:03:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #870: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3396341 at Tue Aug 3 01:03:06 UTC 2021 kill -USR1 3396341 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3396341 killed at Tue Aug 3 01:03:06 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:03:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3396530 >/dev/null 2>/dev/null selfserv with PID 3396530 found at Tue Aug 3 01:03:06 UTC 2021 selfserv with PID 3396530 started at Tue Aug 3 01:03:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #871: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3396530 at Tue Aug 3 01:03:07 UTC 2021 kill -USR1 3396530 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3396530 killed at Tue Aug 3 01:03:07 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:03:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3396651 >/dev/null 2>/dev/null selfserv with PID 3396651 found at Tue Aug 3 01:03:07 UTC 2021 selfserv with PID 3396651 started at Tue Aug 3 01:03:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #872: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3396651 at Tue Aug 3 01:03:08 UTC 2021 kill -USR1 3396651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3396651 killed at Tue Aug 3 01:03:08 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:03:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3396849 >/dev/null 2>/dev/null selfserv with PID 3396849 found at Tue Aug 3 01:03:08 UTC 2021 selfserv with PID 3396849 started at Tue Aug 3 01:03:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #873: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3396849 at Tue Aug 3 01:03:09 UTC 2021 kill -USR1 3396849 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3396849 killed at Tue Aug 3 01:03:09 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:03:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3397069 >/dev/null 2>/dev/null selfserv with PID 3397069 found at Tue Aug 3 01:03:09 UTC 2021 selfserv with PID 3397069 started at Tue Aug 3 01:03:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #874: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3397069 at Tue Aug 3 01:03:10 UTC 2021 kill -USR1 3397069 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3397069 killed at Tue Aug 3 01:03:10 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:03:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3397262 >/dev/null 2>/dev/null selfserv with PID 3397262 found at Tue Aug 3 01:03:10 UTC 2021 selfserv with PID 3397262 started at Tue Aug 3 01:03:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #875: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3397262 at Tue Aug 3 01:03:11 UTC 2021 kill -USR1 3397262 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3397262 killed at Tue Aug 3 01:03:11 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:03:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3397486 >/dev/null 2>/dev/null selfserv with PID 3397486 found at Tue Aug 3 01:03:11 UTC 2021 selfserv with PID 3397486 started at Tue Aug 3 01:03:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #876: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3397486 at Tue Aug 3 01:03:12 UTC 2021 kill -USR1 3397486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3397486 killed at Tue Aug 3 01:03:12 UTC 2021 ssl.sh: Cache CRL SSL Client Tests =============================== /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/authin.tl.tmp 0 selfserv starting at Tue Aug 3 01:03:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:12 UTC 2021 selfserv with PID 3397625 started at Tue Aug 3 01:03:12 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:13 UTC 2021 ssl.sh: #712: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:13 UTC 2021 ssl.sh: #713: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:13 UTC 2021 ssl.sh: #714: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:14 UTC 2021 ssl.sh: #715: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:14 UTC 2021 ssl.sh: #716: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:14 UTC 2021 ssl.sh: #717: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:15 UTC 2021 ssl.sh: #718: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:15 UTC 2021 ssl.sh: #719: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:15 UTC 2021 ssl.sh: #720: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:16 UTC 2021 ssl.sh: #721: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:16 UTC 2021 ssl.sh: #722: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:16 UTC 2021 ssl.sh: #723: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:17 UTC 2021 ssl.sh: #724: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:17 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #725: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:17 UTC 2021 ssl.sh: #726: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:18 UTC 2021 ssl.sh: #727: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:18 UTC 2021 ssl.sh: #728: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:18 UTC 2021 ssl.sh: #729: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:19 UTC 2021 ssl.sh: #730: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:19 UTC 2021 ssl.sh: #731: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:19 UTC 2021 ssl.sh: #732: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:20 UTC 2021 ssl.sh: #733: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:20 UTC 2021 ssl.sh: #734: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:20 UTC 2021 ssl.sh: #735: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:21 UTC 2021 ssl.sh: #736: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:21 UTC 2021 ssl.sh: #737: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:21 UTC 2021 ssl.sh: #738: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:22 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #739: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:22 UTC 2021 ssl.sh: #740: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:22 UTC 2021 ssl.sh: #741: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:23 UTC 2021 ssl.sh: #742: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:23 UTC 2021 ssl.sh: #743: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:23 UTC 2021 ssl.sh: #744: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:24 UTC 2021 ssl.sh: #745: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:24 UTC 2021 ssl.sh: #746: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:24 UTC 2021 ssl.sh: #747: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:25 UTC 2021 ssl.sh: #748: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:25 UTC 2021 ssl.sh: #749: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:25 UTC 2021 ssl.sh: #750: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:26 UTC 2021 ssl.sh: #751: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3397625 >/dev/null 2>/dev/null selfserv with PID 3397625 found at Tue Aug 3 01:03:26 UTC 2021 ssl.sh: #752: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3397625 at Tue Aug 3 01:03:26 UTC 2021 kill -USR1 3397625 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3397625 killed at Tue Aug 3 01:03:26 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:03:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:26 UTC 2021 selfserv with PID 3400441 started at Tue Aug 3 01:03:26 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:27 UTC 2021 ssl.sh: #753: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:27 UTC 2021 ssl.sh: #754: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:27 UTC 2021 ssl.sh: #755: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:28 UTC 2021 ssl.sh: #756: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:28 UTC 2021 ssl.sh: #757: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:28 UTC 2021 ssl.sh: #758: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:28 UTC 2021 ssl.sh: #759: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:29 UTC 2021 ssl.sh: #760: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:29 UTC 2021 ssl.sh: #761: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:29 UTC 2021 ssl.sh: #762: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:29 UTC 2021 ssl.sh: #763: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:30 UTC 2021 ssl.sh: #764: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:30 UTC 2021 ssl.sh: #765: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:30 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #766: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:31 UTC 2021 ssl.sh: #767: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:31 UTC 2021 ssl.sh: #768: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:31 UTC 2021 ssl.sh: #769: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:31 UTC 2021 ssl.sh: #770: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:31 UTC 2021 ssl.sh: #771: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:32 UTC 2021 ssl.sh: #772: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:32 UTC 2021 ssl.sh: #773: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:32 UTC 2021 ssl.sh: #774: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:32 UTC 2021 ssl.sh: #775: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:33 UTC 2021 ssl.sh: #776: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:33 UTC 2021 ssl.sh: #777: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:33 UTC 2021 ssl.sh: #778: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:33 UTC 2021 ssl.sh: #779: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:34 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #780: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:34 UTC 2021 ssl.sh: #781: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:34 UTC 2021 ssl.sh: #782: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:35 UTC 2021 ssl.sh: #783: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:35 UTC 2021 ssl.sh: #784: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:35 UTC 2021 ssl.sh: #785: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:35 UTC 2021 ssl.sh: #786: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:36 UTC 2021 ssl.sh: #787: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:36 UTC 2021 ssl.sh: #788: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:36 UTC 2021 ssl.sh: #789: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:36 UTC 2021 ssl.sh: #790: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:37 UTC 2021 ssl.sh: #791: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:37 UTC 2021 ssl.sh: #792: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3400441 >/dev/null 2>/dev/null selfserv with PID 3400441 found at Tue Aug 3 01:03:37 UTC 2021 ssl.sh: #793: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3400441 at Tue Aug 3 01:03:37 UTC 2021 kill -USR1 3400441 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3400441 killed at Tue Aug 3 01:03:37 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:03:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:37 UTC 2021 selfserv with PID 3402199 started at Tue Aug 3 01:03:37 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:38 UTC 2021 ssl.sh: #794: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:38 UTC 2021 ssl.sh: #795: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:38 UTC 2021 ssl.sh: #796: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:38 UTC 2021 ssl.sh: #797: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:39 UTC 2021 ssl.sh: #798: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:39 UTC 2021 ssl.sh: #799: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:39 UTC 2021 ssl.sh: #800: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:39 UTC 2021 ssl.sh: #801: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:39 UTC 2021 ssl.sh: #802: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:39 UTC 2021 ssl.sh: #803: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:39 UTC 2021 ssl.sh: #804: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:40 UTC 2021 ssl.sh: #805: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:40 UTC 2021 ssl.sh: #806: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:40 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #807: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:40 UTC 2021 ssl.sh: #808: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:40 UTC 2021 ssl.sh: #809: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:40 UTC 2021 ssl.sh: #810: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:40 UTC 2021 ssl.sh: #811: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:41 UTC 2021 ssl.sh: #812: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:41 UTC 2021 ssl.sh: #813: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:41 UTC 2021 ssl.sh: #814: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:41 UTC 2021 ssl.sh: #815: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:41 UTC 2021 ssl.sh: #816: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:41 UTC 2021 ssl.sh: #817: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:42 UTC 2021 ssl.sh: #818: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:42 UTC 2021 ssl.sh: #819: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:42 UTC 2021 ssl.sh: #820: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:42 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #821: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:42 UTC 2021 ssl.sh: #822: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:42 UTC 2021 ssl.sh: #823: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:42 UTC 2021 ssl.sh: #824: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:43 UTC 2021 ssl.sh: #825: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:43 UTC 2021 ssl.sh: #826: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:43 UTC 2021 ssl.sh: #827: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:43 UTC 2021 ssl.sh: #828: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:43 UTC 2021 ssl.sh: #829: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:43 UTC 2021 ssl.sh: #830: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:43 UTC 2021 ssl.sh: #831: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:44 UTC 2021 ssl.sh: #832: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:44 UTC 2021 ssl.sh: #833: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3402199 >/dev/null 2>/dev/null selfserv with PID 3402199 found at Tue Aug 3 01:03:44 UTC 2021 ssl.sh: #834: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3402199 at Tue Aug 3 01:03:44 UTC 2021 kill -USR1 3402199 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3402199 killed at Tue Aug 3 01:03:44 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:03:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:44 UTC 2021 selfserv with PID 3404252 started at Tue Aug 3 01:03:44 UTC 2021 Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:45 UTC 2021 ssl.sh: #835: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:45 UTC 2021 ssl.sh: #836: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:45 UTC 2021 ssl.sh: #837: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:46 UTC 2021 ssl.sh: #838: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:46 UTC 2021 ssl.sh: #839: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:46 UTC 2021 ssl.sh: #840: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:46 UTC 2021 ssl.sh: #841: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:47 UTC 2021 ssl.sh: #842: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:47 UTC 2021 ssl.sh: #843: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:47 UTC 2021 ssl.sh: #844: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:47 UTC 2021 ssl.sh: #845: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:47 UTC 2021 ssl.sh: #846: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:48 UTC 2021 ssl.sh: #847: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:48 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #848: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:48 UTC 2021 ssl.sh: #849: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:48 UTC 2021 ssl.sh: #850: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:49 UTC 2021 ssl.sh: #851: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:49 UTC 2021 ssl.sh: #852: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:49 UTC 2021 ssl.sh: #853: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:49 UTC 2021 ssl.sh: #854: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:49 UTC 2021 ssl.sh: #855: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:50 UTC 2021 ssl.sh: #856: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:50 UTC 2021 ssl.sh: #857: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:50 UTC 2021 ssl.sh: #858: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:50 UTC 2021 ssl.sh: #859: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:51 UTC 2021 ssl.sh: #860: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:51 UTC 2021 ssl.sh: #861: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:51 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #862: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:51 UTC 2021 ssl.sh: #863: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:52 UTC 2021 ssl.sh: #864: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:52 UTC 2021 ssl.sh: #865: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:52 UTC 2021 ssl.sh: #866: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:52 UTC 2021 ssl.sh: #867: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:52 UTC 2021 ssl.sh: #868: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:53 UTC 2021 ssl.sh: #869: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:53 UTC 2021 ssl.sh: #870: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:53 UTC 2021 ssl.sh: #871: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:53 UTC 2021 ssl.sh: #872: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:54 UTC 2021 ssl.sh: #873: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:54 UTC 2021 ssl.sh: #874: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3404252 >/dev/null 2>/dev/null selfserv with PID 3404252 found at Tue Aug 3 01:03:54 UTC 2021 ssl.sh: #875: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3404252 at Tue Aug 3 01:03:54 UTC 2021 kill -USR1 3404252 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3404252 killed at Tue Aug 3 01:03:54 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:03:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3406617 >/dev/null 2>/dev/null selfserv with PID 3406617 found at Tue Aug 3 01:03:54 UTC 2021 selfserv with PID 3406617 started at Tue Aug 3 01:03:54 UTC 2021 trying to kill selfserv with PID 3406617 at Tue Aug 3 01:03:54 UTC 2021 kill -USR1 3406617 ./ssl.sh: line 213: 3406617 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv -b -p 8443 2>/dev/null; selfserv with PID 3406617 killed at Tue Aug 3 01:03:54 UTC 2021 selfserv starting at Tue Aug 3 01:03:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:03:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:54 UTC 2021 selfserv with PID 3406666 started at Tue Aug 3 01:03:54 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:55 UTC 2021 ssl.sh: #876: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:56 UTC 2021 ssl.sh: #877: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:56 UTC 2021 ssl.sh: #878: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:56 UTC 2021 ssl.sh: #879: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:57 UTC 2021 ssl.sh: #880: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:57 UTC 2021 ssl.sh: #881: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:57 UTC 2021 ssl.sh: #882: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:58 UTC 2021 ssl.sh: #883: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:58 UTC 2021 ssl.sh: #884: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:58 UTC 2021 ssl.sh: #885: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:59 UTC 2021 ssl.sh: #886: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:59 UTC 2021 ssl.sh: #887: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:03:59 UTC 2021 ssl.sh: #888: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:00 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #889: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:00 UTC 2021 ssl.sh: #890: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:00 UTC 2021 ssl.sh: #891: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:01 UTC 2021 ssl.sh: #892: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:01 UTC 2021 ssl.sh: #893: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:01 UTC 2021 ssl.sh: #894: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:02 UTC 2021 ssl.sh: #895: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:02 UTC 2021 ssl.sh: #896: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:02 UTC 2021 ssl.sh: #897: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:03 UTC 2021 ssl.sh: #898: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:03 UTC 2021 ssl.sh: #899: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:03 UTC 2021 ssl.sh: #900: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:04 UTC 2021 ssl.sh: #901: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:04 UTC 2021 ssl.sh: #902: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:04 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #903: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:05 UTC 2021 ssl.sh: #904: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:05 UTC 2021 ssl.sh: #905: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:05 UTC 2021 ssl.sh: #906: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:06 UTC 2021 ssl.sh: #907: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:06 UTC 2021 ssl.sh: #908: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:06 UTC 2021 ssl.sh: #909: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:07 UTC 2021 ssl.sh: #910: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:07 UTC 2021 ssl.sh: #911: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:07 UTC 2021 ssl.sh: #912: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:08 UTC 2021 ssl.sh: #913: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:08 UTC 2021 ssl.sh: #914: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:08 UTC 2021 ssl.sh: #915: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3406666 >/dev/null 2>/dev/null selfserv with PID 3406666 found at Tue Aug 3 01:04:09 UTC 2021 ssl.sh: #916: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3406666 at Tue Aug 3 01:04:09 UTC 2021 kill -USR1 3406666 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3406666 killed at Tue Aug 3 01:04:09 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:04:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:04:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:09 UTC 2021 selfserv with PID 3408803 started at Tue Aug 3 01:04:09 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:10 UTC 2021 ssl.sh: #917: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:10 UTC 2021 ssl.sh: #918: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:11 UTC 2021 ssl.sh: #919: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:11 UTC 2021 ssl.sh: #920: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:11 UTC 2021 ssl.sh: #921: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:12 UTC 2021 ssl.sh: #922: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:12 UTC 2021 ssl.sh: #923: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:12 UTC 2021 ssl.sh: #924: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:13 UTC 2021 ssl.sh: #925: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:13 UTC 2021 ssl.sh: #926: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:13 UTC 2021 ssl.sh: #927: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:14 UTC 2021 ssl.sh: #928: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:14 UTC 2021 ssl.sh: #929: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:14 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #930: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:15 UTC 2021 ssl.sh: #931: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:15 UTC 2021 ssl.sh: #932: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:15 UTC 2021 ssl.sh: #933: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:16 UTC 2021 ssl.sh: #934: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:16 UTC 2021 ssl.sh: #935: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:17 UTC 2021 ssl.sh: #936: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:17 UTC 2021 ssl.sh: #937: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:17 UTC 2021 ssl.sh: #938: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:18 UTC 2021 ssl.sh: #939: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:18 UTC 2021 ssl.sh: #940: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:18 UTC 2021 ssl.sh: #941: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:19 UTC 2021 ssl.sh: #942: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:19 UTC 2021 ssl.sh: #943: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:19 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #944: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:20 UTC 2021 ssl.sh: #945: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:20 UTC 2021 ssl.sh: #946: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:20 UTC 2021 ssl.sh: #947: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:21 UTC 2021 ssl.sh: #948: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:21 UTC 2021 ssl.sh: #949: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:21 UTC 2021 ssl.sh: #950: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:22 UTC 2021 ssl.sh: #951: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:22 UTC 2021 ssl.sh: #952: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:22 UTC 2021 ssl.sh: #953: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:23 UTC 2021 ssl.sh: #954: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:23 UTC 2021 ssl.sh: #955: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:24 UTC 2021 ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3408803 >/dev/null 2>/dev/null selfserv with PID 3408803 found at Tue Aug 3 01:04:24 UTC 2021 ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3408803 at Tue Aug 3 01:04:24 UTC 2021 kill -USR1 3408803 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3408803 killed at Tue Aug 3 01:04:24 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:04:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:04:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:24 UTC 2021 selfserv with PID 3410616 started at Tue Aug 3 01:04:24 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:25 UTC 2021 ssl.sh: #958: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:25 UTC 2021 ssl.sh: #959: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:25 UTC 2021 ssl.sh: #960: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:26 UTC 2021 ssl.sh: #961: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:26 UTC 2021 ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:26 UTC 2021 ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:26 UTC 2021 ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:27 UTC 2021 ssl.sh: #965: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:27 UTC 2021 ssl.sh: #966: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:27 UTC 2021 ssl.sh: #967: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:27 UTC 2021 ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:28 UTC 2021 ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:28 UTC 2021 ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:28 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #971: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:29 UTC 2021 ssl.sh: #972: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:29 UTC 2021 ssl.sh: #973: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:29 UTC 2021 ssl.sh: #974: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:29 UTC 2021 ssl.sh: #975: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:30 UTC 2021 ssl.sh: #976: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:30 UTC 2021 ssl.sh: #977: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:30 UTC 2021 ssl.sh: #978: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:30 UTC 2021 ssl.sh: #979: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:31 UTC 2021 ssl.sh: #980: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:31 UTC 2021 ssl.sh: #981: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:31 UTC 2021 ssl.sh: #982: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:31 UTC 2021 ssl.sh: #983: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:32 UTC 2021 ssl.sh: #984: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:32 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #985: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:32 UTC 2021 ssl.sh: #986: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:32 UTC 2021 ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:33 UTC 2021 ssl.sh: #988: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:33 UTC 2021 ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:33 UTC 2021 ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:33 UTC 2021 ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:34 UTC 2021 ssl.sh: #992: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:34 UTC 2021 ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:34 UTC 2021 ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:35 UTC 2021 ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:35 UTC 2021 ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:35 UTC 2021 ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3410616 >/dev/null 2>/dev/null selfserv with PID 3410616 found at Tue Aug 3 01:04:35 UTC 2021 ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3410616 at Tue Aug 3 01:04:35 UTC 2021 kill -USR1 3410616 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3410616 killed at Tue Aug 3 01:04:35 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:04:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:04:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:35 UTC 2021 selfserv with PID 3412171 started at Tue Aug 3 01:04:35 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:36 UTC 2021 ssl.sh: #999: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:36 UTC 2021 ssl.sh: #1000: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:37 UTC 2021 ssl.sh: #1001: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:37 UTC 2021 ssl.sh: #1002: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:37 UTC 2021 ssl.sh: #1003: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:37 UTC 2021 ssl.sh: #1004: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:37 UTC 2021 ssl.sh: #1005: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:37 UTC 2021 ssl.sh: #1006: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:37 UTC 2021 ssl.sh: #1007: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:38 UTC 2021 ssl.sh: #1008: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:38 UTC 2021 ssl.sh: #1009: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:38 UTC 2021 ssl.sh: #1010: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:38 UTC 2021 ssl.sh: #1011: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:38 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1012: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:38 UTC 2021 ssl.sh: #1013: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:39 UTC 2021 ssl.sh: #1014: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:39 UTC 2021 ssl.sh: #1015: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:39 UTC 2021 ssl.sh: #1016: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:39 UTC 2021 ssl.sh: #1017: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:39 UTC 2021 ssl.sh: #1018: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:39 UTC 2021 ssl.sh: #1019: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:40 UTC 2021 ssl.sh: #1020: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:40 UTC 2021 ssl.sh: #1021: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:40 UTC 2021 ssl.sh: #1022: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:40 UTC 2021 ssl.sh: #1023: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:40 UTC 2021 ssl.sh: #1024: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:40 UTC 2021 ssl.sh: #1025: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:40 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1026: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:41 UTC 2021 ssl.sh: #1027: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:41 UTC 2021 ssl.sh: #1028: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:41 UTC 2021 ssl.sh: #1029: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:41 UTC 2021 ssl.sh: #1030: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:41 UTC 2021 ssl.sh: #1031: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:41 UTC 2021 ssl.sh: #1032: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:42 UTC 2021 ssl.sh: #1033: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:42 UTC 2021 ssl.sh: #1034: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:42 UTC 2021 ssl.sh: #1035: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:42 UTC 2021 ssl.sh: #1036: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:42 UTC 2021 ssl.sh: #1037: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:42 UTC 2021 ssl.sh: #1038: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3412171 >/dev/null 2>/dev/null selfserv with PID 3412171 found at Tue Aug 3 01:04:43 UTC 2021 ssl.sh: #1039: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3412171 at Tue Aug 3 01:04:43 UTC 2021 kill -USR1 3412171 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3412171 killed at Tue Aug 3 01:04:43 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:04:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:04:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:43 UTC 2021 selfserv with PID 3413561 started at Tue Aug 3 01:04:43 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:43 UTC 2021 ssl.sh: #1040: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:44 UTC 2021 ssl.sh: #1041: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:44 UTC 2021 ssl.sh: #1042: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:44 UTC 2021 ssl.sh: #1043: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:44 UTC 2021 ssl.sh: #1044: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:44 UTC 2021 ssl.sh: #1045: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:45 UTC 2021 ssl.sh: #1046: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:45 UTC 2021 ssl.sh: #1047: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:45 UTC 2021 ssl.sh: #1048: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:45 UTC 2021 ssl.sh: #1049: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:45 UTC 2021 ssl.sh: #1050: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:45 UTC 2021 ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:46 UTC 2021 ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:46 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1053: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:46 UTC 2021 ssl.sh: #1054: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:46 UTC 2021 ssl.sh: #1055: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:46 UTC 2021 ssl.sh: #1056: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:46 UTC 2021 ssl.sh: #1057: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:47 UTC 2021 ssl.sh: #1058: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:47 UTC 2021 ssl.sh: #1059: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:47 UTC 2021 ssl.sh: #1060: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:47 UTC 2021 ssl.sh: #1061: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:47 UTC 2021 ssl.sh: #1062: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:47 UTC 2021 ssl.sh: #1063: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:48 UTC 2021 ssl.sh: #1064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:48 UTC 2021 ssl.sh: #1065: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:48 UTC 2021 ssl.sh: #1066: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:48 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1067: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:48 UTC 2021 ssl.sh: #1068: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:48 UTC 2021 ssl.sh: #1069: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:49 UTC 2021 ssl.sh: #1070: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:49 UTC 2021 ssl.sh: #1071: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:49 UTC 2021 ssl.sh: #1072: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:49 UTC 2021 ssl.sh: #1073: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:49 UTC 2021 ssl.sh: #1074: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:49 UTC 2021 ssl.sh: #1075: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:50 UTC 2021 ssl.sh: #1076: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:50 UTC 2021 ssl.sh: #1077: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:50 UTC 2021 ssl.sh: #1078: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:50 UTC 2021 ssl.sh: #1079: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3413561 >/dev/null 2>/dev/null selfserv with PID 3413561 found at Tue Aug 3 01:04:50 UTC 2021 ssl.sh: #1080: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3413561 at Tue Aug 3 01:04:50 UTC 2021 kill -USR1 3413561 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3413561 killed at Tue Aug 3 01:04:50 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:04:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:04:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:50 UTC 2021 selfserv with PID 3415077 started at Tue Aug 3 01:04:50 UTC 2021 Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:51 UTC 2021 ssl.sh: #1081: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:52 UTC 2021 ssl.sh: #1082: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:52 UTC 2021 ssl.sh: #1083: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:52 UTC 2021 ssl.sh: #1084: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:52 UTC 2021 ssl.sh: #1085: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:53 UTC 2021 ssl.sh: #1086: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:53 UTC 2021 ssl.sh: #1087: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:53 UTC 2021 ssl.sh: #1088: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:53 UTC 2021 ssl.sh: #1089: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:53 UTC 2021 ssl.sh: #1090: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:54 UTC 2021 ssl.sh: #1091: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:54 UTC 2021 ssl.sh: #1092: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:54 UTC 2021 ssl.sh: #1093: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:54 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1094: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:55 UTC 2021 ssl.sh: #1095: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:55 UTC 2021 ssl.sh: #1096: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:55 UTC 2021 ssl.sh: #1097: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:55 UTC 2021 ssl.sh: #1098: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:56 UTC 2021 ssl.sh: #1099: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:56 UTC 2021 ssl.sh: #1100: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:56 UTC 2021 ssl.sh: #1101: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:56 UTC 2021 ssl.sh: #1102: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:57 UTC 2021 ssl.sh: #1103: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:57 UTC 2021 ssl.sh: #1104: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:57 UTC 2021 ssl.sh: #1105: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:57 UTC 2021 ssl.sh: #1106: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:58 UTC 2021 ssl.sh: #1107: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:58 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1108: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:58 UTC 2021 ssl.sh: #1109: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:58 UTC 2021 ssl.sh: #1110: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:58 UTC 2021 ssl.sh: #1111: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:59 UTC 2021 ssl.sh: #1112: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:59 UTC 2021 ssl.sh: #1113: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:59 UTC 2021 ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:04:59 UTC 2021 ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:05:00 UTC 2021 ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:05:00 UTC 2021 ssl.sh: #1117: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:05:00 UTC 2021 ssl.sh: #1118: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:05:00 UTC 2021 ssl.sh: #1119: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:05:01 UTC 2021 ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3415077 >/dev/null 2>/dev/null selfserv with PID 3415077 found at Tue Aug 3 01:05:01 UTC 2021 ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3415077 at Tue Aug 3 01:05:01 UTC 2021 kill -USR1 3415077 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3415077 killed at Tue Aug 3 01:05:01 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:05:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:05:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3416613 >/dev/null 2>/dev/null selfserv with PID 3416613 found at Tue Aug 3 01:05:01 UTC 2021 selfserv with PID 3416613 started at Tue Aug 3 01:05:01 UTC 2021 trying to kill selfserv with PID 3416613 at Tue Aug 3 01:05:01 UTC 2021 kill -USR1 3416613 ./ssl.sh: line 213: 3416613 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv -b -p 8443 2>/dev/null; selfserv with PID 3416613 killed at Tue Aug 3 01:05:01 UTC 2021 selfserv starting at Tue Aug 3 01:05:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:05:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:01 UTC 2021 selfserv with PID 3416677 started at Tue Aug 3 01:05:01 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:02 UTC 2021 ssl.sh: #1122: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:02 UTC 2021 ssl.sh: #1123: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:03 UTC 2021 ssl.sh: #1124: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:03 UTC 2021 ssl.sh: #1125: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:03 UTC 2021 ssl.sh: #1126: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:04 UTC 2021 ssl.sh: #1127: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:04 UTC 2021 ssl.sh: #1128: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:04 UTC 2021 ssl.sh: #1129: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:05 UTC 2021 ssl.sh: #1130: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:05 UTC 2021 ssl.sh: #1131: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:05 UTC 2021 ssl.sh: #1132: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:06 UTC 2021 ssl.sh: #1133: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:06 UTC 2021 ssl.sh: #1134: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:06 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1135: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:07 UTC 2021 ssl.sh: #1136: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:07 UTC 2021 ssl.sh: #1137: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:07 UTC 2021 ssl.sh: #1138: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:08 UTC 2021 ssl.sh: #1139: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:08 UTC 2021 ssl.sh: #1140: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:08 UTC 2021 ssl.sh: #1141: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:09 UTC 2021 ssl.sh: #1142: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:09 UTC 2021 ssl.sh: #1143: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:09 UTC 2021 ssl.sh: #1144: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:10 UTC 2021 ssl.sh: #1145: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:10 UTC 2021 ssl.sh: #1146: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:10 UTC 2021 ssl.sh: #1147: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:11 UTC 2021 ssl.sh: #1148: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:11 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1149: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:11 UTC 2021 ssl.sh: #1150: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:12 UTC 2021 ssl.sh: #1151: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:12 UTC 2021 ssl.sh: #1152: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:12 UTC 2021 ssl.sh: #1153: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:13 UTC 2021 ssl.sh: #1154: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:13 UTC 2021 ssl.sh: #1155: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:13 UTC 2021 ssl.sh: #1156: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:14 UTC 2021 ssl.sh: #1157: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:14 UTC 2021 ssl.sh: #1158: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:14 UTC 2021 ssl.sh: #1159: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:15 UTC 2021 ssl.sh: #1160: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:15 UTC 2021 ssl.sh: #1161: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3416677 >/dev/null 2>/dev/null selfserv with PID 3416677 found at Tue Aug 3 01:05:15 UTC 2021 ssl.sh: #1162: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3416677 at Tue Aug 3 01:05:15 UTC 2021 kill -USR1 3416677 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3416677 killed at Tue Aug 3 01:05:15 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:05:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:05:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:16 UTC 2021 selfserv with PID 3418152 started at Tue Aug 3 01:05:16 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:17 UTC 2021 ssl.sh: #1163: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:17 UTC 2021 ssl.sh: #1164: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:17 UTC 2021 ssl.sh: #1165: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:18 UTC 2021 ssl.sh: #1166: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:18 UTC 2021 ssl.sh: #1167: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:18 UTC 2021 ssl.sh: #1168: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:19 UTC 2021 ssl.sh: #1169: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:19 UTC 2021 ssl.sh: #1170: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:19 UTC 2021 ssl.sh: #1171: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:20 UTC 2021 ssl.sh: #1172: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:20 UTC 2021 ssl.sh: #1173: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:20 UTC 2021 ssl.sh: #1174: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:21 UTC 2021 ssl.sh: #1175: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:21 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1176: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:21 UTC 2021 ssl.sh: #1177: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:22 UTC 2021 ssl.sh: #1178: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:22 UTC 2021 ssl.sh: #1179: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:23 UTC 2021 ssl.sh: #1180: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:23 UTC 2021 ssl.sh: #1181: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:23 UTC 2021 ssl.sh: #1182: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:24 UTC 2021 ssl.sh: #1183: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:24 UTC 2021 ssl.sh: #1184: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:24 UTC 2021 ssl.sh: #1185: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:25 UTC 2021 ssl.sh: #1186: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:25 UTC 2021 ssl.sh: #1187: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:25 UTC 2021 ssl.sh: #1188: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:26 UTC 2021 ssl.sh: #1189: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:26 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1190: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:26 UTC 2021 ssl.sh: #1191: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:27 UTC 2021 ssl.sh: #1192: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:27 UTC 2021 ssl.sh: #1193: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:27 UTC 2021 ssl.sh: #1194: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:28 UTC 2021 ssl.sh: #1195: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:28 UTC 2021 ssl.sh: #1196: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:28 UTC 2021 ssl.sh: #1197: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:29 UTC 2021 ssl.sh: #1198: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:29 UTC 2021 ssl.sh: #1199: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:30 UTC 2021 ssl.sh: #1200: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:30 UTC 2021 ssl.sh: #1201: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:30 UTC 2021 ssl.sh: #1202: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3418152 >/dev/null 2>/dev/null selfserv with PID 3418152 found at Tue Aug 3 01:05:31 UTC 2021 ssl.sh: #1203: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3418152 at Tue Aug 3 01:05:31 UTC 2021 kill -USR1 3418152 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3418152 killed at Tue Aug 3 01:05:31 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:05:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:05:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:31 UTC 2021 selfserv with PID 3419784 started at Tue Aug 3 01:05:31 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:32 UTC 2021 ssl.sh: #1204: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:32 UTC 2021 ssl.sh: #1205: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:32 UTC 2021 ssl.sh: #1206: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:32 UTC 2021 ssl.sh: #1207: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:33 UTC 2021 ssl.sh: #1208: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:33 UTC 2021 ssl.sh: #1209: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:33 UTC 2021 ssl.sh: #1210: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:33 UTC 2021 ssl.sh: #1211: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:34 UTC 2021 ssl.sh: #1212: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:34 UTC 2021 ssl.sh: #1213: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:34 UTC 2021 ssl.sh: #1214: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:34 UTC 2021 ssl.sh: #1215: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:35 UTC 2021 ssl.sh: #1216: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:35 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1217: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:35 UTC 2021 ssl.sh: #1218: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:36 UTC 2021 ssl.sh: #1219: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:36 UTC 2021 ssl.sh: #1220: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:36 UTC 2021 ssl.sh: #1221: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:36 UTC 2021 ssl.sh: #1222: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:37 UTC 2021 ssl.sh: #1223: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:37 UTC 2021 ssl.sh: #1224: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:37 UTC 2021 ssl.sh: #1225: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:37 UTC 2021 ssl.sh: #1226: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:38 UTC 2021 ssl.sh: #1227: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:38 UTC 2021 ssl.sh: #1228: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:38 UTC 2021 ssl.sh: #1229: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:38 UTC 2021 ssl.sh: #1230: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:39 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1231: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:39 UTC 2021 ssl.sh: #1232: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:39 UTC 2021 ssl.sh: #1233: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:39 UTC 2021 ssl.sh: #1234: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:40 UTC 2021 ssl.sh: #1235: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:40 UTC 2021 ssl.sh: #1236: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:40 UTC 2021 ssl.sh: #1237: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:40 UTC 2021 ssl.sh: #1238: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:41 UTC 2021 ssl.sh: #1239: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:41 UTC 2021 ssl.sh: #1240: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:41 UTC 2021 ssl.sh: #1241: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:41 UTC 2021 ssl.sh: #1242: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:42 UTC 2021 ssl.sh: #1243: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3419784 >/dev/null 2>/dev/null selfserv with PID 3419784 found at Tue Aug 3 01:05:42 UTC 2021 ssl.sh: #1244: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3419784 at Tue Aug 3 01:05:42 UTC 2021 kill -USR1 3419784 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3419784 killed at Tue Aug 3 01:05:42 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:05:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:05:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:42 UTC 2021 selfserv with PID 3421281 started at Tue Aug 3 01:05:42 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:43 UTC 2021 ssl.sh: #1245: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:43 UTC 2021 ssl.sh: #1246: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:43 UTC 2021 ssl.sh: #1247: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:43 UTC 2021 ssl.sh: #1248: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:44 UTC 2021 ssl.sh: #1249: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:44 UTC 2021 ssl.sh: #1250: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:44 UTC 2021 ssl.sh: #1251: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:44 UTC 2021 ssl.sh: #1252: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:44 UTC 2021 ssl.sh: #1253: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:44 UTC 2021 ssl.sh: #1254: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:44 UTC 2021 ssl.sh: #1255: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:45 UTC 2021 ssl.sh: #1256: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:45 UTC 2021 ssl.sh: #1257: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:45 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1258: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:45 UTC 2021 ssl.sh: #1259: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:45 UTC 2021 ssl.sh: #1260: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:45 UTC 2021 ssl.sh: #1261: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:46 UTC 2021 ssl.sh: #1262: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:46 UTC 2021 ssl.sh: #1263: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:46 UTC 2021 ssl.sh: #1264: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:46 UTC 2021 ssl.sh: #1265: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:46 UTC 2021 ssl.sh: #1266: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:46 UTC 2021 ssl.sh: #1267: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:47 UTC 2021 ssl.sh: #1268: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:47 UTC 2021 ssl.sh: #1269: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:47 UTC 2021 ssl.sh: #1270: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:47 UTC 2021 ssl.sh: #1271: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:47 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1272: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:47 UTC 2021 ssl.sh: #1273: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:47 UTC 2021 ssl.sh: #1274: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:48 UTC 2021 ssl.sh: #1275: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:48 UTC 2021 ssl.sh: #1276: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:48 UTC 2021 ssl.sh: #1277: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:48 UTC 2021 ssl.sh: #1278: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:48 UTC 2021 ssl.sh: #1279: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:48 UTC 2021 ssl.sh: #1280: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:49 UTC 2021 ssl.sh: #1281: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:49 UTC 2021 ssl.sh: #1282: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:49 UTC 2021 ssl.sh: #1283: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:49 UTC 2021 ssl.sh: #1284: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3421281 >/dev/null 2>/dev/null selfserv with PID 3421281 found at Tue Aug 3 01:05:49 UTC 2021 ssl.sh: #1285: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3421281 at Tue Aug 3 01:05:49 UTC 2021 kill -USR1 3421281 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3421281 killed at Tue Aug 3 01:05:49 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:05:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:05:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:49 UTC 2021 selfserv with PID 3422705 started at Tue Aug 3 01:05:49 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:50 UTC 2021 ssl.sh: #1286: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:50 UTC 2021 ssl.sh: #1287: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:50 UTC 2021 ssl.sh: #1288: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:51 UTC 2021 ssl.sh: #1289: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:51 UTC 2021 ssl.sh: #1290: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:51 UTC 2021 ssl.sh: #1291: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:51 UTC 2021 ssl.sh: #1292: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:51 UTC 2021 ssl.sh: #1293: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:51 UTC 2021 ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:52 UTC 2021 ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:52 UTC 2021 ssl.sh: #1296: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:52 UTC 2021 ssl.sh: #1297: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:52 UTC 2021 ssl.sh: #1298: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:52 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1299: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:53 UTC 2021 ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:53 UTC 2021 ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:53 UTC 2021 ssl.sh: #1302: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:53 UTC 2021 ssl.sh: #1303: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:53 UTC 2021 ssl.sh: #1304: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:53 UTC 2021 ssl.sh: #1305: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:54 UTC 2021 ssl.sh: #1306: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:54 UTC 2021 ssl.sh: #1307: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:54 UTC 2021 ssl.sh: #1308: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:54 UTC 2021 ssl.sh: #1309: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:54 UTC 2021 ssl.sh: #1310: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:54 UTC 2021 ssl.sh: #1311: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:55 UTC 2021 ssl.sh: #1312: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:55 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1313: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:55 UTC 2021 ssl.sh: #1314: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:55 UTC 2021 ssl.sh: #1315: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:55 UTC 2021 ssl.sh: #1316: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:55 UTC 2021 ssl.sh: #1317: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:56 UTC 2021 ssl.sh: #1318: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:56 UTC 2021 ssl.sh: #1319: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:56 UTC 2021 ssl.sh: #1320: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:56 UTC 2021 ssl.sh: #1321: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:56 UTC 2021 ssl.sh: #1322: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:56 UTC 2021 ssl.sh: #1323: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:57 UTC 2021 ssl.sh: #1324: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:57 UTC 2021 ssl.sh: #1325: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3422705 >/dev/null 2>/dev/null selfserv with PID 3422705 found at Tue Aug 3 01:05:57 UTC 2021 ssl.sh: #1326: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3422705 at Tue Aug 3 01:05:57 UTC 2021 kill -USR1 3422705 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3422705 killed at Tue Aug 3 01:05:57 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:05:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:05:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:05:57 UTC 2021 selfserv with PID 3424122 started at Tue Aug 3 01:05:57 UTC 2021 Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:05:58 UTC 2021 ssl.sh: #1327: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:05:58 UTC 2021 ssl.sh: #1328: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:05:58 UTC 2021 ssl.sh: #1329: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:05:59 UTC 2021 ssl.sh: #1330: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:05:59 UTC 2021 ssl.sh: #1331: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:05:59 UTC 2021 ssl.sh: #1332: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:05:59 UTC 2021 ssl.sh: #1333: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:00 UTC 2021 ssl.sh: #1334: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:00 UTC 2021 ssl.sh: #1335: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:00 UTC 2021 ssl.sh: #1336: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:00 UTC 2021 ssl.sh: #1337: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:01 UTC 2021 ssl.sh: #1338: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:01 UTC 2021 ssl.sh: #1339: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:01 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1340: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:01 UTC 2021 ssl.sh: #1341: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:01 UTC 2021 ssl.sh: #1342: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:02 UTC 2021 ssl.sh: #1343: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:02 UTC 2021 ssl.sh: #1344: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:02 UTC 2021 ssl.sh: #1345: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:02 UTC 2021 ssl.sh: #1346: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:03 UTC 2021 ssl.sh: #1347: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:03 UTC 2021 ssl.sh: #1348: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:03 UTC 2021 ssl.sh: #1349: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:03 UTC 2021 ssl.sh: #1350: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:04 UTC 2021 ssl.sh: #1351: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:04 UTC 2021 ssl.sh: #1352: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:04 UTC 2021 ssl.sh: #1353: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time policy subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:04 UTC 2021 ================= CRL Reloaded ============= ssl.sh: #1354: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:05 UTC 2021 ssl.sh: #1355: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:05 UTC 2021 ssl.sh: #1356: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:05 UTC 2021 ssl.sh: #1357: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:05 UTC 2021 ssl.sh: #1358: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:05 UTC 2021 ssl.sh: #1359: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:06 UTC 2021 ssl.sh: #1360: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:06 UTC 2021 ssl.sh: #1361: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:06 UTC 2021 ssl.sh: #1362: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:06 UTC 2021 ssl.sh: #1363: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:07 UTC 2021 ssl.sh: #1364: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:07 UTC 2021 ssl.sh: #1365: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:07 UTC 2021 ssl.sh: #1366: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3424122 >/dev/null 2>/dev/null selfserv with PID 3424122 found at Tue Aug 3 01:06:07 UTC 2021 ssl.sh: #1367: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3424122 at Tue Aug 3 01:06:07 UTC 2021 kill -USR1 3424122 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3424122 killed at Tue Aug 3 01:06:07 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3425728 >/dev/null 2>/dev/null selfserv with PID 3425728 found at Tue Aug 3 01:06:08 UTC 2021 selfserv with PID 3425728 started at Tue Aug 3 01:06:08 UTC 2021 trying to kill selfserv with PID 3425728 at Tue Aug 3 01:06:08 UTC 2021 kill -USR1 3425728 ./ssl.sh: line 213: 3425728 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv -b -p 8443 2>/dev/null; selfserv with PID 3425728 killed at Tue Aug 3 01:06:08 UTC 2021 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv starting at Tue Aug 3 01:06:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3425780 >/dev/null 2>/dev/null selfserv with PID 3425780 found at Tue Aug 3 01:06:08 UTC 2021 selfserv with PID 3425780 started at Tue Aug 3 01:06:08 UTC 2021 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1408: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1409: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1410: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1411: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1412: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1413: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1414: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1415: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1416: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1417: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1418: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv with PID 3425780 at Tue Aug 3 01:06:09 UTC 2021 kill -USR1 3425780 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3425780 killed at Tue Aug 3 01:06:09 UTC 2021 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv starting at Tue Aug 3 01:06:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3426443 >/dev/null 2>/dev/null selfserv with PID 3426443 found at Tue Aug 3 01:06:09 UTC 2021 selfserv with PID 3426443 started at Tue Aug 3 01:06:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1419: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1420: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1421: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1422: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1423: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1424: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1425: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1426: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1427: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1428: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3426443 at Tue Aug 3 01:06:11 UTC 2021 kill -USR1 3426443 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3426443 killed at Tue Aug 3 01:06:11 UTC 2021 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv starting at Tue Aug 3 01:06:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3427379 >/dev/null 2>/dev/null selfserv with PID 3427379 found at Tue Aug 3 01:06:11 UTC 2021 selfserv with PID 3427379 started at Tue Aug 3 01:06:11 UTC 2021 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1495: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1496: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3427379 at Tue Aug 3 01:06:11 UTC 2021 kill -USR1 3427379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3427379 killed at Tue Aug 3 01:06:11 UTC 2021 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3427454 >/dev/null 2>/dev/null selfserv with PID 3427454 found at Tue Aug 3 01:06:12 UTC 2021 selfserv with PID 3427454 started at Tue Aug 3 01:06:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1495: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3427454 at Tue Aug 3 01:06:12 UTC 2021 kill -USR1 3427454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3427454 killed at Tue Aug 3 01:06:12 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:06:12 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3427552 >/dev/null 2>/dev/null selfserv with PID 3427552 found at Tue Aug 3 01:06:12 UTC 2021 selfserv with PID 3427552 started at Tue Aug 3 01:06:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1496: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3427552 at Tue Aug 3 01:06:13 UTC 2021 kill -USR1 3427552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3427552 killed at Tue Aug 3 01:06:13 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:06:13 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3427634 >/dev/null 2>/dev/null selfserv with PID 3427634 found at Tue Aug 3 01:06:13 UTC 2021 selfserv with PID 3427634 started at Tue Aug 3 01:06:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1497: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3427634 at Tue Aug 3 01:06:14 UTC 2021 kill -USR1 3427634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3427634 killed at Tue Aug 3 01:06:14 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:14 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3427696 >/dev/null 2>/dev/null selfserv with PID 3427696 found at Tue Aug 3 01:06:14 UTC 2021 selfserv with PID 3427696 started at Tue Aug 3 01:06:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1498: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3427696 at Tue Aug 3 01:06:15 UTC 2021 kill -USR1 3427696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3427696 killed at Tue Aug 3 01:06:15 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:06:15 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3427774 >/dev/null 2>/dev/null selfserv with PID 3427774 found at Tue Aug 3 01:06:15 UTC 2021 selfserv with PID 3427774 started at Tue Aug 3 01:06:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1499: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3427774 at Tue Aug 3 01:06:16 UTC 2021 kill -USR1 3427774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3427774 killed at Tue Aug 3 01:06:16 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:06:16 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3427835 >/dev/null 2>/dev/null selfserv with PID 3427835 found at Tue Aug 3 01:06:16 UTC 2021 selfserv with PID 3427835 started at Tue Aug 3 01:06:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1500: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3427835 at Tue Aug 3 01:06:17 UTC 2021 kill -USR1 3427835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3427835 killed at Tue Aug 3 01:06:17 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:17 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3427899 >/dev/null 2>/dev/null selfserv with PID 3427899 found at Tue Aug 3 01:06:17 UTC 2021 selfserv with PID 3427899 started at Tue Aug 3 01:06:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1501: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3427899 at Tue Aug 3 01:06:18 UTC 2021 kill -USR1 3427899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3427899 killed at Tue Aug 3 01:06:18 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:06:18 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3427959 >/dev/null 2>/dev/null selfserv with PID 3427959 found at Tue Aug 3 01:06:18 UTC 2021 selfserv with PID 3427959 started at Tue Aug 3 01:06:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1502: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3427959 at Tue Aug 3 01:06:19 UTC 2021 kill -USR1 3427959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3427959 killed at Tue Aug 3 01:06:19 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:06:19 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428017 >/dev/null 2>/dev/null selfserv with PID 3428017 found at Tue Aug 3 01:06:19 UTC 2021 selfserv with PID 3428017 started at Tue Aug 3 01:06:19 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1503: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3428017 at Tue Aug 3 01:06:20 UTC 2021 kill -USR1 3428017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428017 killed at Tue Aug 3 01:06:20 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428098 >/dev/null 2>/dev/null selfserv with PID 3428098 found at Tue Aug 3 01:06:20 UTC 2021 selfserv with PID 3428098 started at Tue Aug 3 01:06:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1504: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3428098 at Tue Aug 3 01:06:20 UTC 2021 kill -USR1 3428098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428098 killed at Tue Aug 3 01:06:20 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:06:20 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428161 >/dev/null 2>/dev/null selfserv with PID 3428161 found at Tue Aug 3 01:06:21 UTC 2021 selfserv with PID 3428161 started at Tue Aug 3 01:06:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1505: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3428161 at Tue Aug 3 01:06:21 UTC 2021 kill -USR1 3428161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428161 killed at Tue Aug 3 01:06:21 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:06:21 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428223 >/dev/null 2>/dev/null selfserv with PID 3428223 found at Tue Aug 3 01:06:21 UTC 2021 selfserv with PID 3428223 started at Tue Aug 3 01:06:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1506: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3428223 at Tue Aug 3 01:06:22 UTC 2021 kill -USR1 3428223 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428223 killed at Tue Aug 3 01:06:22 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:22 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428286 >/dev/null 2>/dev/null selfserv with PID 3428286 found at Tue Aug 3 01:06:22 UTC 2021 selfserv with PID 3428286 started at Tue Aug 3 01:06:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1507: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3428286 at Tue Aug 3 01:06:23 UTC 2021 kill -USR1 3428286 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428286 killed at Tue Aug 3 01:06:23 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:06:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428373 >/dev/null 2>/dev/null selfserv with PID 3428373 found at Tue Aug 3 01:06:23 UTC 2021 selfserv with PID 3428373 started at Tue Aug 3 01:06:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1508: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3428373 at Tue Aug 3 01:06:24 UTC 2021 kill -USR1 3428373 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428373 killed at Tue Aug 3 01:06:24 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:06:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428518 >/dev/null 2>/dev/null selfserv with PID 3428518 found at Tue Aug 3 01:06:24 UTC 2021 selfserv with PID 3428518 started at Tue Aug 3 01:06:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1509: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3428518 at Tue Aug 3 01:06:25 UTC 2021 kill -USR1 3428518 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428518 killed at Tue Aug 3 01:06:25 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428585 >/dev/null 2>/dev/null selfserv with PID 3428585 found at Tue Aug 3 01:06:25 UTC 2021 selfserv with PID 3428585 started at Tue Aug 3 01:06:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1510: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3428585 at Tue Aug 3 01:06:26 UTC 2021 kill -USR1 3428585 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428585 killed at Tue Aug 3 01:06:26 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:06:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428639 >/dev/null 2>/dev/null selfserv with PID 3428639 found at Tue Aug 3 01:06:26 UTC 2021 selfserv with PID 3428639 started at Tue Aug 3 01:06:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1511: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3428639 at Tue Aug 3 01:06:27 UTC 2021 kill -USR1 3428639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428639 killed at Tue Aug 3 01:06:27 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:06:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428697 >/dev/null 2>/dev/null selfserv with PID 3428697 found at Tue Aug 3 01:06:27 UTC 2021 selfserv with PID 3428697 started at Tue Aug 3 01:06:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1512: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3428697 at Tue Aug 3 01:06:28 UTC 2021 kill -USR1 3428697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428697 killed at Tue Aug 3 01:06:28 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428758 >/dev/null 2>/dev/null selfserv with PID 3428758 found at Tue Aug 3 01:06:28 UTC 2021 selfserv with PID 3428758 started at Tue Aug 3 01:06:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3428758 at Tue Aug 3 01:06:29 UTC 2021 kill -USR1 3428758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428758 killed at Tue Aug 3 01:06:29 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:06:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428818 >/dev/null 2>/dev/null selfserv with PID 3428818 found at Tue Aug 3 01:06:29 UTC 2021 selfserv with PID 3428818 started at Tue Aug 3 01:06:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1514: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3428818 at Tue Aug 3 01:06:30 UTC 2021 kill -USR1 3428818 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428818 killed at Tue Aug 3 01:06:30 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:06:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428885 >/dev/null 2>/dev/null selfserv with PID 3428885 found at Tue Aug 3 01:06:30 UTC 2021 selfserv with PID 3428885 started at Tue Aug 3 01:06:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1515: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3428885 at Tue Aug 3 01:06:31 UTC 2021 kill -USR1 3428885 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428885 killed at Tue Aug 3 01:06:31 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:31 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3428953 >/dev/null 2>/dev/null selfserv with PID 3428953 found at Tue Aug 3 01:06:31 UTC 2021 selfserv with PID 3428953 started at Tue Aug 3 01:06:31 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1516: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3428953 at Tue Aug 3 01:06:32 UTC 2021 kill -USR1 3428953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3428953 killed at Tue Aug 3 01:06:32 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:06:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429010 >/dev/null 2>/dev/null selfserv with PID 3429010 found at Tue Aug 3 01:06:32 UTC 2021 selfserv with PID 3429010 started at Tue Aug 3 01:06:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1517: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3429010 at Tue Aug 3 01:06:32 UTC 2021 kill -USR1 3429010 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429010 killed at Tue Aug 3 01:06:32 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:06:32 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429068 >/dev/null 2>/dev/null selfserv with PID 3429068 found at Tue Aug 3 01:06:33 UTC 2021 selfserv with PID 3429068 started at Tue Aug 3 01:06:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1518: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3429068 at Tue Aug 3 01:06:34 UTC 2021 kill -USR1 3429068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429068 killed at Tue Aug 3 01:06:34 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429146 >/dev/null 2>/dev/null selfserv with PID 3429146 found at Tue Aug 3 01:06:34 UTC 2021 selfserv with PID 3429146 started at Tue Aug 3 01:06:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1519: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3429146 at Tue Aug 3 01:06:34 UTC 2021 kill -USR1 3429146 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429146 killed at Tue Aug 3 01:06:34 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:06:34 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429272 >/dev/null 2>/dev/null selfserv with PID 3429272 found at Tue Aug 3 01:06:35 UTC 2021 selfserv with PID 3429272 started at Tue Aug 3 01:06:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1520: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3429272 at Tue Aug 3 01:06:35 UTC 2021 kill -USR1 3429272 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429272 killed at Tue Aug 3 01:06:35 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:06:35 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429348 >/dev/null 2>/dev/null selfserv with PID 3429348 found at Tue Aug 3 01:06:35 UTC 2021 selfserv with PID 3429348 started at Tue Aug 3 01:06:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1521: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3429348 at Tue Aug 3 01:06:36 UTC 2021 kill -USR1 3429348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429348 killed at Tue Aug 3 01:06:36 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:36 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429418 >/dev/null 2>/dev/null selfserv with PID 3429418 found at Tue Aug 3 01:06:36 UTC 2021 selfserv with PID 3429418 started at Tue Aug 3 01:06:36 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1522: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3429418 at Tue Aug 3 01:06:37 UTC 2021 kill -USR1 3429418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429418 killed at Tue Aug 3 01:06:37 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:06:37 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429475 >/dev/null 2>/dev/null selfserv with PID 3429475 found at Tue Aug 3 01:06:37 UTC 2021 selfserv with PID 3429475 started at Tue Aug 3 01:06:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1523: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3429475 at Tue Aug 3 01:06:38 UTC 2021 kill -USR1 3429475 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429475 killed at Tue Aug 3 01:06:38 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:06:38 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429557 >/dev/null 2>/dev/null selfserv with PID 3429557 found at Tue Aug 3 01:06:38 UTC 2021 selfserv with PID 3429557 started at Tue Aug 3 01:06:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1524: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3429557 at Tue Aug 3 01:06:39 UTC 2021 kill -USR1 3429557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429557 killed at Tue Aug 3 01:06:39 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:06:39 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429665 >/dev/null 2>/dev/null selfserv with PID 3429665 found at Tue Aug 3 01:06:39 UTC 2021 selfserv with PID 3429665 started at Tue Aug 3 01:06:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1525: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3429665 at Tue Aug 3 01:06:40 UTC 2021 kill -USR1 3429665 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429665 killed at Tue Aug 3 01:06:40 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:06:40 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429763 >/dev/null 2>/dev/null selfserv with PID 3429763 found at Tue Aug 3 01:06:40 UTC 2021 selfserv with PID 3429763 started at Tue Aug 3 01:06:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1526: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3429763 at Tue Aug 3 01:06:41 UTC 2021 kill -USR1 3429763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429763 killed at Tue Aug 3 01:06:41 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:41 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429838 >/dev/null 2>/dev/null selfserv with PID 3429838 found at Tue Aug 3 01:06:41 UTC 2021 selfserv with PID 3429838 started at Tue Aug 3 01:06:41 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1527: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3429838 at Tue Aug 3 01:06:42 UTC 2021 kill -USR1 3429838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429838 killed at Tue Aug 3 01:06:42 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:06:42 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429913 >/dev/null 2>/dev/null selfserv with PID 3429913 found at Tue Aug 3 01:06:42 UTC 2021 selfserv with PID 3429913 started at Tue Aug 3 01:06:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1528: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3429913 at Tue Aug 3 01:06:43 UTC 2021 kill -USR1 3429913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429913 killed at Tue Aug 3 01:06:43 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 01:06:43 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3429982 >/dev/null 2>/dev/null selfserv with PID 3429982 found at Tue Aug 3 01:06:43 UTC 2021 selfserv with PID 3429982 started at Tue Aug 3 01:06:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1529: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3429982 at Tue Aug 3 01:06:44 UTC 2021 kill -USR1 3429982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3429982 killed at Tue Aug 3 01:06:44 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:06:44 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430054 >/dev/null 2>/dev/null selfserv with PID 3430054 found at Tue Aug 3 01:06:44 UTC 2021 selfserv with PID 3430054 started at Tue Aug 3 01:06:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1530: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430054 at Tue Aug 3 01:06:44 UTC 2021 kill -USR1 3430054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430054 killed at Tue Aug 3 01:06:44 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430120 >/dev/null 2>/dev/null selfserv with PID 3430120 found at Tue Aug 3 01:06:45 UTC 2021 selfserv with PID 3430120 started at Tue Aug 3 01:06:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1531: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430120 at Tue Aug 3 01:06:45 UTC 2021 kill -USR1 3430120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430120 killed at Tue Aug 3 01:06:45 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:06:45 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430185 >/dev/null 2>/dev/null selfserv with PID 3430185 found at Tue Aug 3 01:06:46 UTC 2021 selfserv with PID 3430185 started at Tue Aug 3 01:06:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1532: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3430185 at Tue Aug 3 01:06:46 UTC 2021 kill -USR1 3430185 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430185 killed at Tue Aug 3 01:06:46 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:46 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430242 >/dev/null 2>/dev/null selfserv with PID 3430242 found at Tue Aug 3 01:06:46 UTC 2021 selfserv with PID 3430242 started at Tue Aug 3 01:06:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1533: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430242 at Tue Aug 3 01:06:47 UTC 2021 kill -USR1 3430242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430242 killed at Tue Aug 3 01:06:47 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:06:47 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430302 >/dev/null 2>/dev/null selfserv with PID 3430302 found at Tue Aug 3 01:06:47 UTC 2021 selfserv with PID 3430302 started at Tue Aug 3 01:06:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1534: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430302 at Tue Aug 3 01:06:48 UTC 2021 kill -USR1 3430302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430302 killed at Tue Aug 3 01:06:48 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:48 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430365 >/dev/null 2>/dev/null selfserv with PID 3430365 found at Tue Aug 3 01:06:48 UTC 2021 selfserv with PID 3430365 started at Tue Aug 3 01:06:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1535: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430365 at Tue Aug 3 01:06:49 UTC 2021 kill -USR1 3430365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430365 killed at Tue Aug 3 01:06:49 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:06:49 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430430 >/dev/null 2>/dev/null selfserv with PID 3430430 found at Tue Aug 3 01:06:49 UTC 2021 selfserv with PID 3430430 started at Tue Aug 3 01:06:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1536: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3430430 at Tue Aug 3 01:06:50 UTC 2021 kill -USR1 3430430 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430430 killed at Tue Aug 3 01:06:50 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:50 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430491 >/dev/null 2>/dev/null selfserv with PID 3430491 found at Tue Aug 3 01:06:50 UTC 2021 selfserv with PID 3430491 started at Tue Aug 3 01:06:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1537: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430491 at Tue Aug 3 01:06:51 UTC 2021 kill -USR1 3430491 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430491 killed at Tue Aug 3 01:06:51 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:06:51 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430574 >/dev/null 2>/dev/null selfserv with PID 3430574 found at Tue Aug 3 01:06:51 UTC 2021 selfserv with PID 3430574 started at Tue Aug 3 01:06:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1538: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430574 at Tue Aug 3 01:06:52 UTC 2021 kill -USR1 3430574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430574 killed at Tue Aug 3 01:06:52 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:52 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430644 >/dev/null 2>/dev/null selfserv with PID 3430644 found at Tue Aug 3 01:06:52 UTC 2021 selfserv with PID 3430644 started at Tue Aug 3 01:06:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1539: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430644 at Tue Aug 3 01:06:53 UTC 2021 kill -USR1 3430644 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430644 killed at Tue Aug 3 01:06:53 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:06:53 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430709 >/dev/null 2>/dev/null selfserv with PID 3430709 found at Tue Aug 3 01:06:53 UTC 2021 selfserv with PID 3430709 started at Tue Aug 3 01:06:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1540: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3430709 at Tue Aug 3 01:06:54 UTC 2021 kill -USR1 3430709 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430709 killed at Tue Aug 3 01:06:54 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430811 >/dev/null 2>/dev/null selfserv with PID 3430811 found at Tue Aug 3 01:06:54 UTC 2021 selfserv with PID 3430811 started at Tue Aug 3 01:06:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1541: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430811 at Tue Aug 3 01:06:54 UTC 2021 kill -USR1 3430811 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430811 killed at Tue Aug 3 01:06:54 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:06:54 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3430923 >/dev/null 2>/dev/null selfserv with PID 3430923 found at Tue Aug 3 01:06:55 UTC 2021 selfserv with PID 3430923 started at Tue Aug 3 01:06:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1542: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3430923 at Tue Aug 3 01:06:55 UTC 2021 kill -USR1 3430923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3430923 killed at Tue Aug 3 01:06:55 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:55 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431088 >/dev/null 2>/dev/null selfserv with PID 3431088 found at Tue Aug 3 01:06:55 UTC 2021 selfserv with PID 3431088 started at Tue Aug 3 01:06:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1543: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3431088 at Tue Aug 3 01:06:56 UTC 2021 kill -USR1 3431088 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431088 killed at Tue Aug 3 01:06:56 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:06:56 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431187 >/dev/null 2>/dev/null selfserv with PID 3431187 found at Tue Aug 3 01:06:56 UTC 2021 selfserv with PID 3431187 started at Tue Aug 3 01:06:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1544: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3431187 at Tue Aug 3 01:06:57 UTC 2021 kill -USR1 3431187 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431187 killed at Tue Aug 3 01:06:57 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:57 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431254 >/dev/null 2>/dev/null selfserv with PID 3431254 found at Tue Aug 3 01:06:57 UTC 2021 selfserv with PID 3431254 started at Tue Aug 3 01:06:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1545: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3431254 at Tue Aug 3 01:06:58 UTC 2021 kill -USR1 3431254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431254 killed at Tue Aug 3 01:06:58 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:06:58 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431319 >/dev/null 2>/dev/null selfserv with PID 3431319 found at Tue Aug 3 01:06:58 UTC 2021 selfserv with PID 3431319 started at Tue Aug 3 01:06:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1546: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3431319 at Tue Aug 3 01:06:59 UTC 2021 kill -USR1 3431319 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431319 killed at Tue Aug 3 01:06:59 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:06:59 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:06:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431373 >/dev/null 2>/dev/null selfserv with PID 3431373 found at Tue Aug 3 01:06:59 UTC 2021 selfserv with PID 3431373 started at Tue Aug 3 01:06:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1547: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3431373 at Tue Aug 3 01:07:00 UTC 2021 kill -USR1 3431373 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431373 killed at Tue Aug 3 01:07:00 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:07:00 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431436 >/dev/null 2>/dev/null selfserv with PID 3431436 found at Tue Aug 3 01:07:00 UTC 2021 selfserv with PID 3431436 started at Tue Aug 3 01:07:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1548: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3431436 at Tue Aug 3 01:07:01 UTC 2021 kill -USR1 3431436 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431436 killed at Tue Aug 3 01:07:01 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:07:01 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431490 >/dev/null 2>/dev/null selfserv with PID 3431490 found at Tue Aug 3 01:07:01 UTC 2021 selfserv with PID 3431490 started at Tue Aug 3 01:07:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1549: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3431490 at Tue Aug 3 01:07:02 UTC 2021 kill -USR1 3431490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431490 killed at Tue Aug 3 01:07:02 UTC 2021 ssl.sh: TLS Server hello response without SNI ---- selfserv starting at Tue Aug 3 01:07:02 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431567 >/dev/null 2>/dev/null selfserv with PID 3431567 found at Tue Aug 3 01:07:02 UTC 2021 selfserv with PID 3431567 started at Tue Aug 3 01:07:02 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1550: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3431567 at Tue Aug 3 01:07:03 UTC 2021 kill -USR1 3431567 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431567 killed at Tue Aug 3 01:07:03 UTC 2021 ssl.sh: TLS Server hello response with SNI ---- selfserv starting at Tue Aug 3 01:07:03 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431633 >/dev/null 2>/dev/null selfserv with PID 3431633 found at Tue Aug 3 01:07:03 UTC 2021 selfserv with PID 3431633 started at Tue Aug 3 01:07:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1551: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3431633 at Tue Aug 3 01:07:04 UTC 2021 kill -USR1 3431633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431633 killed at Tue Aug 3 01:07:04 UTC 2021 ssl.sh: TLS Server response with alert ---- selfserv starting at Tue Aug 3 01:07:04 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431702 >/dev/null 2>/dev/null selfserv with PID 3431702 found at Tue Aug 3 01:07:04 UTC 2021 selfserv with PID 3431702 started at Tue Aug 3 01:07:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1552: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3431702 at Tue Aug 3 01:07:05 UTC 2021 kill -USR1 3431702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431702 killed at Tue Aug 3 01:07:05 UTC 2021 ssl.sh: SSL3 Server hello response without SNI ---- selfserv starting at Tue Aug 3 01:07:05 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431770 >/dev/null 2>/dev/null selfserv with PID 3431770 found at Tue Aug 3 01:07:05 UTC 2021 selfserv with PID 3431770 started at Tue Aug 3 01:07:05 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1553: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3431770 at Tue Aug 3 01:07:06 UTC 2021 kill -USR1 3431770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431770 killed at Tue Aug 3 01:07:06 UTC 2021 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv starting at Tue Aug 3 01:07:06 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431832 >/dev/null 2>/dev/null selfserv with PID 3431832 found at Tue Aug 3 01:07:06 UTC 2021 selfserv with PID 3431832 started at Tue Aug 3 01:07:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1554: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3431832 at Tue Aug 3 01:07:07 UTC 2021 kill -USR1 3431832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431832 killed at Tue Aug 3 01:07:07 UTC 2021 ssl.sh: TLS Server hello response without SNI ---- selfserv starting at Tue Aug 3 01:07:07 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3431928 >/dev/null 2>/dev/null selfserv with PID 3431928 found at Tue Aug 3 01:07:07 UTC 2021 selfserv with PID 3431928 started at Tue Aug 3 01:07:07 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1555: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3431928 at Tue Aug 3 01:07:08 UTC 2021 kill -USR1 3431928 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3431928 killed at Tue Aug 3 01:07:08 UTC 2021 ssl.sh: TLS Server hello response with SNI ---- selfserv starting at Tue Aug 3 01:07:08 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432027 >/dev/null 2>/dev/null selfserv with PID 3432027 found at Tue Aug 3 01:07:08 UTC 2021 selfserv with PID 3432027 started at Tue Aug 3 01:07:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3432027 at Tue Aug 3 01:07:09 UTC 2021 kill -USR1 3432027 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432027 killed at Tue Aug 3 01:07:09 UTC 2021 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv starting at Tue Aug 3 01:07:09 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432101 >/dev/null 2>/dev/null selfserv with PID 3432101 found at Tue Aug 3 01:07:09 UTC 2021 selfserv with PID 3432101 started at Tue Aug 3 01:07:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #1557: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3432101 at Tue Aug 3 01:07:10 UTC 2021 kill -USR1 3432101 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432101 killed at Tue Aug 3 01:07:10 UTC 2021 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv starting at Tue Aug 3 01:07:10 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432169 >/dev/null 2>/dev/null selfserv with PID 3432169 found at Tue Aug 3 01:07:10 UTC 2021 selfserv with PID 3432169 started at Tue Aug 3 01:07:10 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1558: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3432169 at Tue Aug 3 01:07:11 UTC 2021 kill -USR1 3432169 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432169 killed at Tue Aug 3 01:07:11 UTC 2021 ssl.sh: TLS Server response with alert ---- selfserv starting at Tue Aug 3 01:07:11 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432236 >/dev/null 2>/dev/null selfserv with PID 3432236 found at Tue Aug 3 01:07:11 UTC 2021 selfserv with PID 3432236 started at Tue Aug 3 01:07:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1559: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3432236 at Tue Aug 3 01:07:11 UTC 2021 kill -USR1 3432236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432236 killed at Tue Aug 3 01:07:11 UTC 2021 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv starting at Tue Aug 3 01:07:11 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432299 >/dev/null 2>/dev/null selfserv with PID 3432299 found at Tue Aug 3 01:07:11 UTC 2021 selfserv with PID 3432299 started at Tue Aug 3 01:07:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1495: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3432299 at Tue Aug 3 01:07:12 UTC 2021 kill -USR1 3432299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432299 killed at Tue Aug 3 01:07:12 UTC 2021 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv starting at Tue Aug 3 01:07:12 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432347 >/dev/null 2>/dev/null selfserv with PID 3432347 found at Tue Aug 3 01:07:12 UTC 2021 selfserv with PID 3432347 started at Tue Aug 3 01:07:12 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1496: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv with PID 3432347 at Tue Aug 3 01:07:13 UTC 2021 kill -USR1 3432347 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432347 killed at Tue Aug 3 01:07:13 UTC 2021 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv starting at Tue Aug 3 01:07:13 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432408 >/dev/null 2>/dev/null selfserv with PID 3432408 found at Tue Aug 3 01:07:13 UTC 2021 selfserv with PID 3432408 started at Tue Aug 3 01:07:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1497: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3432408 at Tue Aug 3 01:07:14 UTC 2021 kill -USR1 3432408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432408 killed at Tue Aug 3 01:07:14 UTC 2021 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv starting at Tue Aug 3 01:07:14 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432467 >/dev/null 2>/dev/null selfserv with PID 3432467 found at Tue Aug 3 01:07:14 UTC 2021 selfserv with PID 3432467 started at Tue Aug 3 01:07:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1498: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3432467 at Tue Aug 3 01:07:15 UTC 2021 kill -USR1 3432467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432467 killed at Tue Aug 3 01:07:15 UTC 2021 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv starting at Tue Aug 3 01:07:15 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432518 >/dev/null 2>/dev/null selfserv with PID 3432518 found at Tue Aug 3 01:07:15 UTC 2021 selfserv with PID 3432518 started at Tue Aug 3 01:07:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1499: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3432518 at Tue Aug 3 01:07:16 UTC 2021 kill -USR1 3432518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432518 killed at Tue Aug 3 01:07:16 UTC 2021 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv starting at Tue Aug 3 01:07:16 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432573 >/dev/null 2>/dev/null selfserv with PID 3432573 found at Tue Aug 3 01:07:16 UTC 2021 selfserv with PID 3432573 started at Tue Aug 3 01:07:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1500: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3432573 at Tue Aug 3 01:07:16 UTC 2021 kill -USR1 3432573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432573 killed at Tue Aug 3 01:07:16 UTC 2021 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv starting at Tue Aug 3 01:07:16 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432619 >/dev/null 2>/dev/null selfserv with PID 3432619 found at Tue Aug 3 01:07:16 UTC 2021 selfserv with PID 3432619 started at Tue Aug 3 01:07:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1501: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv with PID 3432619 at Tue Aug 3 01:07:17 UTC 2021 kill -USR1 3432619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432619 killed at Tue Aug 3 01:07:17 UTC 2021 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv starting at Tue Aug 3 01:07:17 UTC 2021 selfserv -D -p 8443 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:17 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432667 >/dev/null 2>/dev/null selfserv with PID 3432667 found at Tue Aug 3 01:07:17 UTC 2021 selfserv with PID 3432667 started at Tue Aug 3 01:07:17 UTC 2021 strsclnt -4 -q -p 8443 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Tue Aug 3 01:07:17 UTC 2021 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Tue Aug 3 01:07:23 UTC 2021 ssl.sh: #1502: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv with PID 3432667 at Tue Aug 3 01:07:23 UTC 2021 kill -USR1 3432667 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432667 killed at Tue Aug 3 01:07:23 UTC 2021 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv starting at Tue Aug 3 01:07:23 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432822 >/dev/null 2>/dev/null selfserv with PID 3432822 found at Tue Aug 3 01:07:24 UTC 2021 selfserv with PID 3432822 started at Tue Aug 3 01:07:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1503: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3432822 at Tue Aug 3 01:07:24 UTC 2021 kill -USR1 3432822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432822 killed at Tue Aug 3 01:07:24 UTC 2021 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:07:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432872 >/dev/null 2>/dev/null selfserv with PID 3432872 found at Tue Aug 3 01:07:24 UTC 2021 selfserv with PID 3432872 started at Tue Aug 3 01:07:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1504: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3432872 at Tue Aug 3 01:07:24 UTC 2021 kill -USR1 3432872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432872 killed at Tue Aug 3 01:07:24 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:24 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432917 >/dev/null 2>/dev/null selfserv with PID 3432917 found at Tue Aug 3 01:07:24 UTC 2021 selfserv with PID 3432917 started at Tue Aug 3 01:07:24 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1505: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3432917 at Tue Aug 3 01:07:25 UTC 2021 kill -USR1 3432917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432917 killed at Tue Aug 3 01:07:25 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3432958 >/dev/null 2>/dev/null selfserv with PID 3432958 found at Tue Aug 3 01:07:25 UTC 2021 selfserv with PID 3432958 started at Tue Aug 3 01:07:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1506: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3432958 at Tue Aug 3 01:07:25 UTC 2021 kill -USR1 3432958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3432958 killed at Tue Aug 3 01:07:25 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:07:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433002 >/dev/null 2>/dev/null selfserv with PID 3433002 found at Tue Aug 3 01:07:25 UTC 2021 selfserv with PID 3433002 started at Tue Aug 3 01:07:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1507: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3433002 at Tue Aug 3 01:07:25 UTC 2021 kill -USR1 3433002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433002 killed at Tue Aug 3 01:07:25 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:25 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433043 >/dev/null 2>/dev/null selfserv with PID 3433043 found at Tue Aug 3 01:07:25 UTC 2021 selfserv with PID 3433043 started at Tue Aug 3 01:07:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1508: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433043 at Tue Aug 3 01:07:26 UTC 2021 kill -USR1 3433043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433043 killed at Tue Aug 3 01:07:26 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433084 >/dev/null 2>/dev/null selfserv with PID 3433084 found at Tue Aug 3 01:07:26 UTC 2021 selfserv with PID 3433084 started at Tue Aug 3 01:07:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1509: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433084 at Tue Aug 3 01:07:26 UTC 2021 kill -USR1 3433084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433084 killed at Tue Aug 3 01:07:26 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:07:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433128 >/dev/null 2>/dev/null selfserv with PID 3433128 found at Tue Aug 3 01:07:26 UTC 2021 selfserv with PID 3433128 started at Tue Aug 3 01:07:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1510: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433128 at Tue Aug 3 01:07:26 UTC 2021 kill -USR1 3433128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433128 killed at Tue Aug 3 01:07:26 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:26 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433169 >/dev/null 2>/dev/null selfserv with PID 3433169 found at Tue Aug 3 01:07:26 UTC 2021 selfserv with PID 3433169 started at Tue Aug 3 01:07:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1511: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433169 at Tue Aug 3 01:07:27 UTC 2021 kill -USR1 3433169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433169 killed at Tue Aug 3 01:07:27 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433210 >/dev/null 2>/dev/null selfserv with PID 3433210 found at Tue Aug 3 01:07:27 UTC 2021 selfserv with PID 3433210 started at Tue Aug 3 01:07:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1512: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433210 at Tue Aug 3 01:07:27 UTC 2021 kill -USR1 3433210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433210 killed at Tue Aug 3 01:07:27 UTC 2021 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:07:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433252 >/dev/null 2>/dev/null selfserv with PID 3433252 found at Tue Aug 3 01:07:27 UTC 2021 selfserv with PID 3433252 started at Tue Aug 3 01:07:27 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1513: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433252 at Tue Aug 3 01:07:27 UTC 2021 kill -USR1 3433252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433252 killed at Tue Aug 3 01:07:27 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:27 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433294 >/dev/null 2>/dev/null selfserv with PID 3433294 found at Tue Aug 3 01:07:27 UTC 2021 selfserv with PID 3433294 started at Tue Aug 3 01:07:27 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1514: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3433294 at Tue Aug 3 01:07:28 UTC 2021 kill -USR1 3433294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433294 killed at Tue Aug 3 01:07:28 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433336 >/dev/null 2>/dev/null selfserv with PID 3433336 found at Tue Aug 3 01:07:28 UTC 2021 selfserv with PID 3433336 started at Tue Aug 3 01:07:28 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1515: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433336 at Tue Aug 3 01:07:28 UTC 2021 kill -USR1 3433336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433336 killed at Tue Aug 3 01:07:28 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:07:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433378 >/dev/null 2>/dev/null selfserv with PID 3433378 found at Tue Aug 3 01:07:28 UTC 2021 selfserv with PID 3433378 started at Tue Aug 3 01:07:28 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1516: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3433378 at Tue Aug 3 01:07:28 UTC 2021 kill -USR1 3433378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433378 killed at Tue Aug 3 01:07:28 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:28 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433423 >/dev/null 2>/dev/null selfserv with PID 3433423 found at Tue Aug 3 01:07:28 UTC 2021 selfserv with PID 3433423 started at Tue Aug 3 01:07:28 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1517: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433423 at Tue Aug 3 01:07:29 UTC 2021 kill -USR1 3433423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433423 killed at Tue Aug 3 01:07:29 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433468 >/dev/null 2>/dev/null selfserv with PID 3433468 found at Tue Aug 3 01:07:29 UTC 2021 selfserv with PID 3433468 started at Tue Aug 3 01:07:29 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1518: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433468 at Tue Aug 3 01:07:29 UTC 2021 kill -USR1 3433468 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433468 killed at Tue Aug 3 01:07:29 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:07:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433510 >/dev/null 2>/dev/null selfserv with PID 3433510 found at Tue Aug 3 01:07:29 UTC 2021 selfserv with PID 3433510 started at Tue Aug 3 01:07:29 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1519: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433510 at Tue Aug 3 01:07:29 UTC 2021 kill -USR1 3433510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433510 killed at Tue Aug 3 01:07:29 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:29 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433555 >/dev/null 2>/dev/null selfserv with PID 3433555 found at Tue Aug 3 01:07:29 UTC 2021 selfserv with PID 3433555 started at Tue Aug 3 01:07:29 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1520: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433555 at Tue Aug 3 01:07:30 UTC 2021 kill -USR1 3433555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433555 killed at Tue Aug 3 01:07:30 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:07:30 UTC 2021 selfserv -D -p 8443 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3433597 >/dev/null 2>/dev/null selfserv with PID 3433597 found at Tue Aug 3 01:07:30 UTC 2021 selfserv with PID 3433597 started at Tue Aug 3 01:07:30 UTC 2021 strsclnt -4 -q -p 8443 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1521: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3433597 at Tue Aug 3 01:07:30 UTC 2021 kill -USR1 3433597 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433597 killed at Tue Aug 3 01:07:30 UTC 2021 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv starting at Tue Aug 3 01:07:30 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3433639 >/dev/null 2>/dev/null selfserv with PID 3433639 found at Tue Aug 3 01:07:30 UTC 2021 selfserv with PID 3433639 started at Tue Aug 3 01:07:30 UTC 2021 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1562: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1563: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1564: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1565: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1566: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1567: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1568: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1569: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1570: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1571: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1572: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv with PID 3433639 at Tue Aug 3 01:07:32 UTC 2021 kill -USR1 3433639 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3433639 killed at Tue Aug 3 01:07:32 UTC 2021 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv starting at Tue Aug 3 01:07:32 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client -v < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 3434284 >/dev/null 2>/dev/null selfserv with PID 3434284 found at Tue Aug 3 01:07:32 UTC 2021 selfserv with PID 3434284 started at Tue Aug 3 01:07:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1573: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1574: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1575: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1576: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1577: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1578: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1579: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1580: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1581: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1582: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1583: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1584: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1585: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1586: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1587: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1588: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1589: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1590: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1591: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1592: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1593: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1594: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1595: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1596: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1597: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1598: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1599: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1600: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1601: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1602: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1603: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1604: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1605: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1606: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1607: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1608: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1609: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1610: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1611: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1612: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1613: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1614: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1615: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1616: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1617: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1618: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1619: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1620: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1621: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1622: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1623: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1624: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1625: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1626: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1627: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1628: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1629: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1630: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1631: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1632: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1633: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1634: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1635: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1636: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1637: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1638: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1639: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1640: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1641: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1642: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1643: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1644: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1645: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1646: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1647: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 8443 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:8443 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1648: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3434284 at Tue Aug 3 01:07:35 UTC 2021 kill -USR1 3434284 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3434284 killed at Tue Aug 3 01:07:35 UTC 2021 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:07:35 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3435202 >/dev/null 2>/dev/null selfserv with PID 3435202 found at Tue Aug 3 01:07:35 UTC 2021 selfserv with PID 3435202 started at Tue Aug 3 01:07:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1649: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3435202 at Tue Aug 3 01:07:37 UTC 2021 kill -USR1 3435202 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3435202 killed at Tue Aug 3 01:07:37 UTC 2021 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:07:37 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3435312 >/dev/null 2>/dev/null selfserv with PID 3435312 found at Tue Aug 3 01:07:37 UTC 2021 selfserv with PID 3435312 started at Tue Aug 3 01:07:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1650: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3435312 at Tue Aug 3 01:07:39 UTC 2021 kill -USR1 3435312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3435312 killed at Tue Aug 3 01:07:39 UTC 2021 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:07:39 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3435393 >/dev/null 2>/dev/null selfserv with PID 3435393 found at Tue Aug 3 01:07:39 UTC 2021 selfserv with PID 3435393 started at Tue Aug 3 01:07:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1651: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3435393 at Tue Aug 3 01:07:42 UTC 2021 kill -USR1 3435393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3435393 killed at Tue Aug 3 01:07:42 UTC 2021 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:07:42 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3435595 >/dev/null 2>/dev/null selfserv with PID 3435595 found at Tue Aug 3 01:07:42 UTC 2021 selfserv with PID 3435595 started at Tue Aug 3 01:07:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1652: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3435595 at Tue Aug 3 01:07:44 UTC 2021 kill -USR1 3435595 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3435595 killed at Tue Aug 3 01:07:44 UTC 2021 ssl.sh: TLS Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:07:44 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3435675 >/dev/null 2>/dev/null selfserv with PID 3435675 found at Tue Aug 3 01:07:44 UTC 2021 selfserv with PID 3435675 started at Tue Aug 3 01:07:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1653: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3435675 at Tue Aug 3 01:07:46 UTC 2021 kill -USR1 3435675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3435675 killed at Tue Aug 3 01:07:46 UTC 2021 ssl.sh: TLS Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:07:46 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3435750 >/dev/null 2>/dev/null selfserv with PID 3435750 found at Tue Aug 3 01:07:47 UTC 2021 selfserv with PID 3435750 started at Tue Aug 3 01:07:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1654: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3435750 at Tue Aug 3 01:07:49 UTC 2021 kill -USR1 3435750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3435750 killed at Tue Aug 3 01:07:49 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:07:49 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3435817 >/dev/null 2>/dev/null selfserv with PID 3435817 found at Tue Aug 3 01:07:49 UTC 2021 selfserv with PID 3435817 started at Tue Aug 3 01:07:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1655: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3435817 at Tue Aug 3 01:07:51 UTC 2021 kill -USR1 3435817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3435817 killed at Tue Aug 3 01:07:51 UTC 2021 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:07:51 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3435878 >/dev/null 2>/dev/null selfserv with PID 3435878 found at Tue Aug 3 01:07:51 UTC 2021 selfserv with PID 3435878 started at Tue Aug 3 01:07:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1656: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3435878 at Tue Aug 3 01:07:54 UTC 2021 kill -USR1 3435878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3435878 killed at Tue Aug 3 01:07:54 UTC 2021 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:07:54 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3435943 >/dev/null 2>/dev/null selfserv with PID 3435943 found at Tue Aug 3 01:07:54 UTC 2021 selfserv with PID 3435943 started at Tue Aug 3 01:07:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1657: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3435943 at Tue Aug 3 01:07:56 UTC 2021 kill -USR1 3435943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3435943 killed at Tue Aug 3 01:07:56 UTC 2021 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:07:56 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3436175 >/dev/null 2>/dev/null selfserv with PID 3436175 found at Tue Aug 3 01:07:56 UTC 2021 selfserv with PID 3436175 started at Tue Aug 3 01:07:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1658: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3436175 at Tue Aug 3 01:07:58 UTC 2021 kill -USR1 3436175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3436175 killed at Tue Aug 3 01:07:58 UTC 2021 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv starting at Tue Aug 3 01:07:58 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:07:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3436344 >/dev/null 2>/dev/null selfserv with PID 3436344 found at Tue Aug 3 01:07:59 UTC 2021 selfserv with PID 3436344 started at Tue Aug 3 01:07:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1659: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3436344 at Tue Aug 3 01:08:01 UTC 2021 kill -USR1 3436344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3436344 killed at Tue Aug 3 01:08:01 UTC 2021 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv starting at Tue Aug 3 01:08:01 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3436553 >/dev/null 2>/dev/null selfserv with PID 3436553 found at Tue Aug 3 01:08:01 UTC 2021 selfserv with PID 3436553 started at Tue Aug 3 01:08:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1660: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3436553 at Tue Aug 3 01:08:03 UTC 2021 kill -USR1 3436553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3436553 killed at Tue Aug 3 01:08:03 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:08:03 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:03 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3436676 >/dev/null 2>/dev/null selfserv with PID 3436676 found at Tue Aug 3 01:08:04 UTC 2021 selfserv with PID 3436676 started at Tue Aug 3 01:08:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1661: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3436676 at Tue Aug 3 01:08:06 UTC 2021 kill -USR1 3436676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3436676 killed at Tue Aug 3 01:08:06 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:08:06 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3436769 >/dev/null 2>/dev/null selfserv with PID 3436769 found at Tue Aug 3 01:08:06 UTC 2021 selfserv with PID 3436769 started at Tue Aug 3 01:08:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1662: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3436769 at Tue Aug 3 01:08:08 UTC 2021 kill -USR1 3436769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3436769 killed at Tue Aug 3 01:08:08 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:08:08 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3436859 >/dev/null 2>/dev/null selfserv with PID 3436859 found at Tue Aug 3 01:08:08 UTC 2021 selfserv with PID 3436859 started at Tue Aug 3 01:08:08 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1663: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3436859 at Tue Aug 3 01:08:11 UTC 2021 kill -USR1 3436859 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3436859 killed at Tue Aug 3 01:08:11 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:08:11 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437085 >/dev/null 2>/dev/null selfserv with PID 3437085 found at Tue Aug 3 01:08:11 UTC 2021 selfserv with PID 3437085 started at Tue Aug 3 01:08:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1664: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3437085 at Tue Aug 3 01:08:13 UTC 2021 kill -USR1 3437085 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437085 killed at Tue Aug 3 01:08:13 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:08:13 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437171 >/dev/null 2>/dev/null selfserv with PID 3437171 found at Tue Aug 3 01:08:13 UTC 2021 selfserv with PID 3437171 started at Tue Aug 3 01:08:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1665: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3437171 at Tue Aug 3 01:08:15 UTC 2021 kill -USR1 3437171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437171 killed at Tue Aug 3 01:08:15 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:08:15 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437249 >/dev/null 2>/dev/null selfserv with PID 3437249 found at Tue Aug 3 01:08:15 UTC 2021 selfserv with PID 3437249 started at Tue Aug 3 01:08:15 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1666: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3437249 at Tue Aug 3 01:08:18 UTC 2021 kill -USR1 3437249 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437249 killed at Tue Aug 3 01:08:18 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:08:18 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437324 >/dev/null 2>/dev/null selfserv with PID 3437324 found at Tue Aug 3 01:08:18 UTC 2021 selfserv with PID 3437324 started at Tue Aug 3 01:08:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1667: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3437324 at Tue Aug 3 01:08:20 UTC 2021 kill -USR1 3437324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437324 killed at Tue Aug 3 01:08:20 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:08:20 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437428 >/dev/null 2>/dev/null selfserv with PID 3437428 found at Tue Aug 3 01:08:20 UTC 2021 selfserv with PID 3437428 started at Tue Aug 3 01:08:20 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1668: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3437428 at Tue Aug 3 01:08:22 UTC 2021 kill -USR1 3437428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437428 killed at Tue Aug 3 01:08:22 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:08:22 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437497 >/dev/null 2>/dev/null selfserv with PID 3437497 found at Tue Aug 3 01:08:22 UTC 2021 selfserv with PID 3437497 started at Tue Aug 3 01:08:22 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1669: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3437497 at Tue Aug 3 01:08:25 UTC 2021 kill -USR1 3437497 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437497 killed at Tue Aug 3 01:08:25 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:08:25 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437621 >/dev/null 2>/dev/null selfserv with PID 3437621 found at Tue Aug 3 01:08:25 UTC 2021 selfserv with PID 3437621 started at Tue Aug 3 01:08:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1670: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3437621 at Tue Aug 3 01:08:27 UTC 2021 kill -USR1 3437621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437621 killed at Tue Aug 3 01:08:27 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:08:27 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437797 >/dev/null 2>/dev/null selfserv with PID 3437797 found at Tue Aug 3 01:08:27 UTC 2021 selfserv with PID 3437797 started at Tue Aug 3 01:08:27 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1671: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3437797 at Tue Aug 3 01:08:29 UTC 2021 kill -USR1 3437797 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437797 killed at Tue Aug 3 01:08:29 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:08:29 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:29 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437862 >/dev/null 2>/dev/null selfserv with PID 3437862 found at Tue Aug 3 01:08:30 UTC 2021 selfserv with PID 3437862 started at Tue Aug 3 01:08:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1672: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3437862 at Tue Aug 3 01:08:32 UTC 2021 kill -USR1 3437862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437862 killed at Tue Aug 3 01:08:32 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:08:32 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3437960 >/dev/null 2>/dev/null selfserv with PID 3437960 found at Tue Aug 3 01:08:32 UTC 2021 selfserv with PID 3437960 started at Tue Aug 3 01:08:32 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1673: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3437960 at Tue Aug 3 01:08:34 UTC 2021 kill -USR1 3437960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3437960 killed at Tue Aug 3 01:08:34 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:08:34 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438037 >/dev/null 2>/dev/null selfserv with PID 3438037 found at Tue Aug 3 01:08:34 UTC 2021 selfserv with PID 3438037 started at Tue Aug 3 01:08:34 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1674: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3438037 at Tue Aug 3 01:08:37 UTC 2021 kill -USR1 3438037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438037 killed at Tue Aug 3 01:08:37 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:08:37 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438106 >/dev/null 2>/dev/null selfserv with PID 3438106 found at Tue Aug 3 01:08:37 UTC 2021 selfserv with PID 3438106 started at Tue Aug 3 01:08:37 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1675: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3438106 at Tue Aug 3 01:08:39 UTC 2021 kill -USR1 3438106 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438106 killed at Tue Aug 3 01:08:39 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:08:39 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438166 >/dev/null 2>/dev/null selfserv with PID 3438166 found at Tue Aug 3 01:08:39 UTC 2021 selfserv with PID 3438166 started at Tue Aug 3 01:08:39 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1676: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3438166 at Tue Aug 3 01:08:42 UTC 2021 kill -USR1 3438166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438166 killed at Tue Aug 3 01:08:42 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv starting at Tue Aug 3 01:08:42 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438369 >/dev/null 2>/dev/null selfserv with PID 3438369 found at Tue Aug 3 01:08:42 UTC 2021 selfserv with PID 3438369 started at Tue Aug 3 01:08:42 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1677: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3438369 at Tue Aug 3 01:08:44 UTC 2021 kill -USR1 3438369 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438369 killed at Tue Aug 3 01:08:44 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv starting at Tue Aug 3 01:08:44 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438444 >/dev/null 2>/dev/null selfserv with PID 3438444 found at Tue Aug 3 01:08:44 UTC 2021 selfserv with PID 3438444 started at Tue Aug 3 01:08:44 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1678: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3438444 at Tue Aug 3 01:08:46 UTC 2021 kill -USR1 3438444 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438444 killed at Tue Aug 3 01:08:46 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:08:46 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:46 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438538 >/dev/null 2>/dev/null selfserv with PID 3438538 found at Tue Aug 3 01:08:47 UTC 2021 selfserv with PID 3438538 started at Tue Aug 3 01:08:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1679: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3438538 at Tue Aug 3 01:08:49 UTC 2021 kill -USR1 3438538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438538 killed at Tue Aug 3 01:08:49 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv starting at Tue Aug 3 01:08:49 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438602 >/dev/null 2>/dev/null selfserv with PID 3438602 found at Tue Aug 3 01:08:49 UTC 2021 selfserv with PID 3438602 started at Tue Aug 3 01:08:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1680: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3438602 at Tue Aug 3 01:08:52 UTC 2021 kill -USR1 3438602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438602 killed at Tue Aug 3 01:08:52 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:08:52 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438685 >/dev/null 2>/dev/null selfserv with PID 3438685 found at Tue Aug 3 01:08:52 UTC 2021 selfserv with PID 3438685 started at Tue Aug 3 01:08:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1681: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3438685 at Tue Aug 3 01:08:54 UTC 2021 kill -USR1 3438685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438685 killed at Tue Aug 3 01:08:54 UTC 2021 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv starting at Tue Aug 3 01:08:54 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438758 >/dev/null 2>/dev/null selfserv with PID 3438758 found at Tue Aug 3 01:08:54 UTC 2021 selfserv with PID 3438758 started at Tue Aug 3 01:08:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1682: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3438758 at Tue Aug 3 01:08:56 UTC 2021 kill -USR1 3438758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438758 killed at Tue Aug 3 01:08:56 UTC 2021 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv starting at Tue Aug 3 01:08:56 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2438121\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3438942 >/dev/null 2>/dev/null selfserv with PID 3438942 found at Tue Aug 3 01:08:56 UTC 2021 selfserv with PID 3438942 started at Tue Aug 3 01:08:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1683: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3438942 at Tue Aug 3 01:08:59 UTC 2021 kill -USR1 3438942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3438942 killed at Tue Aug 3 01:08:59 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:08:59 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:08:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3439009 >/dev/null 2>/dev/null selfserv with PID 3439009 found at Tue Aug 3 01:08:59 UTC 2021 selfserv with PID 3439009 started at Tue Aug 3 01:08:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1684: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3439009 at Tue Aug 3 01:09:01 UTC 2021 kill -USR1 3439009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3439009 killed at Tue Aug 3 01:09:01 UTC 2021 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:01 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3439310 >/dev/null 2>/dev/null selfserv with PID 3439310 found at Tue Aug 3 01:09:01 UTC 2021 selfserv with PID 3439310 started at Tue Aug 3 01:09:01 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1685: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3439310 at Tue Aug 3 01:09:04 UTC 2021 kill -USR1 3439310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3439310 killed at Tue Aug 3 01:09:04 UTC 2021 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:09:04 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3440260 >/dev/null 2>/dev/null selfserv with PID 3440260 found at Tue Aug 3 01:09:04 UTC 2021 selfserv with PID 3440260 started at Tue Aug 3 01:09:04 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1686: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3440260 at Tue Aug 3 01:09:06 UTC 2021 kill -USR1 3440260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3440260 killed at Tue Aug 3 01:09:06 UTC 2021 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:06 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3441305 >/dev/null 2>/dev/null selfserv with PID 3441305 found at Tue Aug 3 01:09:06 UTC 2021 selfserv with PID 3441305 started at Tue Aug 3 01:09:06 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1687: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3441305 at Tue Aug 3 01:09:09 UTC 2021 kill -USR1 3441305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3441305 killed at Tue Aug 3 01:09:09 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:09:09 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3443333 >/dev/null 2>/dev/null selfserv with PID 3443333 found at Tue Aug 3 01:09:09 UTC 2021 selfserv with PID 3443333 started at Tue Aug 3 01:09:09 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1688: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3443333 at Tue Aug 3 01:09:11 UTC 2021 kill -USR1 3443333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3443333 killed at Tue Aug 3 01:09:11 UTC 2021 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:11 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3444439 >/dev/null 2>/dev/null selfserv with PID 3444439 found at Tue Aug 3 01:09:11 UTC 2021 selfserv with PID 3444439 started at Tue Aug 3 01:09:11 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1689: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3444439 at Tue Aug 3 01:09:13 UTC 2021 kill -USR1 3444439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3444439 killed at Tue Aug 3 01:09:13 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:09:13 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:13 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3447074 >/dev/null 2>/dev/null selfserv with PID 3447074 found at Tue Aug 3 01:09:14 UTC 2021 selfserv with PID 3447074 started at Tue Aug 3 01:09:14 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1690: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3447074 at Tue Aug 3 01:09:16 UTC 2021 kill -USR1 3447074 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3447074 killed at Tue Aug 3 01:09:16 UTC 2021 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:16 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3449603 >/dev/null 2>/dev/null selfserv with PID 3449603 found at Tue Aug 3 01:09:16 UTC 2021 selfserv with PID 3449603 started at Tue Aug 3 01:09:16 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1691: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3449603 at Tue Aug 3 01:09:18 UTC 2021 kill -USR1 3449603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3449603 killed at Tue Aug 3 01:09:18 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:09:18 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3451264 >/dev/null 2>/dev/null selfserv with PID 3451264 found at Tue Aug 3 01:09:18 UTC 2021 selfserv with PID 3451264 started at Tue Aug 3 01:09:18 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1692: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3451264 at Tue Aug 3 01:09:21 UTC 2021 kill -USR1 3451264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3451264 killed at Tue Aug 3 01:09:21 UTC 2021 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:21 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3452506 >/dev/null 2>/dev/null selfserv with PID 3452506 found at Tue Aug 3 01:09:21 UTC 2021 selfserv with PID 3452506 started at Tue Aug 3 01:09:21 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1693: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3452506 at Tue Aug 3 01:09:23 UTC 2021 kill -USR1 3452506 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3452506 killed at Tue Aug 3 01:09:23 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:09:23 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3455573 >/dev/null 2>/dev/null selfserv with PID 3455573 found at Tue Aug 3 01:09:23 UTC 2021 selfserv with PID 3455573 started at Tue Aug 3 01:09:23 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1694: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3455573 at Tue Aug 3 01:09:25 UTC 2021 kill -USR1 3455573 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3455573 killed at Tue Aug 3 01:09:25 UTC 2021 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:25 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:25 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3457255 >/dev/null 2>/dev/null selfserv with PID 3457255 found at Tue Aug 3 01:09:26 UTC 2021 selfserv with PID 3457255 started at Tue Aug 3 01:09:26 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1695: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3457255 at Tue Aug 3 01:09:28 UTC 2021 kill -USR1 3457255 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3457255 killed at Tue Aug 3 01:09:28 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:09:28 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3459745 >/dev/null 2>/dev/null selfserv with PID 3459745 found at Tue Aug 3 01:09:28 UTC 2021 selfserv with PID 3459745 started at Tue Aug 3 01:09:28 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1696: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3459745 at Tue Aug 3 01:09:30 UTC 2021 kill -USR1 3459745 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3459745 killed at Tue Aug 3 01:09:30 UTC 2021 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:30 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3463991 >/dev/null 2>/dev/null selfserv with PID 3463991 found at Tue Aug 3 01:09:30 UTC 2021 selfserv with PID 3463991 started at Tue Aug 3 01:09:30 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1697: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3463991 at Tue Aug 3 01:09:33 UTC 2021 kill -USR1 3463991 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3463991 killed at Tue Aug 3 01:09:33 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:09:33 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3466960 >/dev/null 2>/dev/null selfserv with PID 3466960 found at Tue Aug 3 01:09:33 UTC 2021 selfserv with PID 3466960 started at Tue Aug 3 01:09:33 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1698: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3466960 at Tue Aug 3 01:09:35 UTC 2021 kill -USR1 3466960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3466960 killed at Tue Aug 3 01:09:35 UTC 2021 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:35 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3468666 >/dev/null 2>/dev/null selfserv with PID 3468666 found at Tue Aug 3 01:09:35 UTC 2021 selfserv with PID 3468666 started at Tue Aug 3 01:09:35 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1699: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3468666 at Tue Aug 3 01:09:38 UTC 2021 kill -USR1 3468666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3468666 killed at Tue Aug 3 01:09:38 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:09:38 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3470742 >/dev/null 2>/dev/null selfserv with PID 3470742 found at Tue Aug 3 01:09:38 UTC 2021 selfserv with PID 3470742 started at Tue Aug 3 01:09:38 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1700: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3470742 at Tue Aug 3 01:09:40 UTC 2021 kill -USR1 3470742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3470742 killed at Tue Aug 3 01:09:40 UTC 2021 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:40 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3471686 >/dev/null 2>/dev/null selfserv with PID 3471686 found at Tue Aug 3 01:09:40 UTC 2021 selfserv with PID 3471686 started at Tue Aug 3 01:09:40 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1701: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3471686 at Tue Aug 3 01:09:43 UTC 2021 kill -USR1 3471686 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3471686 killed at Tue Aug 3 01:09:43 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv starting at Tue Aug 3 01:09:43 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3473616 >/dev/null 2>/dev/null selfserv with PID 3473616 found at Tue Aug 3 01:09:43 UTC 2021 selfserv with PID 3473616 started at Tue Aug 3 01:09:43 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1702: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3473616 at Tue Aug 3 01:09:45 UTC 2021 kill -USR1 3473616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3473616 killed at Tue Aug 3 01:09:45 UTC 2021 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv starting at Tue Aug 3 01:09:45 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3475243 >/dev/null 2>/dev/null selfserv with PID 3475243 found at Tue Aug 3 01:09:45 UTC 2021 selfserv with PID 3475243 started at Tue Aug 3 01:09:45 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1703: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3475243 at Tue Aug 3 01:09:47 UTC 2021 kill -USR1 3475243 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3475243 killed at Tue Aug 3 01:09:47 UTC 2021 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv starting at Tue Aug 3 01:09:47 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:47 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3477932 >/dev/null 2>/dev/null selfserv with PID 3477932 found at Tue Aug 3 01:09:48 UTC 2021 selfserv with PID 3477932 started at Tue Aug 3 01:09:48 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1649: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3477932 at Tue Aug 3 01:09:49 UTC 2021 kill -USR1 3477932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3477932 killed at Tue Aug 3 01:09:49 UTC 2021 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:09:49 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3478581 >/dev/null 2>/dev/null selfserv with PID 3478581 found at Tue Aug 3 01:09:49 UTC 2021 selfserv with PID 3478581 started at Tue Aug 3 01:09:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1650: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3478581 at Tue Aug 3 01:09:49 UTC 2021 kill -USR1 3478581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3478581 killed at Tue Aug 3 01:09:49 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:49 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3478630 >/dev/null 2>/dev/null selfserv with PID 3478630 found at Tue Aug 3 01:09:49 UTC 2021 selfserv with PID 3478630 started at Tue Aug 3 01:09:49 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1651: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3478630 at Tue Aug 3 01:09:50 UTC 2021 kill -USR1 3478630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3478630 killed at Tue Aug 3 01:09:50 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:50 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3479255 >/dev/null 2>/dev/null selfserv with PID 3479255 found at Tue Aug 3 01:09:50 UTC 2021 selfserv with PID 3479255 started at Tue Aug 3 01:09:50 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1652: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3479255 at Tue Aug 3 01:09:51 UTC 2021 kill -USR1 3479255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3479255 killed at Tue Aug 3 01:09:51 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:09:51 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3479402 >/dev/null 2>/dev/null selfserv with PID 3479402 found at Tue Aug 3 01:09:51 UTC 2021 selfserv with PID 3479402 started at Tue Aug 3 01:09:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1653: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv with PID 3479402 at Tue Aug 3 01:09:51 UTC 2021 kill -USR1 3479402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3479402 killed at Tue Aug 3 01:09:51 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:51 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3479450 >/dev/null 2>/dev/null selfserv with PID 3479450 found at Tue Aug 3 01:09:51 UTC 2021 selfserv with PID 3479450 started at Tue Aug 3 01:09:51 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1654: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3479450 at Tue Aug 3 01:09:52 UTC 2021 kill -USR1 3479450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3479450 killed at Tue Aug 3 01:09:52 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:52 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3479510 >/dev/null 2>/dev/null selfserv with PID 3479510 found at Tue Aug 3 01:09:52 UTC 2021 selfserv with PID 3479510 started at Tue Aug 3 01:09:52 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1655: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3479510 at Tue Aug 3 01:09:53 UTC 2021 kill -USR1 3479510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3479510 killed at Tue Aug 3 01:09:53 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:09:53 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3479554 >/dev/null 2>/dev/null selfserv with PID 3479554 found at Tue Aug 3 01:09:53 UTC 2021 selfserv with PID 3479554 started at Tue Aug 3 01:09:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1656: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3479554 at Tue Aug 3 01:09:53 UTC 2021 kill -USR1 3479554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3479554 killed at Tue Aug 3 01:09:53 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:53 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3479605 >/dev/null 2>/dev/null selfserv with PID 3479605 found at Tue Aug 3 01:09:53 UTC 2021 selfserv with PID 3479605 started at Tue Aug 3 01:09:53 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1657: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3479605 at Tue Aug 3 01:09:54 UTC 2021 kill -USR1 3479605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3479605 killed at Tue Aug 3 01:09:54 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:54 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3479649 >/dev/null 2>/dev/null selfserv with PID 3479649 found at Tue Aug 3 01:09:54 UTC 2021 selfserv with PID 3479649 started at Tue Aug 3 01:09:54 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1658: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3479649 at Tue Aug 3 01:09:55 UTC 2021 kill -USR1 3479649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3479649 killed at Tue Aug 3 01:09:55 UTC 2021 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:09:55 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3479855 >/dev/null 2>/dev/null selfserv with PID 3479855 found at Tue Aug 3 01:09:55 UTC 2021 selfserv with PID 3479855 started at Tue Aug 3 01:09:55 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1659: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3479855 at Tue Aug 3 01:09:55 UTC 2021 kill -USR1 3479855 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3479855 killed at Tue Aug 3 01:09:55 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:55 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:55 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3479906 >/dev/null 2>/dev/null selfserv with PID 3479906 found at Tue Aug 3 01:09:55 UTC 2021 selfserv with PID 3479906 started at Tue Aug 3 01:09:55 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1660: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3479906 at Tue Aug 3 01:09:56 UTC 2021 kill -USR1 3479906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3479906 killed at Tue Aug 3 01:09:56 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:56 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:56 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3480000 >/dev/null 2>/dev/null selfserv with PID 3480000 found at Tue Aug 3 01:09:56 UTC 2021 selfserv with PID 3480000 started at Tue Aug 3 01:09:56 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1661: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3480000 at Tue Aug 3 01:09:57 UTC 2021 kill -USR1 3480000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3480000 killed at Tue Aug 3 01:09:57 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:09:57 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3480478 >/dev/null 2>/dev/null selfserv with PID 3480478 found at Tue Aug 3 01:09:57 UTC 2021 selfserv with PID 3480478 started at Tue Aug 3 01:09:57 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1662: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv with PID 3480478 at Tue Aug 3 01:09:57 UTC 2021 kill -USR1 3480478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3480478 killed at Tue Aug 3 01:09:57 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:57 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:57 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3480553 >/dev/null 2>/dev/null selfserv with PID 3480553 found at Tue Aug 3 01:09:57 UTC 2021 selfserv with PID 3480553 started at Tue Aug 3 01:09:57 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1663: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3480553 at Tue Aug 3 01:09:58 UTC 2021 kill -USR1 3480553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3480553 killed at Tue Aug 3 01:09:58 UTC 2021 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:58 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:58 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3481046 >/dev/null 2>/dev/null selfserv with PID 3481046 found at Tue Aug 3 01:09:58 UTC 2021 selfserv with PID 3481046 started at Tue Aug 3 01:09:58 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1664: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3481046 at Tue Aug 3 01:09:59 UTC 2021 kill -USR1 3481046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3481046 killed at Tue Aug 3 01:09:59 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv starting at Tue Aug 3 01:09:59 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3481097 >/dev/null 2>/dev/null selfserv with PID 3481097 found at Tue Aug 3 01:09:59 UTC 2021 selfserv with PID 3481097 started at Tue Aug 3 01:09:59 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1665: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3481097 at Tue Aug 3 01:09:59 UTC 2021 kill -USR1 3481097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3481097 killed at Tue Aug 3 01:09:59 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:09:59 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:09:59 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3481832 >/dev/null 2>/dev/null selfserv with PID 3481832 found at Tue Aug 3 01:09:59 UTC 2021 selfserv with PID 3481832 started at Tue Aug 3 01:09:59 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1666: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3481832 at Tue Aug 3 01:10:00 UTC 2021 kill -USR1 3481832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3481832 killed at Tue Aug 3 01:10:00 UTC 2021 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv starting at Tue Aug 3 01:10:00 UTC 2021 selfserv -D -p 8443 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2438121\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv at Tue Aug 3 01:10:00 UTC 2021 tstclnt -4 -p 8443 -h localhost.localdomain -q \ -d ../ext_client < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat kill -0 3481998 >/dev/null 2>/dev/null selfserv with PID 3481998 found at Tue Aug 3 01:10:00 UTC 2021 selfserv with PID 3481998 started at Tue Aug 3 01:10:00 UTC 2021 strsclnt -4 -q -p 8443 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /usr/src/RPM/BUILD/nss-3.66.0/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1667: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv with PID 3481998 at Tue Aug 3 01:10:01 UTC 2021 kill -USR1 3481998 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv -b -p 8443 2>/dev/null; selfserv with PID 3481998 killed at Tue Aug 3 01:10:01 UTC 2021 TIMESTAMP ssl END: Tue Aug 3 01:10:01 UTC 2021 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Tue Aug 3 01:10:01 UTC 2021 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #1: create ssl_gtest database - PASSED ~/RPM/BUILD/nss-3.66.0/nss/tests ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests ~/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n client -s CN=client -t ,, -x -m 1 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #2: create certificate: client rsa sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa -s CN=rsa -t ,, -x -m 2 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #3: create certificate: rsa rsa sign kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa2048 -s CN=rsa2048 -t ,, -x -m 3 -w -2 -v 120 -k rsa -g 2048 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4: create certificate: rsa2048 rsa2048 sign kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa8192 -s CN=rsa8192 -t ,, -x -m 4 -w -2 -v 120 -k rsa -g 8192 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #5: create certificate: rsa8192 rsa8192 sign kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_sign -s CN=rsa_sign -t ,, -x -m 5 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #6: create certificate: rsa_sign rsa sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_pss -s CN=rsa_pss -t ,, -x -m 6 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7: create certificate: rsa_pss rsapss sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_pss384 -s CN=rsa_pss384 -t ,, -x -m 7 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA384 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8: create certificate: rsa_pss384 rsapss384 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_pss512 -s CN=rsa_pss512 -t ,, -x -m 8 -w -2 -v 120 -k rsa -g 2048 --pss -Z SHA512 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9: create certificate: rsa_pss512 rsapss512 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_pss_noparam -s CN=rsa_pss_noparam -t ,, -x -m 9 -w -2 -v 120 -k rsa -g 2048 --pss -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #10: create certificate: rsa_pss_noparam rsapss_noparam sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_decrypt -s CN=rsa_decrypt -t ,, -x -m 10 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11: create certificate: rsa_decrypt rsa kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n ecdsa256 -s CN=ecdsa256 -t ,, -x -m 11 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12: create certificate: ecdsa256 p256 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n ecdsa384 -s CN=ecdsa384 -t ,, -x -m 12 -w -2 -v 120 -k ec -q secp384r1 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #13: create certificate: ecdsa384 p384 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n ecdsa521 -s CN=ecdsa521 -t ,, -x -m 13 -w -2 -v 120 -k ec -q secp521r1 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #14: create certificate: ecdsa521 p521 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n ecdh_ecdsa -s CN=ecdh_ecdsa -t ,, -x -m 14 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15: create certificate: ecdh_ecdsa p256 kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_ca -s CN=rsa_ca -t CT,CT,CT -x -m 15 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #16: create certificate: rsa_ca rsa_ca ca - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_chain -s CN=rsa_chain -t ,, -c rsa_ca -m 16 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #17: create certificate: rsa_chain rsa_chain sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_pss_ca -s CN=rsa_pss_ca -t CT,CT,CT -x -m 17 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #18: create certificate: rsa_pss_ca rsapss_ca ca - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_pss_chain -s CN=rsa_pss_chain -t ,, -c rsa_pss_ca -m 18 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #19: create certificate: rsa_pss_chain rsapss_chain sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n rsa_ca_rsa_pss_chain -s CN=rsa_ca_rsa_pss_chain -t ,, -c rsa_ca -m 19 -w -2 -v 120 -k rsa -g 1024 --pss-sign -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #20: create certificate: rsa_ca_rsa_pss_chain rsa_ca_rsapss_chain sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n ecdh_rsa -s CN=ecdh_rsa -t ,, -c rsa_ca -m 20 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #21: create certificate: ecdh_rsa ecdh_rsa kex - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n dsa -s CN=dsa -t ,, -x -m 21 -w -2 -v 120 -k dsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #22: create certificate: dsa dsa sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n delegator_ecdsa256 -s CN=delegator_ecdsa256 -t ,, -x -m 22 -w -2 -v 120 -k ec -q nistp256 --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #23: create certificate: delegator_ecdsa256 delegator_p256 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n delegator_rsae2048 -s CN=delegator_rsae2048 -t ,, -x -m 23 -w -2 -v 120 -k rsa -g 2048 --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #24: create certificate: delegator_rsae2048 delegator_rsae2048 sign - PASSED /usr/src/RPM/BUILD/nss-3.66.0/dist/Release/bin/certutil -S -z ../tests_noise -d /usr/src/RPM/BUILD/nss-3.66.0/tests_results/security/localhost.1/threadunsafe/ssl_gtests -n delegator_rsa_pss2048 -s CN=delegator_rsa_pss2048 -t ,, -x -m 24 -w -2 -v 120 -k rsa -g 2048 --pss --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #25: create certificate: delegator_rsa_pss2048 delegator_rsa_pss2048 sign - PASSED DEBUG: ssl_gtests will be divided into 1 chunk(s) [==========] Running 12780 tests from 103 test suites. [----------] Global test environment set-up. [----------] 8 tests from SelfEncryptTest128 [ RUN ] SelfEncryptTest128.ShortKeyName Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortKeyName (0 ms) [ RUN ] SelfEncryptTest128.ShortIv Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortIv (1 ms) [ RUN ] SelfEncryptTest128.ShortCiphertextLen Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortCiphertextLen (0 ms) [ RUN ] SelfEncryptTest128.ShortCiphertext Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortCiphertext (0 ms) [ RUN ] SelfEncryptTest128.MacWithAESKeyEncrypt Error: SEC_ERROR_LIBRARY_FAILURE [ OK ] SelfEncryptTest128.MacWithAESKeyEncrypt (0 ms) [ RUN ] SelfEncryptTest128.AESWithMacKeyEncrypt Error: SEC_ERROR_INVALID_KEY [ OK ] SelfEncryptTest128.AESWithMacKeyEncrypt (0 ms) [ RUN ] SelfEncryptTest128.MacWithAESKeyDecrypt Error: SEC_ERROR_LIBRARY_FAILURE [ OK ] SelfEncryptTest128.MacWithAESKeyDecrypt (0 ms) [ RUN ] SelfEncryptTest128.AESWithMacKeyDecrypt Error: SEC_ERROR_INVALID_KEY [ OK ] SelfEncryptTest128.AESWithMacKeyDecrypt (0 ms) [----------] 8 tests from SelfEncryptTest128 (1 ms total) [----------] 108 tests from TlsConnectStreamTls13 [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicket (10 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicketPha Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicketPha (11 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicketClientAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicketClientAuth (9 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttLateReadTls Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttLateReadTls (8 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttCoalesceReadTls Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttCoalesceReadTls (8 ms) [ RUN ] TlsConnectStreamTls13.TimePassesByDefault Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TimePassesByDefault (1013 ms) [ RUN ] TlsConnectStreamTls13.BadAntiReplayArgs Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.BadAntiReplayArgs (0 ms) [ RUN ] TlsConnectStreamTls13.SuppressEndOfEarlyDataClientOnly Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SuppressEndOfEarlyDataClientOnly (8 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuth (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthAfterResumption Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthAfterResumption (10 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthMultiple Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthMultiple (12 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthConcurrent Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthConcurrent (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthBeforeKeyUpdate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthBeforeKeyUpdate (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthDuringClientKeyUpdate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthDuringClientKeyUpdate (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthMissingExtension Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthMissingExtension (4 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthAfterClientAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthAfterClientAuth (9 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthContextMismatch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [47] 108cbd472d17aa51d3f5a46cb63bf6fcc9001c000d0018001604030503060302... handshake new: [47] 10c5bd472d17aa51d3f5a46cb63bf6fcc9001c000d0018001604030503060302... record old: [51] 0d00002f108cbd472d17aa51d3f5a46cb63bf6fcc9001c000d00180016040305... record new: [51] 0d00002f10c5bd472d17aa51d3f5a46cb63bf6fcc9001c000d00180016040305... server: Filtered packet: [73] 17030300443ed7546c5fff962b2215f2718c61fbcbc86086b2354664d2e6251f... server: Fatal alert sent: 47 server: Read error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Fatal alert received: 47 client: Read error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthContextMismatch (6 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthBadSignature Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [132] 080400801638c37a4398285f5ddfda6df3e69fc44c359535b573836e26de3e5f... handshake new: [132] 080449801638c37a4398285f5ddfda6df3e69fc44c359535b573836e26de3e5f... record old: [639] 0b0001cf10e23f54cb3b8e6b0a324a399240757da90001bb0001b6308201b230... record new: [639] 0b0001cf10e23f54cb3b8e6b0a324a399240757da90001bb0001b6308201b230... client: Filtered packet: [661] 1703030290ccf40af64adc6e3e311c814613a2b901c636158f958c2eedb96658... server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthBadSignature (5 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthDecline Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Fatal alert sent: 116 server: Read error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthDecline (5 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthWithSessionTicketsEnabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthWithSessionTicketsEnabled (7 ms) [ RUN ] TlsConnectStreamTls13.PostHandshakeAuthDisjointSchemes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.PostHandshakeAuthDisjointSchemes (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionAllNoopClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionAllNoopClient (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionAllNoopServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionAllNoopServer (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionEmptyWriterClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionEmptyWriterClient (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionEmptyWriterServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionEmptyWriterServer (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionWriterDisable Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionWriterDisable (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOverride Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionOverride (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientToServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionClientToServer (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerToClientSH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionServerToClientSH (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerToClientEE Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionServerToClientEE (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionUnsolicitedServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionUnsolicitedServer (4 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerReject Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionServerReject (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientReject Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionClientReject (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerRejectAlert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 246 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 246 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionServerRejectAlert (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientRejectAlert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 246 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionClientRejectAlert (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOnlyWriter Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CustomExtensionOnlyWriter (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOnlyHandler Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CustomExtensionOnlyHandler (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOverrunBuffer Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SEC_ERROR_APPLICATION_CALLBACK_ERROR: The certificate was rejected by extra checks in the application. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionOverrunBuffer (2 ms) [ RUN ] TlsConnectStreamTls13.RetryCallbackWithSessionTicketToken Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.RetryCallbackWithSessionTicketToken (9 ms) [ RUN ] TlsConnectStreamTls13.RetryStatelessDamageFirstClientHello Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING handshake old: [180] 03036400f2b922481536ca77beb2d2765e5317d8f684bb8dbbd56b4e1918fb03... handshake new: [184] 03036400f2b922481536ca77beb2d2765e5317d8f684bb8dbbd56b4e1918fb03... record old: [184] 010000b403036400f2b922481536ca77beb2d2765e5317d8f684bb8dbbd56b4e... record new: [188] 010000b803036400f2b922481536ca77beb2d2765e5317d8f684bb8dbbd56b4e... client: Filtered packet: [193] 16030100bc010000b803036400f2b922481536ca77beb2d2765e5317d8f684bb... server: Changing state from INIT to CONNECTING handshake old: [508] 03036400f2b922481536ca77beb2d2765e5317d8f684bb8dbbd56b4e1918fb03... handshake new: [512] 03036400f2b922481536ca77beb2d2765e5317d8f684bb8dbbd56b4e1918fb03... record old: [512] 010001fc03036400f2b922481536ca77beb2d2765e5317d8f684bb8dbbd56b4e... record new: [516] 0100020003036400f2b922481536ca77beb2d2765e5317d8f684bb8dbbd56b4e... client: Filtered packet: [521] 16030302040100020003036400f2b922481536ca77beb2d2765e5317d8f684bb... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryStatelessDamageFirstClientHello (7 ms) [ RUN ] TlsConnectStreamTls13.RetryStatelessDamageSecondClientHello Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING handshake old: [508] 0303ecda687b4f423e89a174471ac24da350fbac0921e707a8e962b1f1a5b35f... handshake new: [512] 0303ecda687b4f423e89a174471ac24da350fbac0921e707a8e962b1f1a5b35f... record old: [512] 010001fc0303ecda687b4f423e89a174471ac24da350fbac0921e707a8e962b1... record new: [516] 010002000303ecda687b4f423e89a174471ac24da350fbac0921e707a8e962b1... client: Filtered packet: [521] 1603030204010002000303ecda687b4f423e89a174471ac24da350fbac0921e7... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryStatelessDamageSecondClientHello (7 ms) [ RUN ] TlsConnectStreamTls13.SecondClientHelloSendSameTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Warning alert sent: 0 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SecondClientHelloSendSameTicket (9 ms) [ RUN ] TlsConnectStreamTls13.RetryWithDifferentCipherSuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [151] 03034f73dbc372e97135e4d01941361c88b1d2ebc215909abffb0016f5f9f728... handshake new: [151] 03034f73dbc372e97135e4d01941361c88b1d2ebc215909abffb0016f5f9f728... record old: [155] 0200009703034f73dbc372e97135e4d01941361c88b1d2ebc215909abffb0016... record new: [155] 0200009703034f73dbc372e97135e4d01941361c88b1d2ebc215909abffb0016... server: Filtered packet: [823] 160303009b0200009703034f73dbc372e97135e4d01941361c88b1d2ebc21590... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryWithDifferentCipherSuite (14 ms) [ RUN ] TlsConnectStreamTls13.HrrThenTls12 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.HrrThenTls12 (3 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttHrrThenTls12 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. [ OK ] TlsConnectStreamTls13.ZeroRttHrrThenTls12 (7 ms) [ RUN ] TlsConnectStreamTls13.HrrThenTls12SupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303aaf10b906e77d106049dc1bfe408aec789aadc7e9fec5aa7b562160d7332... handshake new: [194] 0303aaf10b906e77d106049dc1bfe408aec789aadc7e9fec5aa7b562160d7332... record old: [191] 010000bb0303aaf10b906e77d106049dc1bfe408aec789aadc7e9fec5aa7b562... record new: [198] 010000c20303aaf10b906e77d106049dc1bfe408aec789aadc7e9fec5aa7b562... client: Filtered packet: [203] 16030100c6010000c20303aaf10b906e77d106049dc1bfe408aec789aadc7e9f... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.HrrThenTls12SupportedVersions (7 ms) [ RUN ] TlsConnectStreamTls13.KeyUpdateTooEarly_Client Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [774] 160303005a02000056030393db062a09560fd4b0d4a7e177a61fa1fc4f72407f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.KeyUpdateTooEarly_Client (4 ms) [ RUN ] TlsConnectStreamTls13.KeyUpdateTooEarly_Server Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [58] 170303003549fa2833ed8b6fe8785023c174b0db4b112394e04b680fcf34a048... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.KeyUpdateTooEarly_Server (4 ms) [ RUN ] TlsConnectStreamTls13.DecryptRecordClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DecryptRecordClient (4 ms) [ RUN ] TlsConnectStreamTls13.DecryptRecordServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DecryptRecordServer (4 ms) [ RUN ] TlsConnectStreamTls13.DropRecordServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record drop: TLS 1.2 Data 3000000000000:[40] 3092b091765ed2298a5d8b44f5b0adad7ee2020b5e9013cc190674bc5bdbabea... server: Drop packet server: Filtered packet: [72] 17030300433092b091765ed2298a5d8b44f5b0adad7ee2020b5e9013ccd90013... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DropRecordServer (4 ms) [ RUN ] TlsConnectStreamTls13.DropRecordClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record drop: TLS 1.2 Data 3000000000000:[43] c3315b47ae14eb8f348fb2e447b6378711072504ccae3f3fd70edbb3aae503cb... client: Drop packet client: Filtered packet: [72] 1703030043c3315b47ae14eb8f348fb2e447b6378711072504ccae3f3fd70ed6... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DropRecordClient (3 ms) [ RUN ] TlsConnectStreamTls13.Tls13FailedWriteSecondFlight Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SOCKET_WRITE_FAILURE: Attempt to write encrypted data to underlying socket failed. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Tls13FailedWriteSecondFlight (3 ms) [ RUN ] TlsConnectStreamTls13.LargeRecord Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [10] 00010203040506070809 record new: [16384] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... client: Filtered packet: [16406] 1703034011102419a2fbd190836d1520370e45c9102da9abf8d48f2359316c0f... client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.LargeRecord (4 ms) [ RUN ] TlsConnectStreamTls13.TooLargeRecord Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [10] 00010203040506070809 record new: [16385] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... client: Filtered packet: [16407] 1703034012c1f80a6954c47df8fdb73de5090b361ede8eeb02cbd352c3829441... server: Fatal alert sent: 22 client: Fatal alert received: 22 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TooLargeRecord (4 ms) [ RUN ] TlsConnectStreamTls13.UnencryptedFinishedMessage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [41] 160303002414000020c342023b03f8ae6679cd55a6bd1668848ad512938685ca... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.UnencryptedFinishedMessage (4 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerZeroRtt (8 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncPostHandshake Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncPostHandshake (4 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncEarlyAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncEarlyAuth (5 ms) [ RUN ] TlsConnectStreamTls13.ForwardInvalidData Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.ForwardInvalidData (2 ms) [ RUN ] TlsConnectStreamTls13.SuppressEndOfEarlyData Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SuppressEndOfEarlyData (8 ms) [ RUN ] TlsConnectStreamTls13.ClientHelloF5Padding Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] TlsConnectStreamTls13.ClientHelloF5Padding (2 ms) [ RUN ] TlsConnectStreamTls13.RecordSizeClientExtensionInvalid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [180] 0303d934cb72b7f3cdce6d12a15abe6cce27cdba39d092b63b87c37dc127c8ba... handshake new: [180] 0303d934cb72b7f3cdce6d12a15abe6cce27cdba39d092b63b87c37dc127c8ba... record old: [184] 010000b40303d934cb72b7f3cdce6d12a15abe6cce27cdba39d092b63b87c37d... record new: [184] 010000b40303d934cb72b7f3cdce6d12a15abe6cce27cdba39d092b63b87c37d... client: Filtered packet: [189] 16030100b8010000b40303d934cb72b7f3cdce6d12a15abe6cce27cdba39d092... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RecordSizeClientExtensionInvalid (4 ms) [ RUN ] TlsConnectStreamTls13.ExternalResumptionUseSecondTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalResumptionUseSecondTicket (10 ms) [ RUN ] TlsConnectStreamTls13.ExternalTokenAfterHrr Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalTokenAfterHrr (22 ms) [ RUN ] TlsConnectStreamTls13.ExternalTokenWithPeerId Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client client: setting external resumption token server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalTokenWithPeerId (10 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello13 Version: TLS 1.3 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello13 (2 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHelloTwice Version: TLS 1.3 client: Send Direct [6] 140303000101 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHelloTwice (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterClientHelloEmptySid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [6] 140303000101 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterClientHelloEmptySid (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterServerHelloEmptySid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [32] 68f2d45f5127d87bc999b0bf8d7bc4863a0dd416b79fbd8932011f9e5dd3045b record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [621] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [738] 160303005a02000056030345ca827998543c4802a7d18d0f59f79171390e1ca8... server: Send Direct [6] 140303000101 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterServerHelloEmptySid (4 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello12 Version: TLS 1.3 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello12 (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterFinished13 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [6] 140303000101 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterFinished13 (4 ms) [ RUN ] TlsConnectStreamTls13.Tls14ClientHelloWithSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303577b3fc205c1ce8130d830e0ff91d5cea2e3418c227c211f066f3ae25cad... handshake new: [180] 0305577b3fc205c1ce8130d830e0ff91d5cea2e3418c227c211f066f3ae25cad... record old: [184] 010000b40303577b3fc205c1ce8130d830e0ff91d5cea2e3418c227c211f066f... record new: [184] 010000b40305577b3fc205c1ce8130d830e0ff91d5cea2e3418c227c211f066f... client: Filtered packet: [189] 16030100b8010000b40305577b3fc205c1ce8130d830e0ff91d5cea2e3418c22... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Tls14ClientHelloWithSupportedVersions (3 ms) [ RUN ] TlsConnectStreamTls13.Ssl30ClientHelloWithSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 03035844ac9704ef6426099ef9541ce1862a9adb65cb27ccf9d24b4e6fa5db78... handshake new: [180] 03005844ac9704ef6426099ef9541ce1862a9adb65cb27ccf9d24b4e6fa5db78... record old: [184] 010000b403035844ac9704ef6426099ef9541ce1862a9adb65cb27ccf9d24b4e... record new: [184] 010000b403005844ac9704ef6426099ef9541ce1862a9adb65cb27ccf9d24b4e... client: Filtered packet: [189] 16030100b8010000b403005844ac9704ef6426099ef9541ce1862a9adb65cb27... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Ssl30ClientHelloWithSupportedVersions (3 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptIgnoreSingleUnknownSuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptIgnoreSingleUnknownSuite (4 ms) [ RUN ] TlsConnectStreamTls13.OuterWithEchAndEchIsInner Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [508] 03035179c7165611668286bca5c80dc69d81fa487c1174f0b68a081b7260cdca... handshake new: [512] 03035179c7165611668286bca5c80dc69d81fa487c1174f0b68a081b7260cdca... record old: [512] 010001fc03035179c7165611668286bca5c80dc69d81fa487c1174f0b68a081b... record new: [516] 0100020003035179c7165611668286bca5c80dc69d81fa487c1174f0b68a081b... client: Filtered packet: [521] 16030102040100020003035179c7165611668286bca5c80dc69d81fa487c1174... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.OuterWithEchAndEchIsInner (3 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithResume Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithResume (9 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithExternalPsk Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithExternalPsk (4 ms) [ RUN ] TlsConnectStreamTls13.EchDowngradeNoFalseStart Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [213] 000100034d0020325abec34efc682e83c40e59e8abb54ae56ef5d4862ed062fd... handshake old: [512] 0303c3902950d17a218d81b54b52c23884f3ee917400d9be2a54cca8f9761927... handshake new: [295] 0303c3902950d17a218d81b54b52c23884f3ee917400d9be2a54cca8f9761927... record old: [516] 010002000303c3902950d17a218d81b54b52c23884f3ee917400d9be2a54cca8... record new: [299] 010001270303c3902950d17a218d81b54b52c23884f3ee917400d9be2a54cca8... client: Filtered packet: [304] 160301012b010001270303c3902950d17a218d81b54b52c23884f3ee917400d9... [ OK ] TlsConnectStreamTls13.EchDowngradeNoFalseStart (4 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithHrr (8 ms) [ RUN ] TlsConnectStreamTls13.GreaseEchHrrMatches Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.GreaseEchHrrMatches (7 ms) [ RUN ] TlsConnectStreamTls13.EchFailDecryptCH2 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [117] 000100034d0000006cb71efe47d6515399a819b6b02f3a5cc2aa4ebdfbc03c6f... extension new: [117] 000100034d0000006cb71efe47d6515399a819b6b02f3a5cc2aa4ebdfbc03c6f... handshake old: [570] 0303695094e3c9a7e5f0ce871236d32fc9a8f8234fe795ffbb229242c31d6130... handshake new: [570] 0303695094e3c9a7e5f0ce871236d32fc9a8f8234fe795ffbb229242c31d6130... record old: [574] 0100023a0303695094e3c9a7e5f0ce871236d32fc9a8f8234fe795ffbb229242... record new: [574] 0100023a0303695094e3c9a7e5f0ce871236d32fc9a8f8234fe795ffbb229242... client: Filtered packet: [579] 160303023e0100023a0303695094e3c9a7e5f0ce871236d32fc9a8f8234fe795... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchFailDecryptCH2 (4 ms) [ RUN ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingYN Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingYN (5 ms) [ RUN ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingNY Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [147] 000100034d0020250c26b8a5ae90af841b1317336bfe8d3bfb2da454c69dde5b... handshake old: [512] 0303f071fa2574bccc3ffec385db515886b0d5d1f52ef7d380c9899f66b08fec... handshake new: [361] 0303f071fa2574bccc3ffec385db515886b0d5d1f52ef7d380c9899f66b08fec... record old: [516] 010002000303f071fa2574bccc3ffec385db515886b0d5d1f52ef7d380c9899f... record new: [365] 010001690303f071fa2574bccc3ffec385db515886b0d5d1f52ef7d380c9899f... client: Filtered packet: [370] 160301016d010001690303f071fa2574bccc3ffec385db515886b0d5d1f52ef7... server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchHrrChangeCh2OfferingNY (6 ms) [ RUN ] TlsConnectStreamTls13.EchHrrChangeCipherSuite Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [117] 000100034d0000006c2d9a3c3fcbe1c3e73333907d4bdee70120fb48b3ae2e15... extension new: [117] 490100034d0000006c2d9a3c3fcbe1c3e73333907d4bdee70120fb48b3ae2e15... handshake old: [570] 03034c8a0e69b6bc3755a4926b81d1d3202ac30a4ac9184c1a2369b368130afe... handshake new: [570] 03034c8a0e69b6bc3755a4926b81d1d3202ac30a4ac9184c1a2369b368130afe... record old: [574] 0100023a03034c8a0e69b6bc3755a4926b81d1d3202ac30a4ac9184c1a2369b3... record new: [574] 0100023a03034c8a0e69b6bc3755a4926b81d1d3202ac30a4ac9184c1a2369b3... client: Filtered packet: [579] 160303023e0100023a03034c8a0e69b6bc3755a4926b81d1d3202ac30a4ac918... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchHrrChangeCipherSuite (6 ms) [ RUN ] TlsConnectStreamTls13.EchAcceptWithHrrAndPsk Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchAcceptWithHrrAndPsk (7 ms) [ RUN ] TlsConnectStreamTls13.EchRejectWithHrrAndPsk Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.EchRejectWithHrrAndPsk (8 ms) [ RUN ] TlsConnectStreamTls13.EchRejectResume Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchRejectResume (10 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttBoth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchZeroRttBoth (9 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttFirst Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchZeroRttFirst (8 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttSecond Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchZeroRttSecond (9 ms) [ RUN ] TlsConnectStreamTls13.EchZeroRttRejectSecond Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED [ OK ] TlsConnectStreamTls13.EchZeroRttRejectSecond (9 ms) [ RUN ] TlsConnectStreamTls13.EchRejectUnknownCriticalExtension Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] TlsConnectStreamTls13.EchRejectUnknownCriticalExtension (5 ms) [ RUN ] TlsConnectStreamTls13.EchRejectAuthCertSuccessNoRetries Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED [ OK ] TlsConnectStreamTls13.EchRejectAuthCertSuccessNoRetries (5 ms) [ RUN ] TlsConnectStreamTls13.EchRejectSuppressClientCert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchRejectSuppressClientCert (4 ms) [ RUN ] TlsConnectStreamTls13.EchRejectAuthCertSuccessIncompatibleRetries Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED [ OK ] TlsConnectStreamTls13.EchRejectAuthCertSuccessIncompatibleRetries (5 ms) [ RUN ] TlsConnectStreamTls13.EchRejectAuthCertFail Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchRejectAuthCertFail (4 ms) [ RUN ] TlsConnectStreamTls13.EchValidateGreaseResponse Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [70] 0044fe0a00404d002000200e5e451b9ee16ac025feb4ee5338b1ab46ec0ecf44... extension new: [70] 4944fe0a00404d002000200e5e451b9ee16ac025feb4ee5338b1ab46ec0ecf44... handshake old: [110] 006cfe0a00460044fe0a00404d002000200e5e451b9ee16ac025feb4ee5338b1... handshake new: [110] 006cfe0a00464944fe0a00404d002000200e5e451b9ee16ac025feb4ee5338b1... record old: [731] 0800006e006cfe0a00460044fe0a00404d002000200e5e451b9ee16ac025feb4... record new: [731] 0800006e006cfe0a00464944fe0a00404d002000200e5e451b9ee16ac025feb4... server: Filtered packet: [848] 160303005a020000560303ed9f31edd1d35bd07b9c10026bb7b1fb8700193187... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_KEYS: SSL received a malformed ESNI keys structure client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchValidateGreaseResponse (12 ms) [ RUN ] TlsConnectStreamTls13.EchBadCiphertext Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100034d0020deccb3104390377de18505859c8a99ed02f926ccfb517262fb... extension new: [147] 000100034d0020deccb3104390377de18505859c8a99ed02f926ccfb517262fb... handshake old: [512] 03031ef4284fb8ba92650f6247c2c38b791d64da7b2aa3c7819f4fc38b71b5d8... handshake new: [512] 03031ef4284fb8ba92650f6247c2c38b791d64da7b2aa3c7819f4fc38b71b5d8... record old: [516] 0100020003031ef4284fb8ba92650f6247c2c38b791d64da7b2aa3c7819f4fc3... record new: [516] 0100020003031ef4284fb8ba92650f6247c2c38b791d64da7b2aa3c7819f4fc3... client: Filtered packet: [521] 16030102040100020003031ef4284fb8ba92650f6247c2c38b791d64da7b2aa3... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchBadCiphertext (5 ms) [ RUN ] TlsConnectStreamTls13.EchOuterBinding Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020304 handshake old: [512] 0303c7802ef11f69623f3ab6ef4064f3e350ceb09de81538377d0c4b99cf3014... handshake new: [510] 0303c7802ef11f69623f3ab6ef4064f3e350ceb09de81538377d0c4b99cf3014... record old: [516] 010002000303c7802ef11f69623f3ab6ef4064f3e350ceb09de81538377d0c4b... record new: [514] 010001fe0303c7802ef11f69623f3ab6ef4064f3e350ceb09de81538377d0c4b... client: Filtered packet: [519] 1603010202010001fe0303c7802ef11f69623f3ab6ef4064f3e350ceb09de815... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchOuterBinding (4 ms) [ RUN ] TlsConnectStreamTls13.EchBadCiphersuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100034d0020bd131d7999014473fbf94c3e30ac8c0a362e68cc7bade1a8c8... extension new: [147] 490100034d0020bd131d7999014473fbf94c3e30ac8c0a362e68cc7bade1a8c8... handshake old: [512] 030356af4e8fbb3f35edd497f1e1885cc6ecac49be74c24351562c516d6fed01... handshake new: [512] 030356af4e8fbb3f35edd497f1e1885cc6ecac49be74c24351562c516d6fed01... record old: [516] 01000200030356af4e8fbb3f35edd497f1e1885cc6ecac49be74c24351562c51... record new: [516] 01000200030356af4e8fbb3f35edd497f1e1885cc6ecac49be74c24351562c51... client: Filtered packet: [521] 160301020401000200030356af4e8fbb3f35edd497f1e1885cc6ecac49be74c2... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100034d0020b3e2b2989071590b53fe9b231e0093bffb9cc365c6098930c3... extension new: [147] 0001004c4d0020b3e2b2989071590b53fe9b231e0093bffb9cc365c6098930c3... handshake old: [512] 030304f97a3f69abe99d097821864d2de2db1fb6578d2c8a393edd3721965b16... handshake new: [512] 030304f97a3f69abe99d097821864d2de2db1fb6578d2c8a393edd3721965b16... record old: [516] 01000200030304f97a3f69abe99d097821864d2de2db1fb6578d2c8a393edd37... record new: [516] 01000200030304f97a3f69abe99d097821864d2de2db1fb6578d2c8a393edd37... client: Filtered packet: [521] 160301020401000200030304f97a3f69abe99d097821864d2de2db1fb6578d2c... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchBadCiphersuite (9 ms) [ RUN ] TlsConnectStreamTls13.EchToTls12Server Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.EchToTls12Server (4 ms) [ RUN ] TlsConnectStreamTls13.NoEchFromTls12Client Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.NoEchFromTls12Client (3 ms) [ RUN ] TlsConnectStreamTls13.EchOuterWith12Max Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020303 handshake old: [512] 0303b3f4b6df301bcc6d7e889fc25b19be73ce7d642f563cf14358733c3cc194... handshake new: [510] 0303b3f4b6df301bcc6d7e889fc25b19be73ce7d642f563cf14358733c3cc194... record old: [516] 010002000303b3f4b6df301bcc6d7e889fc25b19be73ce7d642f563cf1435873... record new: [514] 010001fe0303b3f4b6df301bcc6d7e889fc25b19be73ce7d642f563cf1435873... client: Filtered packet: [519] 1603010202010001fe0303b3f4b6df301bcc6d7e889fc25b19be73ce7d642f56... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchOuterWith12Max (5 ms) [ RUN ] TlsConnectStreamTls13.EchOuterExtensionsInCHOuter Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303baf8b869dd4eead94e64c243120a078f097b52af1d480fadf367c0a07a6e... handshake new: [186] 0303baf8b869dd4eead94e64c243120a078f097b52af1d480fadf367c0a07a6e... record old: [184] 010000b40303baf8b869dd4eead94e64c243120a078f097b52af1d480fadf367... record new: [190] 010000ba0303baf8b869dd4eead94e64c243120a078f097b52af1d480fadf367... client: Filtered packet: [195] 16030100be010000ba0303baf8b869dd4eead94e64c243120a078f097b52af1d... server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchOuterExtensionsInCHOuter (2 ms) [ RUN ] TlsConnectStreamTls13.EchBackendAcceptance Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 030306b597d46100a883e20d330ff8e8e327e8c068044af761e1994a023bfc28... handshake new: [184] 030306b597d46100a883e20d330ff8e8e327e8c068044af761e1994a023bfc28... record old: [184] 010000b4030306b597d46100a883e20d330ff8e8e327e8c068044af761e1994a... record new: [188] 010000b8030306b597d46100a883e20d330ff8e8e327e8c068044af761e1994a... client: Filtered packet: [193] 16030100bc010000b8030306b597d46100a883e20d330ff8e8e327e8c068044a... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.EchBackendAcceptance (4 ms) [ RUN ] TlsConnectStreamTls13.ClientRejectHandshakeCertReq Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [199] 16030300600200005c0303adce2b8fdadfa845365fbeea8a3b1f46d21af3a559... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_REQUEST: SSL received an unexpected Certificate Request handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ClientRejectHandshakeCertReq (3 ms) [ RUN ] TlsConnectStreamTls13.RejectPha Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [199] 16030300600200005c030398b71e51e242c608839e46da0ff47b8414f2ebf62a... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Filtered packet: [27] 17030300166de68252c41d7c3806f18c1ee6f169187f25315767b0 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_REQUEST: SSL received an unexpected Certificate Request handshake message. client: Changing state from CONNECTED to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.RejectPha (4 ms) [----------] 108 tests from TlsConnectStreamTls13 (1606 ms total) [----------] 19 tests from TlsConnectDatagram13 [ RUN ] TlsConnectDatagram13.ZeroRttLateReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttLateReadDtls (22 ms) [ RUN ] TlsConnectDatagram13.ZeroRttLateArrivalDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Send Direct [25] 2df30700148c09f76ace23a24ce85446af3a38ec7406160281 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttLateArrivalDtls (7 ms) [ RUN ] TlsConnectDatagram13.ZeroRttNoCoalesceReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttNoCoalesceReadDtls (8 ms) [ RUN ] TlsConnectDatagram13.ZeroRttShortReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttShortReadDtls (8 ms) [ RUN ] TlsConnectDatagram13.AuthCompleteBeforeFinished Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.AuthCompleteBeforeFinished (54 ms) [ RUN ] TlsConnectDatagram13.SendOutOfOrderAppWithHandshakeKey Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Send Direct [25] 2e622e0014b9f612bada33e93e094cbc5c4b1c58acde86de69 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendOutOfOrderAppWithHandshakeKey (4 ms) [ RUN ] TlsConnectDatagram13.SendOutOfOrderHsNonsenseWithHandshakeKey Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Send Direct [25] 2e3e070014ad48a815277e890c484b0f108e6f70363e4731a6 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendOutOfOrderHsNonsenseWithHandshakeKey (5 ms) [ RUN ] TlsConnectDatagram13.UnderflowSequenceNumber Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.UnderflowSequenceNumber (4 ms) [ RUN ] TlsConnectDatagram13.Dtls13RejectLegacyCookie Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd8fabfc3d8a2b2571b4ae4decafd7ad81de0cc500b10cb81c28675b3cc092... handshake new: [184] fefd8fabfc3d8a2b2571b4ae4decafd7ad81de0cc500b10cb81c28675b3cc092... record old: [193] 010000b500000000000000b5fefd8fabfc3d8a2b2571b4ae4decafd7ad81de0c... record new: [196] 010000b800000000000000b8fefd8fabfc3d8a2b2571b4ae4decafd7ad81de0c... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd8fabfc3d8a... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.Dtls13RejectLegacyCookie (2 ms) [ RUN ] TlsConnectDatagram13.DropClientSecondFlightWithHelloRetry Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DropClientSecondFlightWithHelloRetry (24 ms) [ RUN ] TlsConnectDatagram13.MessageSeq1ClientHello Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record old: [193] 010000b500000000000000b5fefda6bbe44e0c37cd7cb14b02d64cf72fcef0a9... record new: [193] 010000b500010000000000b5fefda6bbe44e0c37cd7cb14b02d64cf72fcef0a9... client: Filtered packet: [206] 16feff000000000000000000c1010000b500010000000000b5fefda6bbe44e0c... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.MessageSeq1ClientHello (2 ms) [ RUN ] TlsConnectDatagram13.AeadLimit Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked record old: [27] 78e419ec62a320e8e6d2c35323ba33b1418327a32af96f6e412c3f record new: [27] 78e419ec62a320e8e6d2c35323ba33b1418327a32af96f6e412c40 client: Filtered packet: [32] 2f0000001b78e419ec62a320e8e6d2c35323ba33b1418327a32af96f6e412c40 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked record old: [27] 608ef10d1ab78a15bb0f690e9de792b86719f557efcb19d063f694 record new: [27] 608ef10d1ab78a15bb0f690e9de792b86719f557efcb19d063f695 client: Filtered packet: [32] 2f0000001b608ef10d1ab78a15bb0f690e9de792b86719f557efcb19d063f695 server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.AeadLimit (4 ms) [ RUN ] TlsConnectDatagram13.ShortHeadersClient Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ShortHeadersClient (4 ms) [ RUN ] TlsConnectDatagram13.ShortHeadersServer Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ShortHeadersServer (4 ms) [ RUN ] TlsConnectDatagram13.DtlsAlternateShortHeader Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [23] 2bbd80dfc9f21d2e88d1028faf62112f5051c8a518304c client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DtlsAlternateShortHeader (4 ms) [ RUN ] TlsConnectDatagram13.ForwardDataDtls Version: DTLS 1.3 [ OK ] TlsConnectDatagram13.ForwardDataDtls (3 ms) [ RUN ] TlsConnectDatagram13.SendSessionTicketDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendSessionTicketDtls (5 ms) [ RUN ] TlsConnectDatagram13.CompatModeDtlsClient Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.CompatModeDtlsClient (4 ms) [ RUN ] TlsConnectDatagram13.CompatModeDtlsServer Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd73af11aea82a6e16bffa8cb59c510f169fe8562ed984dc71e02abcb1ec09... handshake new: [213] fefd73af11aea82a6e16bffa8cb59c510f169fe8562ed984dc71e02abcb1ec09... record old: [193] 010000b500000000000000b5fefd73af11aea82a6e16bffa8cb59c510f169fe8... record new: [225] 010000d500000000000000d5fefd73af11aea82a6e16bffa8cb59c510f169fe8... client: Filtered packet: [238] 16feff000000000000000000e1010000d500000000000000d5fefd73af11aea8... [ OK ] TlsConnectDatagram13.CompatModeDtlsServer (4 ms) [----------] 19 tests from TlsConnectDatagram13 (172 ms total) [----------] 9 tests from AeadTest [ RUN ] AeadTest.AeadBadVersion [ OK ] AeadTest.AeadBadVersion (0 ms) [ RUN ] AeadTest.AeadUnsupportedCipher [ OK ] AeadTest.AeadUnsupportedCipher (0 ms) [ RUN ] AeadTest.AeadOlderCipher [ OK ] AeadTest.AeadOlderCipher (0 ms) [ RUN ] AeadTest.AeadNoLabel [ OK ] AeadTest.AeadNoLabel (0 ms) [ RUN ] AeadTest.AeadLongLabel [ OK ] AeadTest.AeadLongLabel (0 ms) [ RUN ] AeadTest.AeadNoPointer [ OK ] AeadTest.AeadNoPointer (0 ms) [ RUN ] AeadTest.AeadAes128Gcm [ OK ] AeadTest.AeadAes128Gcm (0 ms) [ RUN ] AeadTest.AeadAes256Gcm [ OK ] AeadTest.AeadAes256Gcm (0 ms) [ RUN ] AeadTest.AeadChaCha20Poly1305 [ OK ] AeadTest.AeadChaCha20Poly1305 (0 ms) [----------] 9 tests from AeadTest (0 ms total) [----------] 3 tests from TlsAgentStreamTestClient [ RUN ] TlsAgentStreamTestClient.EncryptedExtensionsInClearTwoPieces client: Changing state from INIT to CONNECTING Process message: [25] 16030400140200005603039cbc149b0e2efa0df3f05c707ae0 Process message: [79] 160304004ad19b3e5a446bdfe5c22864f700c19c08760800130100002e003300... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestClient.EncryptedExtensionsInClearTwoPieces (1 ms) [ RUN ] TlsAgentStreamTestClient.Set0RttOptionThenWrite client: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestClient.Set0RttOptionThenWrite (0 ms) [ RUN ] TlsAgentStreamTestClient.Set0RttOptionThenRead client: Changing state from INIT to CONNECTING Process message: [11] 1703040006414243444546 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestClient.Set0RttOptionThenRead (0 ms) [----------] 3 tests from TlsAgentStreamTestClient (1 ms total) [----------] 3 tests from TlsAgentDgramTestClient [ RUN ] TlsAgentDgramTestClient.EncryptedExtensionsInClearTwoPieces client: Changing state from INIT to CONNECTING Process message: [45] 16030400000000000000000020020000560000000000000014fefd9cbc149b0e... Process message: [103] 1603040000000000000001005a020000560000000014000042446bdfe5c22864... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.EncryptedExtensionsInClearTwoPieces (1 ms) [ RUN ] TlsAgentDgramTestClient.AckWithBogusLengthField client: Changing state from INIT to CONNECTING Process message: [16] 1afefd00000000000000000003000800 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DTLS_ACK: SSL received a malformed DTLS ACK client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.AckWithBogusLengthField (0 ms) [ RUN ] TlsAgentDgramTestClient.AckWithNonEvenLength client: Changing state from INIT to CONNECTING Process message: [16] 1afefd00000000000000000003000100 client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_BAD_SERVER: The client has encountered bad data from the server. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.AckWithNonEvenLength (1 ms) [----------] 3 tests from TlsAgentDgramTestClient (2 ms total) [----------] 5 tests from TlsAgentStreamTestServer [ RUN ] TlsAgentStreamTestServer.Set0RttOptionClientHelloThenRead server: Changing state from INIT to CONNECTING Process message: [216] 16030400d3010000cf03036cb34681c81af9d20597487ca831031c06a862b190... Process message: [216] 17030400064142434445466cb34681c81af9d20597487ca831031c06a862b190... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestServer.Set0RttOptionClientHelloThenRead (5 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1SignAndKEX server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1SignAndKEX (6 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1Sign server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1Sign (4 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1KEX server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1KEX (4 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPss server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPss (4 ms) [----------] 5 tests from TlsAgentStreamTestServer (23 ms total) [----------] 5 tests from TlsCipherOrderTest [ RUN ] TlsCipherOrderTest.CipherOrderGet Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsCipherOrderTest.CipherOrderGet (4 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSet Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] TlsCipherOrderTest.CipherOrderSet (4 ms) [ RUN ] TlsCipherOrderTest.CipherOrderCopySocket Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderCopySocket (2 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSetLower Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderSetLower (2 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSetControls Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderSetControls (2 ms) [----------] 5 tests from TlsCipherOrderTest (14 ms total) [----------] 44 tests from TlsConnectTest [ RUN ] TlsConnectTest.DamageSecretHandleClientFinished Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Damaging HS secret client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectTest.DamageSecretHandleClientFinished (4 ms) [ RUN ] TlsConnectTest.DamageSecretHandleServerFinished Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [95] 160303005a020000560303b3e011f44f05f2ab4643f91b0435eb932e5f0cc4c4... record drop: TLS 1.2 Handshake 2000000000000:[90] 020000560303b3e011f44f05f2ab4643f91b0435eb932e5f0cc4c423e1677da1... server: Filtered packet: [679] 17030302a2039919001fe1544816cabcb7c1551e17c4948e1aa0bb7ff34cfb04... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.DamageSecretHandleServerFinished (4 ms) [ RUN ] TlsConnectTest.GatherEmptyV3Record Version: TLS (no version) client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.GatherEmptyV3Record (4 ms) [ RUN ] TlsConnectTest.GatherExcessiveV3Record Version: TLS (no version) client: Send Direct [5] 1603014801 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 22 server: Handshake failed with error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.GatherExcessiveV3Record (2 ms) [ RUN ] TlsConnectTest.Select12AfterHelloRetryRequest Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.Select12AfterHelloRetryRequest (11 ms) [ RUN ] TlsConnectTest.KeyUpdateClient Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateClient (4 ms) [ RUN ] TlsConnectTest.KeyUpdateClientRequestUpdate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateClientRequestUpdate (4 ms) [ RUN ] TlsConnectTest.KeyUpdateServer Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateServer (4 ms) [ RUN ] TlsConnectTest.KeyUpdateServerRequestUpdate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateServerRequestUpdate (4 ms) [ RUN ] TlsConnectTest.KeyUpdateConsecutiveRequests Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateConsecutiveRequests (4 ms) [ RUN ] TlsConnectTest.KeyUpdateLocalUpdateThenConsecutiveRequests Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateLocalUpdateThenConsecutiveRequests (4 ms) [ RUN ] TlsConnectTest.KeyUpdateMultiple Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateMultiple (4 ms) [ RUN ] TlsConnectTest.KeyUpdateBothRequest Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateBothRequest (4 ms) [ RUN ] TlsConnectTest.KeyUpdateAutomaticOnWrite Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateAutomaticOnWrite (4 ms) [ RUN ] TlsConnectTest.KeyUpdateAutomaticOnRead Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateAutomaticOnRead (4 ms) [ RUN ] TlsConnectTest.ConnectSSLv3 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsConnectTest.ConnectSSLv3 (4 ms) [ RUN ] TlsConnectTest.ConnectSSLv3ClientAuth Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsConnectTest.ConnectSSLv3ClientAuth (4 ms) [ RUN ] TlsConnectTest.OneNRecordSplitting Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.OneNRecordSplitting (4 ms) [ RUN ] TlsConnectTest.HandshakeSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.HandshakeSecrets (4 ms) [ RUN ] TlsConnectTest.ZeroRttSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.ZeroRttSecrets (7 ms) [ RUN ] TlsConnectTest.KeyUpdateSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateSecrets (4 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionTwice Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionTwice (12 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDuplicateNST Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDuplicateNST (9 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDuplicateNSTWithToken Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDuplicateNSTWithToken (9 ms) [ RUN ] TlsConnectTest.SendSessionTicketWithTicketsDisabled Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketWithTicketsDisabled (8 ms) [ RUN ] TlsConnectTest.SendTicketAfterResumption Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendTicketAfterResumption (13 ms) [ RUN ] TlsConnectTest.SendSessionTicketInappropriate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketInappropriate (4 ms) [ RUN ] TlsConnectTest.SendSessionTicketMassiveToken Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketMassiveToken (5 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDowngrade Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDowngrade (9 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionForcedDowngrade Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... handshake new: [92] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... record old: [96] 0200005c030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... record new: [96] 0200005c030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... handshake old: [92] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... handshake new: [92] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... record old: [96] 0200005c030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... record new: [96] 0200005c030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... extension drop: [2] 0304 handshake old: [92] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... handshake new: [86] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... record old: [96] 0200005c030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... record new: [90] 02000056030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... extension drop: [36] 001d0020650f56560e6981e7ad3264b30797bb034a40f3e6cfc4fee033fbf079... handshake old: [86] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... handshake new: [46] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... record old: [90] 02000056030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... record new: [50] 0200002e030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... extension drop: [2] 0000 handshake old: [46] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... handshake new: [40] 030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926b2311bfd... record old: [50] 0200002e030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... record new: [44] 02000028030336e922761f1fbedf9101c1c0bba3d8964c342246fa0ad3740926... server: Filtered packet: [147] 160303002c02000028030336e922761f1fbedf9101c1c0bba3d8964c342246fa... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestTls13ResumptionForcedDowngrade (9 ms) [ RUN ] TlsConnectTest.RenegotiationConfigTls13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.RenegotiationConfigTls13 (4 ms) [ RUN ] TlsConnectTest.Tls13RejectsRehandshakeClient Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.Tls13RejectsRehandshakeClient (4 ms) [ RUN ] TlsConnectTest.Tls13RejectsRehandshakeServer Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.Tls13RejectsRehandshakeServer (3 ms) [ RUN ] TlsConnectTest.EchoTLS13CompatibilitySessionID Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03032e823e17ba0e6ee71b8162c85ab35acb2af5d7d07c50c1c13c380b2939a8... handshake new: [93] 03032e823e17ba0e6ee71b8162c85ab35acb2af5d7d07c50c1c13c380b2939a8... record old: [715] 0200005d03032e823e17ba0e6ee71b8162c85ab35acb2af5d7d07c50c1c13c38... record new: [715] 0200005d03032e823e17ba0e6ee71b8162c85ab35acb2af5d7d07c50c1c13c38... server: Filtered packet: [720] 16030302cb0200005d03032e823e17ba0e6ee71b8162c85ab35acb2af5d7d07c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.EchoTLS13CompatibilitySessionID (4 ms) [ RUN ] TlsConnectTest.TLS13NonCompatModeSessionID Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 0303ed594e57117e1f538f8ae12ce032ed318afb1b08d4896606743faed94149... handshake new: [118] 0303ed594e57117e1f538f8ae12ce032ed318afb1b08d4896606743faed94149... record old: [90] 020000560303ed594e57117e1f538f8ae12ce032ed318afb1b08d4896606743f... record new: [122] 020000760303ed594e57117e1f538f8ae12ce032ed318afb1b08d4896606743f... server: Filtered packet: [806] 160303007a020000760303ed594e57117e1f538f8ae12ce032ed318afb1b08d4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TLS13NonCompatModeSessionID (3 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls11 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03031947086b3239f7b6c1704c1471929aea899b20589307deceda8bae50b74d... handshake new: [187] 03021947086b3239f7b6c1704c1471929aea899b20589307deceda8bae50b74d... record old: [191] 010000bb03031947086b3239f7b6c1704c1471929aea899b20589307deceda8b... record new: [191] 010000bb03021947086b3239f7b6c1704c1471929aea899b20589307deceda8b... client: Filtered packet: [196] 16030100bf010000bb03021947086b3239f7b6c1704c1471929aea899b205893... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls11 (3 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls12 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [5] 0403040303 handshake old: [508] 030393aea1f7bf1b60b16439f41c05528d73e73326e565505f957d9054815177... handshake new: [499] 030393aea1f7bf1b60b16439f41c05528d73e73326e565505f957d9054815177... record old: [512] 010001fc030393aea1f7bf1b60b16439f41c05528d73e73326e565505f957d90... record new: [503] 010001f3030393aea1f7bf1b60b16439f41c05528d73e73326e565505f957d90... client: Filtered packet: [508] 16030101f7010001f3030393aea1f7bf1b60b16439f41c05528d73e73326e565... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls12 (3 ms) [ RUN ] TlsConnectTest.TestDisableDowngradeDetection Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [5] 0403040303 handshake old: [508] 0303e45a4f918511b32e8208f31914115ea327e129895577927ccfce5ad5e98a... handshake new: [499] 0303e45a4f918511b32e8208f31914115ea327e129895577927ccfce5ad5e98a... record old: [512] 010001fc0303e45a4f918511b32e8208f31914115ea327e129895577927ccfce... record new: [503] 010001f30303e45a4f918511b32e8208f31914115ea327e129895577927ccfce... client: Filtered packet: [508] 16030101f7010001f30303e45a4f918511b32e8208f31914115ea327e1298955... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDisableDowngradeDetection (4 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls10 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 03029845e17af405c8a271661d92b40e39e2861e43e8acc8b7670c90d92507d2... handshake new: [117] 03019845e17af405c8a271661d92b40e39e2861e43e8acc8b7670c90d92507d2... record old: [121] 0100007503029845e17af405c8a271661d92b40e39e2861e43e8acc8b7670c90... record new: [121] 0100007503019845e17af405c8a271661d92b40e39e2861e43e8acc8b7670c90... client: Filtered packet: [126] 16030100790100007503019845e17af405c8a271661d92b40e39e2861e43e8ac... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls10 (3 ms) [ RUN ] TlsConnectTest.TestFallbackFromTls12 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestFallbackFromTls12 (3 ms) [ RUN ] TlsConnectTest.DisableFalseStartOnFallback Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.DisableFalseStartOnFallback (3 ms) [ RUN ] TlsConnectTest.TestFallbackFromTls13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestFallbackFromTls13 (3 ms) [ RUN ] TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled Version: TLS (no version) [ OK ] TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled (2 ms) [ RUN ] TlsConnectTest.TlsSupportedVersionsEncoding Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.TlsSupportedVersionsEncoding (4 ms) [----------] 44 tests from TlsConnectTest (216 ms total) [----------] 15 tests from TlsExtensionTest13Stream [ RUN ] TlsExtensionTest13Stream.SignatureAlgorithmsPrecedingGarbage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [66] 0040ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... handshake old: [180] 03039652b8d3744fbe565f9d58114f5d8504fdabd805d8ec8a62d1b5490bb17e... handshake new: [222] 03039652b8d3744fbe565f9d58114f5d8504fdabd805d8ec8a62d1b5490bb17e... record old: [184] 010000b403039652b8d3744fbe565f9d58114f5d8504fdabd805d8ec8a62d1b5... record new: [226] 010000de03039652b8d3744fbe565f9d58114f5d8504fdabd805d8ec8a62d1b5... client: Filtered packet: [231] 16030100e2010000de03039652b8d3744fbe565f9d58114f5d8504fdabd805d8... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.SignatureAlgorithmsPrecedingGarbage (4 ms) [ RUN ] TlsExtensionTest13Stream.DropServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d002054635330b3683e84d28c82ccdc1f3855f0a498e66b884a9f373811ee... handshake old: [86] 030352d9c950b7493ba7627237cbbd0b48893916989d6ec5badf1e51d4985a5a... handshake new: [46] 030352d9c950b7493ba7627237cbbd0b48893916989d6ec5badf1e51d4985a5a... record old: [90] 02000056030352d9c950b7493ba7627237cbbd0b48893916989d6ec5badf1e51... record new: [50] 0200002e030352d9c950b7493ba7627237cbbd0b48893916989d6ec5badf1e51... server: Filtered packet: [734] 16030300320200002e030352d9c950b7493ba7627237cbbd0b48893916989d6e... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.DropServerKeyShare (5 ms) [ RUN ] TlsExtensionTest13Stream.WrongServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [36] 001d00206709f97346a36401b7a85ab988b407389855a33c5383d1fd9fb767df... extension new: [6] 001800020102 handshake old: [86] 0303216a620176f1261d997ae7b6cf80a610fa02910a352ea75aa927dc30dbe2... handshake new: [56] 0303216a620176f1261d997ae7b6cf80a610fa02910a352ea75aa927dc30dbe2... record old: [90] 020000560303216a620176f1261d997ae7b6cf80a610fa02910a352ea75aa927... record new: [60] 020000380303216a620176f1261d997ae7b6cf80a610fa02910a352ea75aa927... server: Filtered packet: [744] 160303003c020000380303216a620176f1261d997ae7b6cf80a610fa02910a35... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_KEY_SHARE: SSL received a malformed Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.WrongServerKeyShare (3 ms) [ RUN ] TlsExtensionTest13Stream.UnknownServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [36] 001d0020be01a6f956e04e007c1b441d27734f7d8c80e17ee602cc5aa57b2351... extension new: [6] ffff00020102 handshake old: [86] 0303b1d1dba1dff11dfa0f417700d32ebbbb7c6ecb65a779aa87ac16891d222b... handshake new: [56] 0303b1d1dba1dff11dfa0f417700d32ebbbb7c6ecb65a779aa87ac16891d222b... record old: [90] 020000560303b1d1dba1dff11dfa0f417700d32ebbbb7c6ecb65a779aa87ac16... record new: [60] 020000380303b1d1dba1dff11dfa0f417700d32ebbbb7c6ecb65a779aa87ac16... server: Filtered packet: [744] 160303003c020000380303b1d1dba1dff11dfa0f417700d32ebbbb7c6ecb65a7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_KEY_SHARE: SSL received a malformed Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.UnknownServerKeyShare (4 ms) [ RUN ] TlsExtensionTest13Stream.AddServerSignatureAlgorithmsOnResumption Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 0303f7a91478309a73c2918384f1648fb417d510f77a83fcd556b41fc2f4e599... handshake new: [96] 0303f7a91478309a73c2918384f1648fb417d510f77a83fcd556b41fc2f4e599... record old: [96] 0200005c0303f7a91478309a73c2918384f1648fb417d510f77a83fcd556b41f... record new: [100] 020000600303f7a91478309a73c2918384f1648fb417d510f77a83fcd556b41f... server: Filtered packet: [203] 1603030064020000600303f7a91478309a73c2918384f1648fb417d510f77a83... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.AddServerSignatureAlgorithmsOnResumption (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeEmptyPskLabel Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b243cb31854ef36a86eb79fa3300000000fc19f13e47d5b7756f03e387... extension new: [43] 00060000b5dabcd300212058e4adb703984aa6fe73603d02863ad85637f626a2... handshake old: [508] 030356a4e34bcb7c64453117b5d91110d62c9dc0e311f680f48f29e383aaf5ce... handshake new: [330] 030356a4e34bcb7c64453117b5d91110d62c9dc0e311f680f48f29e383aaf5ce... record old: [512] 010001fc030356a4e34bcb7c64453117b5d91110d62c9dc0e311f680f48f29e3... record new: [334] 0100014a030356a4e34bcb7c64453117b5d91110d62c9dc0e311f680f48f29e3... client: Filtered packet: [339] 160301014e0100014a030356a4e34bcb7c64453117b5d91110d62c9dc0e311f6... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeEmptyPskLabel (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeIncorrectBinderValue Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b24ad5cca80480bbb1584306bd000000009ef5461a90a8c3bafd007b64... extension new: [221] 00b800b24ad5cca80480bbb1584306bd000000009ef5461a90a8c3bafd007b64... handshake old: [508] 030368c14a2e31661337056a24a76d8b562c9270a9d48e6e02f99f297f5ff8b7... handshake new: [508] 030368c14a2e31661337056a24a76d8b562c9270a9d48e6e02f99f297f5ff8b7... record old: [512] 010001fc030368c14a2e31661337056a24a76d8b562c9270a9d48e6e02f99f29... record new: [512] 010001fc030368c14a2e31661337056a24a76d8b562c9270a9d48e6e02f99f29... client: Filtered packet: [517] 1603010200010001fc030368c14a2e31661337056a24a76d8b562c9270a9d48e... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeIncorrectBinderValue (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeIncorrectBinderLength Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b231817d6d8e326939a863e29f00000000bb1b8f686eac6d21ed924482... extension new: [222] 00b800b231817d6d8e326939a863e29f00000000bb1b8f686eac6d21ed924482... handshake old: [508] 0303fb80f6f112d430b1958fe35af8318ff20274c48dad99e0912d1b988b18b1... handshake new: [509] 0303fb80f6f112d430b1958fe35af8318ff20274c48dad99e0912d1b988b18b1... record old: [512] 010001fc0303fb80f6f112d430b1958fe35af8318ff20274c48dad99e0912d1b... record new: [513] 010001fd0303fb80f6f112d430b1958fe35af8318ff20274c48dad99e0912d1b... client: Filtered packet: [518] 1603010201010001fd0303fb80f6f112d430b1958fe35af8318ff20274c48dad... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeIncorrectBinderLength (6 ms) [ RUN ] TlsExtensionTest13Stream.ResumeBinderTooShort Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2ae638076bfe76d659c5ffcc300000000382f9070ed4d75dc27d60a64... extension new: [220] 00b800b2ae638076bfe76d659c5ffcc300000000382f9070ed4d75dc27d60a64... handshake old: [508] 03033399dfe9cc6eac63c55776310d9f213e669d4c76f016eabfb5a47e6c1467... handshake new: [507] 03033399dfe9cc6eac63c55776310d9f213e669d4c76f016eabfb5a47e6c1467... record old: [512] 010001fc03033399dfe9cc6eac63c55776310d9f213e669d4c76f016eabfb5a4... record new: [511] 010001fb03033399dfe9cc6eac63c55776310d9f213e669d4c76f016eabfb5a4... client: Filtered packet: [516] 16030101ff010001fb03033399dfe9cc6eac63c55776310d9f213e669d4c76f0... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeBinderTooShort (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeTwoPsks Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2a21a0e63ca33744c2c756d2800000000fdd893d6b8cb6ee60234e033... extension new: [438] 017000b2a21a0e63ca33744c2c756d2800000000fdd893d6b8cb6ee60234e033... handshake old: [508] 03034999495b9e2b986d3740d72af3220380691ac4ee3f3199fcd31c239101e8... handshake new: [725] 03034999495b9e2b986d3740d72af3220380691ac4ee3f3199fcd31c239101e8... record old: [512] 010001fc03034999495b9e2b986d3740d72af3220380691ac4ee3f3199fcd31c... record new: [729] 010002d503034999495b9e2b986d3740d72af3220380691ac4ee3f3199fcd31c... client: Filtered packet: [734] 16030102d9010002d503034999495b9e2b986d3740d72af3220380691ac4ee3f... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeTwoPsks (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeTwoIdentitiesOneBinder Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b29f58c0054335982d53e122d000000000ddc7a6fb8aba8f89eef7261b... extension new: [405] 017000b29f58c0054335982d53e122d000000000ddc7a6fb8aba8f89eef7261b... handshake old: [508] 0303506946a920204bb98d20eba67845cc6c272109d09c5877cf7c119de249c7... handshake new: [692] 0303506946a920204bb98d20eba67845cc6c272109d09c5877cf7c119de249c7... record old: [512] 010001fc0303506946a920204bb98d20eba67845cc6c272109d09c5877cf7c11... record new: [696] 010002b40303506946a920204bb98d20eba67845cc6c272109d09c5877cf7c11... client: Filtered packet: [701] 16030102b8010002b40303506946a920204bb98d20eba67845cc6c272109d09c... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeTwoIdentitiesOneBinder (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeOneIdentityTwoBinders Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b210309f79dd7af389336a25c6000000000b5da1b2f8396d62b1a1829c... extension new: [254] 00b800b210309f79dd7af389336a25c6000000000b5da1b2f8396d62b1a1829c... handshake old: [508] 0303a485735ada082818e53629fad9b646b53d95598af8e48bc72a719818f091... handshake new: [541] 0303a485735ada082818e53629fad9b646b53d95598af8e48bc72a719818f091... record old: [512] 010001fc0303a485735ada082818e53629fad9b646b53d95598af8e48bc72a71... record new: [545] 0100021d0303a485735ada082818e53629fad9b646b53d95598af8e48bc72a71... client: Filtered packet: [550] 16030102210100021d0303a485735ada082818e53629fad9b646b53d95598af8... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeOneIdentityTwoBinders (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumePskExtensionNotLast Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [508] 03036f3633706fbbfaf8854eec4397cb4bb189aeed67319c845133d81166a828... handshake new: [512] 03036f3633706fbbfaf8854eec4397cb4bb189aeed67319c845133d81166a828... record old: [512] 010001fc03036f3633706fbbfaf8854eec4397cb4bb189aeed67319c845133d8... record new: [516] 0100020003036f3633706fbbfaf8854eec4397cb4bb189aeed67319c845133d8... client: Filtered packet: [521] 16030102040100020003036f3633706fbbfaf8854eec4397cb4bb189aeed6731... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumePskExtensionNotLast (7 ms) [ RUN ] TlsExtensionTest13Stream.ResumeNoKeModes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [508] 0303ef5b9ee6a266006b87e02fb58d5a3b41bbf33c4d6fa231e8173c9d3fa07f... handshake new: [502] 0303ef5b9ee6a266006b87e02fb58d5a3b41bbf33c4d6fa231e8173c9d3fa07f... record old: [512] 010001fc0303ef5b9ee6a266006b87e02fb58d5a3b41bbf33c4d6fa231e8173c... record new: [506] 010001f60303ef5b9ee6a266006b87e02fb58d5a3b41bbf33c4d6fa231e8173c... client: Filtered packet: [511] 16030101fa010001f60303ef5b9ee6a266006b87e02fb58d5a3b41bbf33c4d6f... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeNoKeModes (6 ms) [ RUN ] TlsExtensionTest13Stream.ResumeBogusKeModes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0101 extension new: [2] 0100 handshake old: [508] 0303086fbad0060d8d171eb515f9e7d4d17d6fba4a16cb1ab66e7cb5f0be5183... handshake new: [508] 0303086fbad0060d8d171eb515f9e7d4d17d6fba4a16cb1ab66e7cb5f0be5183... record old: [512] 010001fc0303086fbad0060d8d171eb515f9e7d4d17d6fba4a16cb1ab66e7cb5... record new: [512] 010001fc0303086fbad0060d8d171eb515f9e7d4d17d6fba4a16cb1ab66e7cb5... client: Filtered packet: [517] 1603010200010001fc0303086fbad0060d8d171eb515f9e7d4d17d6fba4a16cb... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeBogusKeModes (8 ms) [----------] 15 tests from TlsExtensionTest13Stream (92 ms total) [----------] 7 tests from GatherV2ClientHelloTest [ RUN ] GatherV2ClientHelloTest.GatherV2RecordLongHeader Version: TLS (no version) client: Send Direct [5] 0002000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordLongHeader (3 ms) [ RUN ] GatherV2ClientHelloTest.GatherV2RecordLongHeader2 Version: TLS (no version) client: Send Direct [5] 0001000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordLongHeader2 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordLongHeader Version: TLS (no version) client: Send Direct [5] 0000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordLongHeader (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherV2RecordShortHeader Version: TLS (no version) client: Send Direct [5] 8003000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordShortHeader (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader2 Version: TLS (no version) client: Send Direct [5] 8002000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader2 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader3 Version: TLS (no version) client: Send Direct [5] 8001000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader3 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader Version: TLS (no version) client: Send Direct [5] 8000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader (2 ms) [----------] 7 tests from GatherV2ClientHelloTest (16 ms total) [----------] 1 test from MiscTest [ RUN ] MiscTest.NonExistentExperimentalAPI [ OK ] MiscTest.NonExistentExperimentalAPI (0 ms) [----------] 1 test from MiscTest (0 ms total) [----------] 2 tests from RecordSizeDefaultsTest [ RUN ] RecordSizeDefaultsTest.RecordSizeBadValues [ OK ] RecordSizeDefaultsTest.RecordSizeBadValues (0 ms) [ RUN ] RecordSizeDefaultsTest.RecordSizeGetValue [ OK ] RecordSizeDefaultsTest.RecordSizeGetValue (0 ms) [----------] 2 tests from RecordSizeDefaultsTest (0 ms total) [----------] 11 tests from Tls13CompatTest [ RUN ] Tls13CompatTest.Disabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.Disabled (4 ms) [ RUN ] Tls13CompatTest.Enabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.Enabled (4 ms) [ RUN ] Tls13CompatTest.EnabledZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledZeroRtt (7 ms) [ RUN ] Tls13CompatTest.EnabledHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledHrr (18 ms) [ RUN ] Tls13CompatTest.EnabledStatelessHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledStatelessHrr (20 ms) [ RUN ] Tls13CompatTest.EnabledHrrZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledHrrZeroRtt (21 ms) [ RUN ] Tls13CompatTest.EnabledAcceptedEch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledAcceptedEch (5 ms) [ RUN ] Tls13CompatTest.EnabledRejectedEch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.EnabledRejectedEch (4 ms) [ RUN ] Tls13CompatTest.ChangeCipherSpecAfterClientHelloTwice Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [6] 140303000101 client: Send Direct [6] 140303000101 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. server: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.ChangeCipherSpecAfterClientHelloTwice (4 ms) [ RUN ] Tls13CompatTest.ChangeCipherSpecAfterServerHelloTwice Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [32] a2ccc6f446bb5eb0f815738b648120e3c3d70cd76e8fbddd8a5fd29fe9b0a115 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [621] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [776] 160303007a0200007603032e885db294f9bfb927e45da27dc05f8755e5206c60... server: Send Direct [6] 140303000101 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. client: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.ChangeCipherSpecAfterServerHelloTwice (3 ms) [ RUN ] Tls13CompatTest.ConnectWith12ThenAttemptToResume13CompatMode Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.ConnectWith12ThenAttemptToResume13CompatMode (7 ms) [----------] 11 tests from Tls13CompatTest (97 ms total) [----------] 3 tests from SSLv2ClientHelloTestF [ RUN ] SSLv2ClientHelloTestF.Connect13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030400030000001000c02ff7ac5ee9568bb56fae3536b353761705 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] SSLv2ClientHelloTestF.Connect13 (2 ms) [ RUN ] SSLv2ClientHelloTestF.FallbackSCSV Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f01030200060000001000003300560045191623cfe0b5fb1f1ff0e59d6bab... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] SSLv2ClientHelloTestF.FallbackSCSV (8 ms) [ RUN ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103020006000000100000330056007a0f2393df4552f323cd56857388d6... server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV (2 ms) [----------] 3 tests from SSLv2ClientHelloTestF (12 ms total) [----------] 3 tests from DtlsConnectTest [ RUN ] DtlsConnectTest.TestDtlsVersion11 Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefd16a1db5ce41a5801245dd5d0d7c6dc64462114c65a13825e42a62e2a497b... handshake new: [184] fefe16a1db5ce41a5801245dd5d0d7c6dc64462114c65a13825e42a62e2a497b... record old: [196] 010000b800000000000000b8fefd16a1db5ce41a5801245dd5d0d7c6dc644621... record new: [196] 010000b800000000000000b8fefe16a1db5ce41a5801245dd5d0d7c6dc644621... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefe16a1db5ce4... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] DtlsConnectTest.TestDtlsVersion11 (3 ms) [ RUN ] DtlsConnectTest.DtlsSupportedVersionsEncoding Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DtlsConnectTest.DtlsSupportedVersionsEncoding (4 ms) [ RUN ] DtlsConnectTest.Dtls13VersionWorkaround Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DtlsConnectTest.Dtls13VersionWorkaround (4 ms) [----------] 3 tests from DtlsConnectTest (11 ms total) [----------] 3 tests from Tls13NoSupportedVersions [ RUN ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer12 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03036cf9658ae1aa266746756263a95ba0a8c59874a9f92917ccbd64f1c8bf76... handshake new: [187] 03046cf9658ae1aa266746756263a95ba0a8c59874a9f92917ccbd64f1c8bf76... record old: [191] 010000bb03036cf9658ae1aa266746756263a95ba0a8c59874a9f92917ccbd64... record new: [191] 010000bb03046cf9658ae1aa266746756263a95ba0a8c59874a9f92917ccbd64... client: Filtered packet: [196] 16030100bf010000bb03046cf9658ae1aa266746756263a95ba0a8c59874a9f9... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer12 (3 ms) [ RUN ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer13 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03037288f6ad68e7480b1b5cef8692a3862394333f85602e2bea6560f8997f1e... handshake new: [187] 03047288f6ad68e7480b1b5cef8692a3862394333f85602e2bea6560f8997f1e... record old: [191] 010000bb03037288f6ad68e7480b1b5cef8692a3862394333f85602e2bea6560... record new: [191] 010000bb03047288f6ad68e7480b1b5cef8692a3862394333f85602e2bea6560... client: Filtered packet: [196] 16030100bf010000bb03047288f6ad68e7480b1b5cef8692a3862394333f8560... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer13 (4 ms) [ RUN ] Tls13NoSupportedVersions.Tls14ClientHelloWithoutSupportedVersionsServer13 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03039cc35073c1220e13b85d709c909525474c2d5b3883a06b86a818559b50e3... handshake new: [187] 03059cc35073c1220e13b85d709c909525474c2d5b3883a06b86a818559b50e3... record old: [191] 010000bb03039cc35073c1220e13b85d709c909525474c2d5b3883a06b86a818... record new: [191] 010000bb03059cc35073c1220e13b85d709c909525474c2d5b3883a06b86a818... client: Filtered packet: [196] 16030100bf010000bb03059cc35073c1220e13b85d709c909525474c2d5b3883... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls14ClientHelloWithoutSupportedVersionsServer13 (3 ms) [----------] 3 tests from Tls13NoSupportedVersions (10 ms total) [----------] 16 tests from TlsConnectStreamTls13Ech [ RUN ] TlsConnectStreamTls13Ech.EchFixedConfig Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchFixedConfig (5 ms) [ RUN ] TlsConnectStreamTls13Ech.EchOuterExtensionsReferencesMissing Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 160304020401000200030341a6813ccf3eefc2deb9c78f7627715ae343f5236e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchOuterExtensionsReferencesMissing (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchVersion12Inner Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 1603040204010002000303baf30ea25e5056b659a4d55233922c4ee261a04e6d... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchVersion12Inner (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchVersion12InnerSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 16030402040100020003036c4a7f6f6b5479a5c1f769c7b04c082ba40b514522... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchVersion12InnerSupportedVersions (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchInnerMissing Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 1603040204010002000303912d293136b843248ffeecdde6ef0d5bc5d0adb4d3... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_MISSING_ESNI_EXTENSION: SSL did not receive an ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchInnerMissing (3 ms) [ RUN ] TlsConnectStreamTls13Ech.InnerWithEchAndEchIsInner Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [521] 1603040204010002000303b690bc4090ecfd7ad167de639b1d1ea7682588ffef... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.InnerWithEchAndEchIsInner (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchConfigsTrialDecrypt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchConfigsTrialDecrypt (5 ms) [ RUN ] TlsConnectStreamTls13Ech.EchAcceptBasic Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchAcceptBasic (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchRejectWithHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Fatal alert received: 121 server: Handshake failed with error SSL_ERROR_ECH_REQUIRED_ALERT: SSL peer reported ECH required. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13Ech.EchRejectWithHrr (8 ms) [ RUN ] TlsConnectStreamTls13Ech.EchShortClientEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100014d00202feefc48a4ee77f1968b646764c9050b32d42037dfa589d85a... extension new: [1] 00 handshake old: [512] 0303309d61a93fcc72737fc1915d3696b5ece3c4a3718a88dcd4d6cb6c637d42... handshake new: [366] 0303309d61a93fcc72737fc1915d3696b5ece3c4a3718a88dcd4d6cb6c637d42... record old: [516] 010002000303309d61a93fcc72737fc1915d3696b5ece3c4a3718a88dcd4d6cb... record new: [370] 0100016e0303309d61a93fcc72737fc1915d3696b5ece3c4a3718a88dcd4d6cb... client: Filtered packet: [375] 16030101720100016e0303309d61a93fcc72737fc1915d3696b5ece3c4a3718a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchShortClientEncryptedCH (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchLongClientEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [147] 000100014d002039f339272902ec84ce0bb61410e7c2c0757968d59ad4cc4db1... extension new: [853] 0000000000000000000000000000000000000000000000000000000000000000... handshake old: [512] 030307ceddc898565d6dcea0cbd3c8aba77f77975ec13994bfe3c46f6bba6dac... handshake new: [1218] 030307ceddc898565d6dcea0cbd3c8aba77f77975ec13994bfe3c46f6bba6dac... record old: [516] 01000200030307ceddc898565d6dcea0cbd3c8aba77f77975ec13994bfe3c46f... record new: [1222] 010004c2030307ceddc898565d6dcea0cbd3c8aba77f77975ec13994bfe3c46f... client: Filtered packet: [1227] 16030104c6010004c2030307ceddc898565d6dcea0cbd3c8aba77f77975ec139... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_EXTENSION: SSL received a malformed ESNI extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchLongClientEncryptedCH (3 ms) [ RUN ] TlsConnectStreamTls13Ech.EchShortServerEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [66] 0040fe0a003c4d002000201e375d6411743e220a5618ae57002461b5d65a8dee... extension new: [1] 00 handshake old: [106] 0068fe0a00420040fe0a003c4d002000201e375d6411743e220a5618ae570024... handshake new: [41] 0027fe0a000100000a00140012001d0017001800190100010101020103010400... record old: [727] 0800006a0068fe0a00420040fe0a003c4d002000201e375d6411743e220a5618... record new: [662] 080000290027fe0a000100000a00140012001d00170018001901000101010201... server: Filtered packet: [779] 160303005a020000560303b314b258fb1b5bae1d700e725fbdc5f1f387b46965... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_KEYS: SSL received a malformed ESNI keys structure client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchShortServerEncryptedCH (5 ms) [ RUN ] TlsConnectStreamTls13Ech.EchLongServerEncryptedCH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [66] 0040fe0a003c4d0020002018c4ac7ece9c917bcc4ddc11d88b713ce22e8523d3... extension new: [934] 0000000000000000000000000000000000000000000000000000000000000000... handshake old: [106] 0068fe0a00420040fe0a003c4d0020002018c4ac7ece9c917bcc4ddc11d88b71... handshake new: [974] 03ccfe0a03a60000000000000000000000000000000000000000000000000000... record old: [727] 0800006a0068fe0a00420040fe0a003c4d0020002018c4ac7ece9c917bcc4ddc... record new: [1595] 080003ce03ccfe0a03a600000000000000000000000000000000000000000000... server: Filtered packet: [1712] 160303005a020000560303814e6494a82ca7c2bf42f406e523380145a4a56395... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_ESNI_KEYS: SSL received a malformed ESNI keys structure client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchLongServerEncryptedCH (5 ms) [ RUN ] TlsConnectStreamTls13Ech.EchInsecureFallbackNoRetries Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13Ech.EchInsecureFallbackNoRetries (4 ms) [ RUN ] TlsConnectStreamTls13Ech.EchMismatchHpkeCiphersRetry Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITH_ECH: TLS ECH was rejected, but verification succeeded and compatible retry_configs are available. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchMismatchHpkeCiphersRetry (9 ms) [ RUN ] TlsConnectStreamTls13Ech.EchMismatchKeysRetry Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITH_ECH: TLS ECH was rejected, but verification succeeded and compatible retry_configs are available. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13Ech.EchMismatchKeysRetry (9 ms) [----------] 16 tests from TlsConnectStreamTls13Ech (75 ms total) [----------] 1 test from DCDelegation [ RUN ] DCDelegation.DCDelegations [ OK ] DCDelegation.DCDelegations (4 ms) [----------] 1 test from DCDelegation (4 ms total) [----------] 60 tests from BloomFilterConfigurations/BloomFilterTest [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/6 (1 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/9 (0 ms) [----------] 60 tests from BloomFilterConfigurations/BloomFilterTest (1 ms total) [----------] 56 tests from VariousSizes/SelfEncryptTestVariable [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/0 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/1 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/2 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/3 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/4 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/5 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/6 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/0 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/1 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/2 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/3 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/4 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/5 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/6 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/4 (1 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/5 (1 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/6 (0 ms) [----------] 56 tests from VariousSizes/SelfEncryptTestVariable (2 ms total) [----------] 244 tests from Version13Only/TlsConnectTls13 [ RUN ] Version13Only/TlsConnectTls13.ZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRtt/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRtt/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_TOO_MUCH_EARLY_DATA: SSL received more early data than permitted. server: Changing state from CONNECTING to ERROR client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOrdering/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Drop packet client: Send Direct [135] 17030300147b68f4bb4daced1ab0bd274557deb9f6368a6dca1703030015a419... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Drop packet client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOrdering/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOrdering/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Drop packet client: Send Direct [151] 2db87e0014dc62d47a5e05f9a330d67b397cc1892fb081870e2db4ed001d5686... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Drop packet client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOrdering/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete SEC_ERROR_REVOKED_CERTIFICATE client: Fatal alert sent: 44 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 44 server: Handshake failed with error SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete SEC_ERROR_REVOKED_CERTIFICATE client: Fatal alert sent: 44 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 44 server: Handshake failed with error SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthRequiredRejected/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/0 Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/1 Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureScheme/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/0 Version: TLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/1 Version: DTLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1SignatureSchemeOnly/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/0 Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/1 Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ClientAuthPkcs1AndEcdsaScheme/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/0 (1 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [180] 0303768cc2b5008e5dedf518127b8a7e3cddc10af6367c58477cdea1cd21582f... handshake new: [152] 0303768cc2b5008e5dedf518127b8a7e3cddc10af6367c58477cdea1cd21582f... record old: [184] 010000b40303768cc2b5008e5dedf518127b8a7e3cddc10af6367c58477cdea1... record new: [156] 010000980303768cc2b5008e5dedf518127b8a7e3cddc10af6367c58477cdea1... client: Filtered packet: [161] 160301009c010000980303768cc2b5008e5dedf518127b8a7e3cddc10af6367c... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [181] fefd75cc3a56a6dc722a581e91d7185481a3f981223122362f8d4bef3f3a0f9c... handshake new: [153] fefd75cc3a56a6dc722a581e91d7185481a3f981223122362f8d4bef3f3a0f9c... record old: [193] 010000b500000000000000b5fefd75cc3a56a6dc722a581e91d7185481a3f981... record new: [165] 010000990000000000000099fefd75cc3a56a6dc722a581e91d7185481a3f981... client: Filtered packet: [178] 16feff000000000000000000a5010000990000000000000099fefd75cc3a56a6... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008023a0aff0ca50c90c6dce066fafc44ae2f9894580abef14ec91f7fc1e... handshake new: [132] 0000008023a0aff0ca50c90c6dce066fafc44ae2f9894580abef14ec91f7fc1e... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a020000560303984be7cdc4e1ed936af5174b367ec6ccd8f763b23d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400804c340d3c76297bd0124f06537e8497142875ab586e5ff76d975e025c... handshake new: [132] 000000804c340d3c76297bd0124f06537e8497142875ab586e5ff76d975e025c... record old: [144] 0f0000840003000000000084080400804c340d3c76297bd0124f06537e849714... record new: [144] 0f0000840003000000000084000000804c340d3c76297bd0124f06537e849714... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefdf5d160c432... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008035a1c6eb555632239e0c488dfe235e6c818ec6e67fa2a790189e095b... handshake new: [132] 0403008035a1c6eb555632239e0c488dfe235e6c818ec6e67fa2a790189e095b... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a020000560303449dac11b1f12c51bf73517b9681bbf14551fdd2c6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08040080a662310c3f8fb67ce237cf6fc9ded779301c39b03b473a827235e92c... handshake new: [132] 04030080a662310c3f8fb67ce237cf6fc9ded779301c39b03b473a827235e92c... record old: [144] 0f000084000300000000008408040080a662310c3f8fb67ce237cf6fc9ded779... record new: [144] 0f000084000300000000008404030080a662310c3f8fb67ce237cf6fc9ded779... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefd7bc9acfbbf... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete no error client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete no error client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/0 Version: TLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/1 Version: DTLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DamageServerSignature/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400806cbe90e7841773265cdc3f75d6dbeda29c4a8b982797411a92ca3497... handshake new: [132] 080400806cbe90e7841773265cdc3f75d6dbeda29c4a8b982797411a92ca3497... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a020000560303de5839b29cf0abed583570eb47e26c13482f4919df... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DamageServerSignature/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DamageServerSignature/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400803a3fedad1b28a8412cb3e276fd79fba3a44e599d926931c15c5d5f30... handshake new: [132] 080400803a3fedad1b28a8412cb3e276fd79fba3a44e599d926931c15c5d5f30... record old: [144] 0f0000840003000000000084080400803a3fedad1b28a8412cb3e276fd79fba3... record new: [144] 0f0000840003000000000084080400803a3fedad1b28a8412cb3e276fd79fba3... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefdf0c8bb4fd1... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DamageServerSignature/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeFfdhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeFfdhe/0 (16 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeFfdhe/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeFfdhe/1 (16 ms) [ RUN ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [180] 030333d40b15b82ae55b0634cdcc934067300fb7e9aed559f676bf4af3f64421... handshake new: [156] 030333d40b15b82ae55b0634cdcc934067300fb7e9aed559f676bf4af3f64421... record old: [184] 010000b4030333d40b15b82ae55b0634cdcc934067300fb7e9aed559f676bf4a... record new: [160] 0100009c030333d40b15b82ae55b0634cdcc934067300fb7e9aed559f676bf4a... client: Filtered packet: [165] 16030100a00100009c030333d40b15b82ae55b0634cdcc934067300fb7e9aed5... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [181] fefd6bc1ec47bd75adaf672956a6ba07e302b06e3d056bd9723ddee25d3e1f37... handshake new: [157] fefd6bc1ec47bd75adaf672956a6ba07e302b06e3d056bd9723ddee25d3e1f37... record old: [193] 010000b500000000000000b5fefd6bc1ec47bd75adaf672956a6ba07e302b06e... record new: [169] 0100009d000000000000009dfefd6bc1ec47bd75adaf672956a6ba07e302b06e... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefd6bc1ec47bd... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.UseLameGroup/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UseLameGroup/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.UseLameGroup/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UseLameGroup/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterSha384/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterSha384/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterSha384/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterSha384/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporter/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporter/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporter/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporter/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [46] 00090003666f6f00000000002120dc542bb1359a1bf7b5cd110e3de8d0b3bd98... extension new: [46] 00090003666f6f0000000000212023542bb1359a1bf7b5cd110e3de8d0b3bd98... handshake old: [230] 03034f54a0a6664b1366fbb975e0165dc36ee883b35a89004a27c94bec6a47f9... handshake new: [230] 03034f54a0a6664b1366fbb975e0165dc36ee883b35a89004a27c94bec6a47f9... record old: [234] 010000e603034f54a0a6664b1366fbb975e0165dc36ee883b35a89004a27c94b... record new: [234] 010000e603034f54a0a6664b1366fbb975e0165dc36ee883b35a89004a27c94b... client: Filtered packet: [239] 16030100ea010000e603034f54a0a6664b1366fbb975e0165dc36ee883b35a89... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [46] 00090003666f6f00000000002120183c459bb501ae2d6160dcceed9956fbd241... extension new: [46] 00090003666f6f00000000002120e73c459bb501ae2d6160dcceed9956fbd241... handshake old: [231] fefdf7608c28f9d631ded7b1f6de31cc5bcc842842a027208b4610f54046efe3... handshake new: [231] fefdf7608c28f9d631ded7b1f6de31cc5bcc842842a027208b4610f54046efe3... record old: [243] 010000e700000000000000e7fefdf7608c28f9d631ded7b1f6de31cc5bcc8428... record new: [243] 010000e700000000000000e7fefdf7608c28f9d631ded7b1f6de31cc5bcc8428... client: Filtered packet: [256] 16feff000000000000000000f3010000e700000000000000e7fefdf7608c28f9... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/0 (22 ms) [ RUN ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/1 (21 ms) [ RUN ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/0 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [486] 16feff000000000000000101d9010001cd00010000000001cdfefd0b337ad911... server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 006500180061049d81a5b3f69536651f81937f9b846bae8203b780b639b01e5b... extension new: [38] 0024001d0020faee88a4b9bcf159be9c98618d1e29902328471643d232015cc4... handshake old: [508] 03034fd08085cfe4d9954c82cb5a82ac88b683be04fc34db5d55445b97800cf8... handshake new: [443] 03034fd08085cfe4d9954c82cb5a82ac88b683be04fc34db5d55445b97800cf8... record old: [512] 010001fc03034fd08085cfe4d9954c82cb5a82ac88b683be04fc34db5d55445b... record new: [447] 010001bb03034fd08085cfe4d9954c82cb5a82ac88b683be04fc34db5d55445b... client: Filtered packet: [452] 16030301bf010001bb03034fd08085cfe4d9954c82cb5a82ac88b683be04fc34... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 006500180061048629b81a1dda9b15fbc74dc3c415bc582fc3f42fa48f143780... extension new: [38] 0024001d00201c3569538dde25ba35d30838baf3486f36ac15784acb3e80eb73... handshake old: [366] fefd4593773904ae2b119c1a946065dfab39af72ce16e7abdc0312655c58f34b... handshake new: [301] fefd4593773904ae2b119c1a946065dfab39af72ce16e7abdc0312655c58f34b... record old: [378] 0100016e000100000000016efefd4593773904ae2b119c1a946065dfab39af72... record new: [313] 0100012d000100000000012dfefd4593773904ae2b119c1a946065dfab39af72... client: Filtered packet: [326] 16fefd000000000000000101390100012d000100000000012dfefd4593773904... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithTwoShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 006500180061040699b3b5b312a2188f8f786d77253b43e0f7dcd9234c80372d... extension new: [107] 0069001d00204a5fcedf94ccbf5ff2a1360ba3d5a41fc5408898ad8b6467ba49... handshake old: [508] 0303e7309a56307515820f264c887196d8ada8739c8f34e752408769b7ad37ff... handshake new: [512] 0303e7309a56307515820f264c887196d8ada8739c8f34e752408769b7ad37ff... record old: [512] 010001fc0303e7309a56307515820f264c887196d8ada8739c8f34e752408769... record new: [516] 010002000303e7309a56307515820f264c887196d8ada8739c8f34e752408769... client: Filtered packet: [521] 1603030204010002000303e7309a56307515820f264c887196d8ada8739c8f34... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithTwoShares/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithTwoShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 006500180061045dc458cfde90e4aef5bf06a647663775d6fe0f63b33ecb2219... extension new: [107] 0069001d0020e57544f02e1cd57dabcaf773e895a8745bc3f78f9cbcd325e6f7... handshake old: [366] fefd5098e72903376763c1dfd46f1340dc293062d4502d99f85996a8ebae61d1... handshake new: [370] fefd5098e72903376763c1dfd46f1340dc293062d4502d99f85996a8ebae61d1... record old: [378] 0100016e000100000000016efefd5098e72903376763c1dfd46f1340dc293062... record new: [382] 010001720001000000000172fefd5098e72903376763c1dfd46f1340dc293062... client: Filtered packet: [395] 16fefd0000000000000001017e010001720001000000000172fefd5098e72903... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithTwoShares/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAccept/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAccept/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAccept/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAccept/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/0 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/1 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackFail/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_APPLICATION_ABORT: SSL handshake aborted by the application. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackFail/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackFail/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_APPLICATION_ABORT: SSL handshake aborted by the application. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackFail/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetry/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetry/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetry/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetry/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/0 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/1 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/0 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/1 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStateless/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryStateless/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStateless/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryStateless/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [116] 0072647472cc7dfb7c363d7c56f60000000044312e07053328581570b63e08b4... handshake old: [508] 03039cc65551702bd65e25c019a74553aecf5171ae279b76bc51f056f8bf2844... handshake new: [388] 03039cc65551702bd65e25c019a74553aecf5171ae279b76bc51f056f8bf2844... record old: [512] 010001fc03039cc65551702bd65e25c019a74553aecf5171ae279b76bc51f056... record new: [392] 0100018403039cc65551702bd65e25c019a74553aecf5171ae279b76bc51f056... client: Filtered packet: [397] 16030301880100018403039cc65551702bd65e25c019a74553aecf5171ae279b... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [116] 0072524acf25c5f0a3835ceb25ee000000009363fe10b4e49cdae794b3eb2d18... handshake old: [301] fefd4df797499642b2305fcc6cfb1063ab5aa2d944bf3de4fdafa46a0263a153... handshake new: [181] fefd4df797499642b2305fcc6cfb1063ab5aa2d944bf3de4fdafa46a0263a153... record old: [313] 0100012d000100000000012dfefd4df797499642b2305fcc6cfb1063ab5aa2d9... record new: [193] 010000b500010000000000b5fefd4df797499642b2305fcc6cfb1063ab5aa2d9... client: Filtered packet: [206] 16fefd000000000000000000c1010000b500010000000000b5fefd4df7974996... extension drop: [116] 0072524acf25c5f0a3835ceb25ee000000009363fe10b4e49cdae794b3eb2d18... handshake old: [301] fefd4df797499642b2305fcc6cfb1063ab5aa2d944bf3de4fdafa46a0263a153... handshake new: [181] fefd4df797499642b2305fcc6cfb1063ab5aa2d944bf3de4fdafa46a0263a153... record old: [313] 0100012d000100000000012dfefd4df797499642b2305fcc6cfb1063ab5aa2d9... record new: [193] 010000b500010000000000b5fefd4df797499642b2305fcc6cfb1063ab5aa2d9... client: Filtered packet: [206] 16fefd000000000000000200c1010000b500010000000000b5fefd4df7974996... extension drop: [116] 0072524acf25c5f0a3835ceb25ee000000009363fe10b4e49cdae794b3eb2d18... handshake old: [301] fefd4df797499642b2305fcc6cfb1063ab5aa2d944bf3de4fdafa46a0263a153... handshake new: [181] fefd4df797499642b2305fcc6cfb1063ab5aa2d944bf3de4fdafa46a0263a153... record old: [313] 0100012d000100000000012dfefd4df797499642b2305fcc6cfb1063ab5aa2d9... record new: [193] 010000b500010000000000b5fefd4df797499642b2305fcc6cfb1063ab5aa2d9... client: Filtered packet: [206] 16fefd000000000000000300c1010000b500010000000000b5fefd4df7974996... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/1 (156 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieEmpty/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 0072f8017a646dc26f725e7f440400000000764fb83176e6f99926cc323a9bd7... extension new: [2] 0000 handshake old: [508] 0303dd88466465523b00a3f1e261b11cdc45c8168d2b4abda90f7466d3174aea... handshake new: [394] 0303dd88466465523b00a3f1e261b11cdc45c8168d2b4abda90f7466d3174aea... record old: [512] 010001fc0303dd88466465523b00a3f1e261b11cdc45c8168d2b4abda90f7466... record new: [398] 0100018a0303dd88466465523b00a3f1e261b11cdc45c8168d2b4abda90f7466... client: Filtered packet: [403] 160303018e0100018a0303dd88466465523b00a3f1e261b11cdc45c8168d2b4a... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieEmpty/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieEmpty/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 0072dd2b21a42831f08d5b2d296e00000000527cc26c0f92f68bc905b8f4f2f6... extension new: [2] 0000 handshake old: [301] fefd4fffed37fa08cbdcbd4d6e8c6742766a9e82e69d4e39a2c8f3da61b04131... handshake new: [187] fefd4fffed37fa08cbdcbd4d6e8c6742766a9e82e69d4e39a2c8f3da61b04131... record old: [313] 0100012d000100000000012dfefd4fffed37fa08cbdcbd4d6e8c6742766a9e82... record new: [199] 010000bb00010000000000bbfefd4fffed37fa08cbdcbd4d6e8c6742766a9e82... client: Filtered packet: [212] 16fefd000000000000000000c7010000bb00010000000000bbfefd4fffed37fa... extension old: [116] 0072dd2b21a42831f08d5b2d296e00000000527cc26c0f92f68bc905b8f4f2f6... extension new: [2] 0000 handshake old: [301] fefd4fffed37fa08cbdcbd4d6e8c6742766a9e82e69d4e39a2c8f3da61b04131... handshake new: [187] fefd4fffed37fa08cbdcbd4d6e8c6742766a9e82e69d4e39a2c8f3da61b04131... record old: [313] 0100012d000100000000012dfefd4fffed37fa08cbdcbd4d6e8c6742766a9e82... record new: [199] 010000bb00010000000000bbfefd4fffed37fa08cbdcbd4d6e8c6742766a9e82... client: Filtered packet: [212] 16fefd000000000000000200c7010000bb00010000000000bbfefd4fffed37fa... extension old: [116] 0072dd2b21a42831f08d5b2d296e00000000527cc26c0f92f68bc905b8f4f2f6... extension new: [2] 0000 handshake old: [301] fefd4fffed37fa08cbdcbd4d6e8c6742766a9e82e69d4e39a2c8f3da61b04131... handshake new: [187] fefd4fffed37fa08cbdcbd4d6e8c6742766a9e82e69d4e39a2c8f3da61b04131... record old: [313] 0100012d000100000000012dfefd4fffed37fa08cbdcbd4d6e8c6742766a9e82... record new: [199] 010000bb00010000000000bbfefd4fffed37fa08cbdcbd4d6e8c6742766a9e82... client: Filtered packet: [212] 16fefd000000000000000300c7010000bb00010000000000bbfefd4fffed37fa... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieEmpty/1 (157 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 0072cbd444209e08cff2808495440000000085d31cbe50ee1f986030a19e5892... extension new: [118] 0072cbd444209e08cff2808495440000000085d31cbe50ee1f986030a19e5892... handshake old: [508] 0303935c7fbecabb6cae0f7cdc0cd10d4daa841c84b9b27f0888d5d12ca7ba71... handshake new: [510] 0303935c7fbecabb6cae0f7cdc0cd10d4daa841c84b9b27f0888d5d12ca7ba71... record old: [512] 010001fc0303935c7fbecabb6cae0f7cdc0cd10d4daa841c84b9b27f0888d5d1... record new: [514] 010001fe0303935c7fbecabb6cae0f7cdc0cd10d4daa841c84b9b27f0888d5d1... client: Filtered packet: [519] 1603030202010001fe0303935c7fbecabb6cae0f7cdc0cd10d4daa841c84b9b2... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 007258c67a4a7cf1847cb7471b57000000002d76cf1c8b0fabc94b07ee56de07... extension new: [118] 007258c67a4a7cf1847cb7471b57000000002d76cf1c8b0fabc94b07ee56de07... handshake old: [301] fefd3455d897c7d573354390391248cd3f4c3bacdd8394dd960235911104b8fa... handshake new: [303] fefd3455d897c7d573354390391248cd3f4c3bacdd8394dd960235911104b8fa... record old: [313] 0100012d000100000000012dfefd3455d897c7d573354390391248cd3f4c3bac... record new: [315] 0100012f000100000000012ffefd3455d897c7d573354390391248cd3f4c3bac... client: Filtered packet: [328] 16fefd0000000000000000013b0100012f000100000000012ffefd3455d897c7... extension old: [116] 007258c67a4a7cf1847cb7471b57000000002d76cf1c8b0fabc94b07ee56de07... extension new: [118] 007258c67a4a7cf1847cb7471b57000000002d76cf1c8b0fabc94b07ee56de07... handshake old: [301] fefd3455d897c7d573354390391248cd3f4c3bacdd8394dd960235911104b8fa... handshake new: [303] fefd3455d897c7d573354390391248cd3f4c3bacdd8394dd960235911104b8fa... record old: [313] 0100012d000100000000012dfefd3455d897c7d573354390391248cd3f4c3bac... record new: [315] 0100012f000100000000012ffefd3455d897c7d573354390391248cd3f4c3bac... client: Filtered packet: [328] 16fefd0000000000000002013b0100012f000100000000012ffefd3455d897c7... extension old: [116] 007258c67a4a7cf1847cb7471b57000000002d76cf1c8b0fabc94b07ee56de07... extension new: [118] 007258c67a4a7cf1847cb7471b57000000002d76cf1c8b0fabc94b07ee56de07... handshake old: [301] fefd3455d897c7d573354390391248cd3f4c3bacdd8394dd960235911104b8fa... handshake new: [303] fefd3455d897c7d573354390391248cd3f4c3bacdd8394dd960235911104b8fa... record old: [313] 0100012d000100000000012dfefd3455d897c7d573354390391248cd3f4c3bac... record new: [315] 0100012f000100000000012ffefd3455d897c7d573354390391248cd3f4c3bac... client: Filtered packet: [328] 16fefd0000000000000003013b0100012f000100000000012ffefd3455d897c7... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/1 (157 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.CaptureAlertClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 0303495f2373cdf245dc858c2e579657460f1e6f52d07b8d679a18013a5ee4ae... handshake new: [85] 0303495f2373cdf245dc858c2e579657460f1e6f52d07b8d679a18013a5ee4ae... record old: [90] 020000560303495f2373cdf245dc858c2e579657460f1e6f52d07b8d679a1801... record new: [89] 020000550303495f2373cdf245dc858c2e579657460f1e6f52d07b8d679a1801... server: Filtered packet: [773] 1603030059020000550303495f2373cdf245dc858c2e579657460f1e6f52d07b... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.CaptureAlertClient/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.CaptureAlertClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] fefddf0e94c6c654c0be3d01c8634b314200b04eaa9f139b13f685c09304dde2... handshake new: [85] fefddf0e94c6c654c0be3d01c8634b314200b04eaa9f139b13f685c09304dde2... record old: [98] 020000560000000000000056fefddf0e94c6c654c0be3d01c8634b314200b04e... record new: [97] 020000550000000000000055fefddf0e94c6c654c0be3d01c8634b314200b04e... server: Filtered packet: [887] 16fefd00000000000000000061020000550000000000000055fefddf0e94c6c6... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.CaptureAlertClient/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 255 client: Warning alert received: 255 client: Read error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownAlert/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 255 client: Warning alert received: 255 client: Read error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownAlert/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AlertWrongLevel/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 10 client: Warning alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AlertWrongLevel/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.AlertWrongLevel/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 10 client: Warning alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AlertWrongLevel/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownRecord/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Send Direct [5] ff03030000 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownRecord/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownRecord/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Send Direct [5] ff03030000 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownRecord/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [63] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... record new: [64] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... server: Filtered packet: [86] 170303005187578f35102a4ffad973e9d4b4e9931f7967540dadede1b5d3047c... record old: [37] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... record new: [38] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... server: Filtered packet: [60] 170303003750db72e72a74585d244ded150188a88c2148bb2896da3f877a09da... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [63] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... record new: [64] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... server: Filtered packet: [86] 2f632c00513f11d63e4e491543f283a20c8772eeed8e4a0e69e573bfe9f0c381... record old: [37] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... record new: [38] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... server: Filtered packet: [60] 2fc2a90037405ea5eaf6135a97f07f5a41f893bf7879fc6e7b4d35fbe450bba3... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizePlaintextExceed/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [80] 0a7eb9f1e66c5c7ee81612a2ae65e2179b96b7339d5d7566c98426aeebe1307a... record new: [416] 0a7eb9f1e66c5c7ee81612a2ae65e2179b96b7339d5d7566c98426aeebe1307a... server: Filtered packet: [421] 17030301a00a7eb9f1e66c5c7ee81612a2ae65e2179b96b7339d5d7566c98426... record old: [54] 7cdbfe2dd2cc1d174a3f9733c93242267054a630609c7086c4539c1d81bb6c97... record new: [390] 7cdbfe2dd2cc1d174a3f9733c93242267054a630609c7086c4539c1d81bb6c97... server: Filtered packet: [395] 17030301867cdbfe2dd2cc1d174a3f9733c93242267054a630609c7086c4539c... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [80] 5754f0ef18ca14a9873dd1f18ceabf2c04530fd312f7c53d9fd68179ad2507eb... record new: [416] 5754f0ef18ca14a9873dd1f18ceabf2c04530fd312f7c53d9fd68179ad2507eb... server: Filtered packet: [421] 2f000001a05754f0ef18ca14a9873dd1f18ceabf2c04530fd312f7c53d9fd681... record old: [54] 21b078e5ac5dd26c1f13e38203f87f5e3cd190e915c28206075cc8361e6eba83... record new: [390] 21b078e5ac5dd26c1f13e38203f87f5e3cd190e915c28206075cc8361e6eba83... server: Filtered packet: [395] 2f0001018621b078e5ac5dd26c1f13e38203f87f5e3cd190e915c28206075cc8... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeCiphertextExceed/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [90] 02000056030351fbb34f4264c82e78cf553615700c5d580613b17ccb597a128b... max: [80] 53ff74ae173c93bfcdf5a0cdccbe6e1f899aee76d0535793b635d1adf2f93d84... max: [80] 3afdb1af8002ce8e4f6e958d9ef84ac3cfe580454a892ba1273446edf077bbd0... max: [80] fa8bf23e0a70efd6f37f6e10833c55dd1bb95903298cbf2599c4a51fcb2ab1e1... max: [80] e10904779e0270fee6287cec43de4194245bc4d5efddb114211f3d399352e051... max: [80] 24c9add969d46468c7e6c83b12fdc4ea4292042d198a566408fcf8fb63dff6a1... max: [80] 68a9ff79b8d50da6bfe69ae0ef2bcba87f96f861ccc0401485c6562eda5c886f... max: [80] 50653dd816d2b821c99976eff1a637de9afd3491a2e257cbc30974a0794b01b7... max: [80] 51888b134a0dab9a1f0972fe8fb14cf834638ee542aa0384a373ab5083afd514... max: [80] 2754b15640666cbb5ce8d0123d79f4c0f1b3c56875eb656c46b16d80ea1ba5e8... max: [80] 5a031e570c664ddf71416c22d30e1a89bc4d2c2c55094f0edcf5902d42283ca7... max: [44] d39ad018f65cd43f725b55366e12fb062695d98a6af7b488bb4f477befff083e... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 9e964ed390e271ef5ef64ffc5cbc9479c8d9160aa05f356265e08369c1816537... server: Filtered packet: [86] 17030300519e964ed390e271ef5ef64ffc5cbc9479c8d9160aa05f356265e083... max: [54] 935a1b42bd3ac275c509739d1680d82ffa50cde52161faa4657f585eee66f02e... server: Filtered packet: [60] 1703030037935a1b42bd3ac275c509739d1680d82ffa50cde52161faa4657f58... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [98] 020000560000000000000056fefdb218dff80afb3499746cf11d8bfaea793efa... max: [65] 54b5d845865093b23da1c6861ed0fd8971e07a64262a6bf94c8bc40e65b7098e... max: [80] 11ef7a7a108402fb7d105c5a62e004509e3528f65c3afe2c12f322eb4adfd337... max: [80] 6f8c1cb26aa23d0fe807a64c1c74ba88b6efccf0f64d70670db34cdeaacd3343... max: [80] d5f635376a3dd0d6e2a160614f4521d98804e3e914c925b1ea2646732b2e000c... max: [80] 95fd6ee07b96a8369a7764d5930c79e00dd60aa9e41242e44d036da1a6166214... max: [80] 7894d58ede19b22bea828f561a685a36640789ed3e7aa32fe9503d6fe55da381... max: [80] 3013dea016a53f678b1227ff50fc6e368d4eb49e7a9682a85b0d28566424bc57... max: [80] d7579491d717c82d50a345d1f52a32777ea9810ef08a1ecbcf6a90d52035aa09... max: [80] 5c70ad76dd9c5642fad5815241cb1610f76eda0f1458499a7a817f2b9dbc3ed6... max: [62] b996461a9fc613003f6db88f4eb9a8cc3c83ffabdee7d9300cc920d9bc27702c... max: [80] 7543f61b4bdc6b877844a52ca6275d30dca07d994381380f60a2775f0c005351... max: [80] f1b33f64b5fc12c95623eaed93029a32e0b17dc37692091539029c46106b256e... max: [59] ffaa99c955bc04850acd2da9cc2ccd62fbfaebe8e673318787d5bf89fd49737b... max: [61] 82bb7398d608c72b3d321439d5ab050c4c1193914cbe9d5c006a19fec18d4072... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] 65aa7f6b8ff93e32addeb0f538bd293b5a72f8bbf520624c68b09e Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] c56959135dda91819dc2b7394ef0b5f0afcad714b4ded042e7c8bcf6b3fdb896... server: Filtered packet: [86] 2f08d30051c56959135dda91819dc2b7394ef0b5f0afcad714b4ded042e7c8bc... max: [54] 690811736a031f522868ed57211a7ae4ef049eb5eabfd962142f0d0c32b26679... server: Filtered packet: [60] 2fca1a0037690811736a031f522868ed57211a7ae4ef049eb5eabfd962142f0d... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] Version13Only/TlsConnectTls13.RecordSizeExceedPad/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/0 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/1 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCNotConfigured/0 Version: TLS 1.3 [ OK ] Version13Only/TlsConnectTls13.DCNotConfigured/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCNotConfigured/1 Version: DTLS 1.3 [ OK ] Version13Only/TlsConnectTls13.DCNotConfigured/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/0 (14 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/0 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCWeakKey/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 71 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 71 server: Handshake failed with error SSL_ERROR_INSUFFICIENT_SECURITY_ALERT: Server requires ciphers more secure than those supported by client. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCWeakKey/0 (20 ms) [ RUN ] Version13Only/TlsConnectTls13.DCWeakKey/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 71 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 71 server: Handshake failed with error SSL_ERROR_INSUFFICIENT_SECURITY_ALERT: Server requires ciphers more secure than those supported by client. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCWeakKey/1 (21 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [75] 04030047304502210095c0d820d7df82da5fd264106dfaa856911675d7b06e36... handshake new: [75] 05030047304502210095c0d820d7df82da5fd264106dfaa856911675d7b06e36... record old: [689] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [689] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [806] 160303005a0200005603037fc6c89deae5ce7ddaa0f5048e7f9aac2036e28693... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [75] 040300473045022100f8c0f0b30f2dff44e53f15feb772ea6390192f7950cdc1... handshake new: [75] 050300473045022100f8c0f0b30f2dff44e53f15feb772ea6390192f7950cdc1... record old: [87] 0f00004b000300000000004b040300473045022100f8c0f0b30f2dff44e53f15... record new: [87] 0f00004b000300000000004b050300473045022100f8c0f0b30f2dff44e53f15... server: Filtered packet: [918] 16fefd00000000000000000062020000560000000000000056fefd8f6acdb91e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadSignature/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_BAD_SIGNATURE: SSL received a delegated credential with an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadSignature/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadSignature/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_BAD_SIGNATURE: SSL received a delegated credential with an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadSignature/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExpired/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_EXPIRED: SSL received a delegated credential that expired. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExpired/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExpired/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_EXPIRED: SSL received a delegated credential that expired. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExpired/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INAPPROPRIATE_VALIDITY_PERIOD: SSL received a delegated credential with excessive TTL. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INAPPROPRIATE_VALIDITY_PERIOD: SSL received a delegated credential with excessive TTL. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INVALID_KEY_USAGE: SSL received a delegated credential from a certificate with invalid key usage. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INVALID_KEY_USAGE: SSL received a delegated credential from a certificate with invalid key usage. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [74] 0403004630440220262be2462d2eb5e9d0918e558bb92b11fcb00cec907573a9... handshake drop: [32] f1d9179d4df969d31996bba15bad247f0f8c465f805fa1e228e3758ebfb3cf71 record old: [688] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [574] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [691] 160303005a020000560303f95e9532781ffd24027b125693a3858b55d1fa2066... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [74] 040300463044022056b886c5d7522809e360a9a5ac3446a2fbf7634bbf2154df... record drop: DTLS 1.3 <46> 2000000000002:[103] bf69605616aa66bc471ebfb7bb186c075917f0aeec972f1f17ec60a4852c7f59... handshake drop: [32] a447d4854727e3861fecb1cbf0e023baaf839efc03894193389747c35939737e record drop: DTLS 1.3 <46> 2000000000003:[61] f56915d11d8a3fcffc22f4aa8afc313ce29a582e2caef6926d08e12b3d7d1b1e... server: Filtered packet: [744] 16fefd00000000000000000062020000560000000000000056fefdf94093b3d4... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [74] 04030046304402203208e5b993f8fb9a4a639d3b51744484437b2fbaed4d97e7... handshake drop: [32] efda58331738db3244003eccd002c22800a9b8977ddf0d9879e00226b67efd4e record old: [508] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [394] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [511] 160303005a0200005603030475d404f5d6c1721c72289efde74c45696c7fc988... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [75] 040300473045022022f3920b290044dde82c9d06ecac7f2e57a8d9dffb05a6a6... record drop: DTLS 1.3 <46> 2000000000002:[104] f31c467a393e6a50bb2e307e65998969801faa2a3a815d6111e5dae406bf88cf... handshake drop: [32] c766caff6cef87362aa44ffa8b87c1849fbcfe5e300a33a6c671be8e9ce8b5eb record drop: DTLS 1.3 <46> 2000000000003:[61] 16f82fc65f508e956450e15add7c7e0c19a323189da745a919b6a1b6d7931333... server: Filtered packet: [565] 16fefd00000000000000000062020000560000000000000056fefd18eb7f4307... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/1 (9 ms) [----------] 244 tests from Version13Only/TlsConnectTls13 (2026 ms total) [----------] 6 tests from Tls13ZeroRttReplayTest/TlsZeroRttReplayTest [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/0 (10 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/1 (10 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/0 (7 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/1 (6 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/0 (10 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/1 (10 ms) [----------] 6 tests from Tls13ZeroRttReplayTest/TlsZeroRttReplayTest (53 ms total) [----------] 292 tests from GenericStream/TlsConnectGeneric [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/2 Version: TLS 1.1 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/3 Version: TLS 1.0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/0 Version: TLS 1.3 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/1 Version: TLS 1.2 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/2 Version: TLS 1.1 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/3 Version: TLS 1.0 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/0 Version: TLS 1.3 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/1 Version: TLS 1.2 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/2 Version: TLS 1.1 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/3 Version: TLS 1.0 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 Version: TLS 1.3 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 Version: TLS 1.2 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 Version: TLS 1.1 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/3 Version: TLS 1.0 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuth/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthRequestedRejected/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthEcdsa/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/2 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthWithEch/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/0 Version: TLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/1 Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/2 Version: TLS 1.1 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/3 Version: TLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientAuthBigRsa/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (26 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/3 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/3 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/3 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008028bb721f0ec30f52e718e2d6ff37e8e362e6ecbd65ee792f721f6d5a... handshake new: [132] 0804008028bb721f0ec30f52e718e2d6ff37e8e362e6ecbd65ee792f721f6d5a... record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... client: Filtered packet: [645] 1703030280d052779e96ff95089a758235849def4e72f09935fb97327d6c967c... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 020100805334907714371dac1ab53cb5839b1486e1ef717cc4a5c8294f7ecf43... handshake new: [132] 020100805334907714371dac1ab53cb5839b1486e1ef717cc4a5c8294f7ecf43... record old: [621] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [621] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [677] 160303026d0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00806d83ca54874149975cfc67c4255aafada1126ae72f1d667206e2144c6f0a... handshake new: [130] 00806d83ca54874149975cfc67c4255aafada1126ae72f1d667206e2144c6f0a... record old: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [699] 160302026b0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00807ad49f3a9596a83ff5e02721d7a9657e7c74a5999a4b8c1cb04049a5cbae... handshake new: [130] 00807ad49f3a9596a83ff5e02721d7a9657e7c74a5999a4b8c1cb04049a5cbae... record old: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [683] 160301026b0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DebugEnvKeylogFileNotSet/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 (14 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/0 (17 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/2 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/3 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/0 (18 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/2 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/3 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 (10 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/0 Version: TLS 1.3 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/0 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/1 Version: TLS 1.2 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/1 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/2 Version: TLS 1.1 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/2 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/3 Version: TLS 1.0 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 030308d1e7a4a128e4fe675d517fa4438d10a21152cfd5504f0e23cb13864fb8... handshake new: [179] 030308d1e7a4a128e4fe675d517fa4438d10a21152cfd5504f0e23cb13864fb8... record old: [184] 010000b4030308d1e7a4a128e4fe675d517fa4438d10a21152cfd5504f0e23cb... record new: [183] 010000b3030308d1e7a4a128e4fe675d517fa4438d10a21152cfd5504f0e23cb... client: Filtered packet: [188] 16030100b7010000b3030308d1e7a4a128e4fe675d517fa4438d10a21152cfd5... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303c8138f43525ba4d19d24a8cb83191fe9d21e93e99271cbe9eb877f7cc579... handshake new: [186] 0303c8138f43525ba4d19d24a8cb83191fe9d21e93e99271cbe9eb877f7cc579... record old: [191] 010000bb0303c8138f43525ba4d19d24a8cb83191fe9d21e93e99271cbe9eb87... record new: [190] 010000ba0303c8138f43525ba4d19d24a8cb83191fe9d21e93e99271cbe9eb87... client: Filtered packet: [195] 16030100be010000ba0303c8138f43525ba4d19d24a8cb83191fe9d21e93e992... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 03021e5996be878de83dd960237cf4aa3a9fe7ade279323765715a4da8af2fe2... handshake new: [116] 03021e5996be878de83dd960237cf4aa3a9fe7ade279323765715a4da8af2fe2... record old: [121] 0100007503021e5996be878de83dd960237cf4aa3a9fe7ade279323765715a4d... record new: [120] 0100007403021e5996be878de83dd960237cf4aa3a9fe7ade279323765715a4d... client: Filtered packet: [125] 16030100780100007403021e5996be878de83dd960237cf4aa3a9fe7ade27932... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0301a42548488952d7ecfbf0a6a79e9df3e71a40b3df5cbcf5c54bca071c8353... handshake new: [116] 0301a42548488952d7ecfbf0a6a79e9df3e71a40b3df5cbcf5c54bca071c8353... record old: [121] 010000750301a42548488952d7ecfbf0a6a79e9df3e71a40b3df5cbcf5c54bca... record new: [120] 010000740301a42548488952d7ecfbf0a6a79e9df3e71a40b3df5cbcf5c54bca... client: Filtered packet: [125] 1603010078010000740301a42548488952d7ecfbf0a6a79e9df3e71a40b3df5c... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [184] 010000b4030371e19708d83c66cf074aff422e8d0300a1ceb5f4a32dfdab6c1a... max: [90] 02000056030334aebf7c99eebbc58e4ad5f3661ddce9606450569cd586881718... max: [674] e5495ea161164b85f533e608449a8df79ed09bcb837e90338fdfe702c7e45e85... max: [53] 65970bcdca466fc7789a2476de14b7630509c8ce4135dfa0d990a24e322867a1... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [16401] 044b9111c98b935fd38eaa07c1372299fd36c3fbe5af4f0a00ca62a108a0062d... max: [18] aa8829fc4bc8edb49ec52c477d6440aaa176 max: [16401] 2e4bd99ee8c376b2fd2472f79bc8ecc1606dcf262339870f81ac8f84f9dac83c... max: [18] 080c796e8235b4eb8b16676e89cbeb8d161e client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb030361c721a976930653a79b54e5d0ac63cedfff4e2de9d5467c916d... max: [715] 0200005d0303c01d43ab55a970fbb3052cbb3462df86ad77e92dfa16b0da51f3... max: [37] 1000002120fea5d37546ed5d647e28b484cf630f108ddacb3f1a5f30c2d1d791... max: [1] 01 max: [40] 0000000000000000b16bca0cd87f627d15c073e9d516d27824b0c91b8c689067... max: [1] 01 max: [40] 00000000000000005a0a00ae2d28850c7756f8d126ab5a7c7a597221a9d89650... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [16408] 00000000000000012987430d0bbc0448db52d2838be8dac3357d5ccefd63c16c... max: [25] 0000000000000002185930bf9ed89072d4033e142df0c7444f max: [16408] 0000000000000001d9783291343a4a021d53cbf7eac8bbadaf09653cdfd571ca... max: [25] 000000000000000278f8a8e79e5611aa8c1983a1e8916cdad8 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750302fb84beb8fed5c891f6fffd5f224985882b98d5135aeeb23aaead... max: [713] 0200005d03021292dff0ec288af7ed045f07df7ed1298329987bac7ad432a106... max: [37] 100000212064f539c432b28445b937c3acfa1b5f23e7700fbcac6211a23ac81a... max: [1] 01 max: [64] 30e49b14e26544e8c7cd2ac8ff6037aac94c342d0165f3134d97486e4a1ca440... max: [1] 01 max: [64] 26d2f60d144bc3d8b83361e6d4b3a1c7bd09b18cafe65b8705249eff818b7ce5... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [16432] 0bcda5cecf60713a85aaf0cbe0568f67359619fe9d273ea907ba895e30771228... max: [48] 1dc17eee3a80cee04ffefcda7e449a4ebd067ec0f081cfaa68acb2ffa4632ff7... max: [16432] e50df709194f86e57c67e1a93c3367952e81de068a40a58f7f02bf77730ebc99... max: [48] dd68bb59395cb3f2c88dda0264bacc66f943a0751ab78721c2812f7982394f65... client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 0100007503015f0d3dbe4e18aaf3806116a8b0ebbceb63dfb2c876d15b9cb9c7... max: [713] 0200005d03017f1b659792a6a5fdad10886fbc7b2fb2966a924826ba8c0effff... max: [37] 1000002120d54bf669124b3760dfe5b8788c3f62cee5b5f3b1a16a5424399ce6... max: [1] 01 max: [48] a606ade0e16ed293aedaad4b2ff29c792dfbea8c923f06eca9e9e55afa75253b... max: [1] 01 max: [48] 1286460b4c8c3cb77c46c105989eb20e79c735e48ad4a4a77d1f4ef7320ad9e1... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 494d3a90ffeba100cc6d8c71fc7e2b95fa34a9e80bf102368232e9cc73ed1cc5 max: [16416] ba61e5713eea3e5bcecccac295d3e1809b48687648cce6a60baa3ba06ad479c8... max: [32] 8740164f5719f6672cf31244a2d6450631268e5575b8b4b1a0e8b926d85ee9e0 max: [16416] 9b43125c6f2abc4b1394e750c4206e8f563351e653dcea5f53218c3ac385077a... client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [90] 020000560303a7b1b9c1ba84471cd06a874145d8970142df7862f71f62562ab3... max: [80] 89a3fa81cfe34b570e0fe1e672b0c81bd38f8b68e50badccfddc614bbe6744c3... max: [80] d2581f21f0e731697658de0a0df7a1e876f175fcf1dc5c7fefa7b92e51fe0a0b... max: [80] 4272ff9b1556c787165dbce88da21421428d183509446167b72f59b1b0415cd2... max: [80] b6dd4d5a3755077bb3cdf154d1be166ec8c4814bb53b0312f246accc0ec7921d... max: [80] d0fddc25c0bafc4c1ad7a7acf2b4b1e9b024bb8009c1988e9d7375ce28262def... max: [80] 4c5fb7efedd58349ede5fe446ceb43ad40c1864a5ab77d88e2b7dc42649aa19e... max: [80] b4cc6b4a677523c540788eba2197733527f6ff3e61923b9cb83de0e12a69f3ee... max: [80] f51684ddd47f31119c97a369c55a3a3f26ce7b9a757937a64bc71e2f8147b241... max: [80] f84467c1b64fc1bf0c18e8fe1ad0103023db16c98ea7a5ae4bf316b415dd63e4... max: [80] 0d6134fd225ccaa38c4c2afc8808e54d2ec065f6a85512a2039413aab3835d87... max: [44] 647c40a3393248f4c45d3ccb54b02742eb3dd37195e5c4de178a5ecf91ecb7bc... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 0ae976316e90d8b56ea284cd7d6adb1ef5e949d51ccced0037f514b4def987fe... max: [80] 76c1cd2419616c0e941ab9c5bef6cb2b801a9d29c887cd8f1711be9b299ec3b0... max: [18] 26e6497eabdad71b7f8c21b7a6ea2a5009a4 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [715] 0200005d03034692dc82ceb5fd30b394bd866da051944f50f4bc76ab04b73541... max: [1] 01 max: [40] 000000000000000045fbd83757bb8279c30a49f6082daced0632345b4efb2323... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 0000000000000001534fb55ccf2446eb9e37f541946516ae7aab58f242ffdfb9... max: [87] 00000000000000022e7d73d1c1b6a226b03cb3fb5f9fed97d5db4ad1077d77eb... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [713] 0200005d0302e15704ce2e84e2a7310f049903c316b37edf462a3c0c7e51ab6e... max: [1] 01 max: [64] 4ae18de9ea658df9fcd3cfb9012bc3c095d6ae2f12da912084e27e3ed6fe3053... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 2fe4373bd09fed38500698efc5c637d31b52cfc0bdb5293b28134cad280b7862... max: [112] b5b7d138b4b4f4770f057dfb85343c97d2cea5f9a6b01d149e5a44d9583c88b4... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [713] 0200005d030122ec54bc7aece8657702dafeee3e1a3cb38751fed175eef507c1... max: [1] 01 max: [48] 24e277219bddf8c3b26ff91cfdaf3d8dc90bf511512de964b6073fb7c922b813... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] d578e9074d39b322daa074e9fd66b362c282d51822698ef1862a25b3761c4ad0 max: [96] 779e95e3a8c35f5c4f309cc03502d148833338e498249884afe9e05f1334ab4f... max: [96] 702805e8c72835eb0e8ca69563dd0f948355bb29cdd9554d378a7e46371972ec... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [184] 010000b403030ef65b1ba0431809e2c6416e48f3a02d54fb58f62dcb3e1d216a... max: [53] 7ac54d16c439000bb14128a3f65429ccb8f6ce44570efc8b13b900bd251fb095... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] d713ff1970f5f019fdac4d3b5cc9e86c6b5fb19390e783ccccc604e05960a0b1... max: [80] b84519d81d4b24c9f0f53a8ed5c546dfdf6c433452c78aee47c2b26bf161c2e9... max: [18] 8142b2671bcfe53584a9c5e42145bff2c76b client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb0303eec66bb550b58c49ccc789866cafc63b5faf1dfee53a563b3865... max: [37] 1000002120c7abbb791c09c2e51c537cfa35491fea4d9c0a361a5108d451d821... max: [1] 01 max: [40] 0000000000000000eb8676a1ef86b5cbae9b6522b5874d9fec75f88cd19edd28... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 0000000000000001360601cfa9275c11b2320a6bf5078477b0f6d7c6ed77e151... max: [87] 000000000000000278fe26fd66dd1ee31878379b97acd7d81571dcf9bfda272f... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 0100007503024f79ec0d790f09cbe73891dfe10c8ab6a128ac3213ee0e5f143f... max: [37] 1000002120f497d852961c767addf8da22b6a972458dedaeb62c9acc6075c4e3... max: [1] 01 max: [64] c376bfafa2e078d5d54de8d90bf825707353cbb3e705f24197111240cb221b29... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 647a7ff9a3d8a78fdd94eff4a40ea9250d322b2195961b79865419d1f9e173ef... max: [112] c56c17180946370b755abadff3709861521afe3125b08176a1b642824717ddbb... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750301eca587b7343ae4fde1c07b61715b2443486b118f1c4164f857c8... max: [37] 1000002120b1ee70f6db010d2cb2df2b86a4f39ce6a9f59bc970fd948867cf5f... max: [1] 01 max: [48] b97fabd5961cc2be5981095a1eeebf371762043b1150ce2e91ad7dfe7e23ae01... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] a4341b1fc5fdad68cc3a682f394a54effc021e35a083d969325a93e6e4bcba34 max: [96] 35debeaeca50a9bb0f8fa359d78e3298a58b1f8a6cdd83a52551c253a8f08d48... max: [96] ef3dcb697344f01e767a2b6cc7d64cec5fe88858e882bd449e85eb506463e4e0... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [184] 010000b4030330fa9dcc7ed7c9d9df9ff41b393ea5b4e0d2d18b67d06d4e14c8... max: [90] 0200005603031ee8c3f961d18f0df06f7a6194389d9805a044069853a39c1d04... max: [80] bb4b82a614e57abb358818b30bbb7eb0c185eb206407ef33aec872b93c2e5918... max: [80] 65860f185e9ef87a5320d0472bcc0c5a8c2f700a1424722564575757efb5ce1d... max: [80] 46b88ea567d5cc25a5c6bc8768f822b85e28dff0830ed27ee0d3b41a50bf1b93... max: [80] 63f46fa28bb8f353a986428f5f8908f5f6b90fe03b7bd838c4c8101f7f93018e... max: [80] 9d9d328d1c0970389d0b223f723d21a1e2421ba819ca4836c937c055824cab48... max: [80] 21af42015ee0d649b446904d3513707fa5f220597928b45c093fe26247c18d04... max: [80] f6d481fd158cf803b3448db9a7a90324572dfc28010a573f5ca54228dd04b8cb... max: [80] 52629728263bca8229cdfc899749a6354c98480a76753aa0f35dfdd8b206c45a... max: [80] 734ddb0bb02b26094183d7a3a71e9a6d9bce3fa1fda5695345c9b0d50db5537d... max: [80] 4051afa316fc3e38c38d0637bb8ee1792cd8062bcfa1e618e14f490d4f905f9b... max: [44] 0d33c6b0f44eb05778f5b5cc0c6ff15add6673a8feec03c94f740c0ca27af095... max: [53] 6c1419742c6ec26071c52b69d73b54821c9c2a8111730896bf332c9c22678601... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [116] 4a74e836042c1a7c031e2f5a287271fc753c386b53a28566a4f632c71968f031... max: [45] 600370bbadbee7488ecd493efb9e442f16b20a5404a7c49f4559a3fdae1b6ca0... max: [80] 72fab5c587a25529e5602589ab1f02889bd6afb1c75419118c9cfb5fe46c1bb3... max: [80] 354390ede893b188fa4daf86b73f3a162124853402656f0b412e6a095857c39b... max: [18] 14d6ab47fc4a41e8cecbce87917e1f1ff54a server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb0303d9d11c4280c44a13306d77013168dd257d084e9a7d108f8c6ad5... max: [715] 0200005d03038f7798f64c1669a2d826c24bdfff18c5c115289b31e90b1884a3... max: [37] 1000002120699d7d65bc4bb74864bdc253a87de1f511ea166236230c4e1fc5dd... max: [1] 01 max: [40] 0000000000000000bb214c6c33c99fe2442aabe2084a119d45c4736e75d0ae3b... max: [1] 01 max: [40] 0000000000000000fa10398e6d2fecd004d2070d316f2f227e018afaa7d01982... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [124] 000000000000000189181fe7fcaa6eb18ec636d6a14154fabd2a5558510221e4... max: [51] 0000000000000002532f969f3589555a117bd9da552c24148f042c461ced0962... max: [88] 00000000000000011fe0ce10c48b58bb3a50684d689c2508f86dac11d3a0487b... max: [87] 00000000000000022c6741d05e271fd45badb6274a7b0d11fbb710db0b22342a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 0100007503021ee61335a7abcf8957e1b6981efcbe884f7d7344b430a8993f2d... max: [713] 0200005d0302275b10256556e86ebb7e67f88b921a5eb3c974afd11d92ac2038... max: [37] 1000002120783ab01a03012a69aca002c2edf61278d26167a1710ec5141986b3... max: [1] 01 max: [64] 3c63e320d1103916c47c5f604696e800381d332aca9d593c3dabf05f64878fff... max: [1] 01 max: [64] b32c80f698b6602571da07659a1a11b2b7b5d50dbde5c6700e19492c3ea687d5... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [144] 419f8f91611353da01ca87f7777b4943bb8fe94b4b85eaa988060e18aab52c6e... max: [64] 5f12386dcfd77ebd7a611328cdeec68564d15814b426f9a269b48c15f3bb9f64... max: [112] 54df306d53e19a9fdcc6b2a22d8ebd76d6ade2d94480ffc0223dbd8e417094c6... max: [112] 79dd3cfb1dab07b0d0f576a8252f06f816c6487df42c9a8c903aeb1ee324dbe0... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 01000075030127c58ef737279367bd9a63f0a9e0749b0ba0424e483aa2271b65... max: [713] 0200005d03016ccfb2ad83544d9abb16092a86f8339bfa571afa2548dd519d41... max: [37] 100000212010f05f288977e0240d89ca58b3e31c29fbad3e2446c455857060d6... max: [1] 01 max: [48] c041e33190f34b9bc06eb2b97b8926733382e3f014fb07eb64fa427c4db53ee6... max: [1] 01 max: [48] 37ed837caca8edff7b85452fc548a9502a42b5ea02c120f41d1a48635b9c7139... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] f71af72c74f2d380b2e8bb0c9d51c716944660fefd21eadd0a4d416f5f5ef005 max: [128] 91ee58d7b442ee844d44623da0d1fc59fa8f25bacab065a078680aa8d20c802f... max: [48] 138c520ec262ee9cc38309f32c8ab873e5799cf454713780f0e3d43b6aad7bd0... max: [32] c13ab9cb70e441293453d788de3da277b7d2e44695ba3c884ec3e54cdf99247d max: [96] f6213dd162d2628673ec9e6263218fcdfa234436566ba84ad62607cd44c45c5a... max: [96] 77415812ba00e038fe9c7f2653905964790d25a0ec797d02459659ca5b8e9149... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [36] 0022000a00140012001d00170018001901000101010201030104001c0002f41f... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [774] 160303005a02000056030356035c54c1ee68687d65ee61f62f1f3ee16e61ed2c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 0303bb95e4746a812c430067ae7bd10f43ffcccfbe61f489bf08e0ec9a837676... handshake new: [93] 0303bb95e4746a812c430067ae7bd10f43ffcccfbe61f489bf08e0ec9a837676... record old: [715] 0200005d0303bb95e4746a812c430067ae7bd10f43ffcccfbe61f489bf08e0ec... record new: [715] 0200005d0303bb95e4746a812c430067ae7bd10f43ffcccfbe61f489bf08e0ec... server: Filtered packet: [720] 16030302cb0200005d0303bb95e4746a812c430067ae7bd10f43ffcccfbe61f4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 0302c8088cb18236d32448b285909d75da5898b030f54e23a3cd48f0da3325ed... handshake new: [93] 0302c8088cb18236d32448b285909d75da5898b030f54e23a3cd48f0da3325ed... record old: [713] 0200005d0302c8088cb18236d32448b285909d75da5898b030f54e23a3cd48f0... record new: [713] 0200005d0302c8088cb18236d32448b285909d75da5898b030f54e23a3cd48f0... server: Filtered packet: [718] 16030202c90200005d0302c8088cb18236d32448b285909d75da5898b030f54e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 03010e90a76cefe90306d94f01696196027f81ed7e620908db1cdde6375d2a3a... handshake new: [93] 03010e90a76cefe90306d94f01696196027f81ed7e620908db1cdde6375d2a3a... record old: [713] 0200005d03010e90a76cefe90306d94f01696196027f81ed7e620908db1cdde6... record new: [713] 0200005d03010e90a76cefe90306d94f01696196027f81ed7e620908db1cdde6... server: Filtered packet: [718] 16030102c90200005d03010e90a76cefe90306d94f01696196027f81ed7e6209... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [37] 0023000a00140012001d00170018001901000101010201030104001c00030100... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [658] 080000250023000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [775] 160303005a0200005603036e45227f913abe7bf16bccfe5b05c469f8fe20563c... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 03031876df63146aa41af8d882ca1b3a0c0ca91b38458c10762cd2f5856b78ce... handshake new: [94] 03031876df63146aa41af8d882ca1b3a0c0ca91b38458c10762cd2f5856b78ce... record old: [715] 0200005d03031876df63146aa41af8d882ca1b3a0c0ca91b38458c10762cd2f5... record new: [716] 0200005e03031876df63146aa41af8d882ca1b3a0c0ca91b38458c10762cd2f5... server: Filtered packet: [721] 16030302cc0200005e03031876df63146aa41af8d882ca1b3a0c0ca91b38458c... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 03028b899453e4d03803ae787b8ab3529e02189c383bcb9606b569b27f4438b0... handshake new: [94] 03028b899453e4d03803ae787b8ab3529e02189c383bcb9606b569b27f4438b0... record old: [713] 0200005d03028b899453e4d03803ae787b8ab3529e02189c383bcb9606b569b2... record new: [714] 0200005e03028b899453e4d03803ae787b8ab3529e02189c383bcb9606b569b2... server: Filtered packet: [719] 16030202ca0200005e03028b899453e4d03803ae787b8ab3529e02189c383bcb... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 0301a74e0fb47c1653dad0c3bc7bbd09da5c1387b82580635c9e4e5cb51c1331... handshake new: [94] 0301a74e0fb47c1653dad0c3bc7bbd09da5c1387b82580635c9e4e5cb51c1331... record old: [713] 0200005d0301a74e0fb47c1653dad0c3bc7bbd09da5c1387b82580635c9e4e5c... record new: [714] 0200005e0301a74e0fb47c1653dad0c3bc7bbd09da5c1387b82580635c9e4e5c... server: Filtered packet: [719] 16030102ca0200005e0301a74e0fb47c1653dad0c3bc7bbd09da5c1387b82580... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/3 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 (10 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/3 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (10 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/3 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/0 Version: TLS 1.3 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/0 (140 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/1 Version: TLS 1.2 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/1 (104 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/2 Version: TLS 1.1 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/2 (103 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/3 Version: TLS 1.0 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/3 (103 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 Version: TLS 1.0 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 Version: TLS 1.1 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 Version: TLS 1.0 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/1 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/3 (3 ms) [----------] 292 tests from GenericStream/TlsConnectGeneric (2010 ms total) [----------] 219 tests from GenericDatagram/TlsConnectGeneric [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/0 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/1 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/2 Version: DTLS 1.0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/0 Version: DTLS 1.3 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/1 Version: DTLS 1.2 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/2 Version: DTLS 1.0 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/0 Version: DTLS 1.3 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/1 Version: DTLS 1.2 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/2 Version: DTLS 1.0 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 Version: DTLS 1.3 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 Version: DTLS 1.2 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 Version: DTLS 1.0 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuth/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuth/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuth/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthRequestedRejected/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthEcdsa/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthWithEch/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/0 Version: DTLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/1 Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/2 Version: DTLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientAuthBigRsa/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400805ebb0047e9daa1ad441da14ef3e4411bdbed73675f555d73a6cf8453... handshake new: [132] 080400805ebb0047e9daa1ad441da14ef3e4411bdbed73675f555d73a6cf8453... record old: [144] 0f0000840002000000000084080400805ebb0047e9daa1ad441da14ef3e4411b... record new: [144] 0f0000840002000000000084080400805ebb0047e9daa1ad441da14ef3e4411b... client: Filtered packet: [713] 2e201601dc0f1702694e180f935d926d3ec6eb98bd547e14807740ce3fbb3a33... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 02010080092c258a46e0dd76409b4d491b770d8316612c28d99283c7d4280b50... handshake new: [132] 02010080092c258a46e0dd76409b4d491b770d8316612c28d99283c7d4280b50... record old: [144] 0f000084000300000000008402010080092c258a46e0dd76409b4d491b770d83... record new: [144] 0f000084000300000000008402010080092c258a46e0dd76409b4d491b770d83... client: Filtered packet: [759] 16fefd000000000000000101c80b0001bc00010000000001bc0001b90001b630... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 008028363633410a963abdd3d08f649fdb3de658ceabbb181c0fecfae9a4cad0... handshake new: [130] 008028363633410a963abdd3d08f649fdb3de658ceabbb181c0fecfae9a4cad0... record old: [142] 0f0000820003000000000082008028363633410a963abdd3d08f649fdb3de658... record new: [142] 0f0000820003000000000082008028363633410a963abdd3d08f649fdb3de658... client: Filtered packet: [773] 16feff000000000000000101c80b0001bc00010000000001bc0001b90001b630... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DebugEnvKeylogFileNotSet/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 (15 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/0 (17 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/0 (18 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 Version: DTLS 1.3 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 Version: DTLS 1.2 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/2 Version: DTLS 1.0 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/2 (1 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/0 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd658dc3073636aaf2fd508235f277277faaa841134c756b2fb99bb5e256be... handshake new: [180] fefd658dc3073636aaf2fd508235f277277faaa841134c756b2fb99bb5e256be... record old: [193] 010000b500000000000000b5fefd658dc3073636aaf2fd508235f277277faaa8... record new: [192] 010000b400000000000000b4fefd658dc3073636aaf2fd508235f277277faaa8... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefd658dc30736... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefdb15086d2208a44205df4a658c36c3e2ece220437858e4629f38c5891c1b6... handshake new: [183] fefdb15086d2208a44205df4a658c36c3e2ece220437858e4629f38c5891c1b6... record old: [196] 010000b800000000000000b8fefdb15086d2208a44205df4a658c36c3e2ece22... record new: [195] 010000b700000000000000b7fefdb15086d2208a44205df4a658c36c3e2ece22... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefdb15086d220... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [114] feff6d722230aed5b12bf8effd742a80cf0c6f2da8352b1ac1e98045ea058513... handshake new: [113] feff6d722230aed5b12bf8effd742a80cf0c6f2da8352b1ac1e98045ea058513... record old: [126] 010000720000000000000072feff6d722230aed5b12bf8effd742a80cf0c6f2d... record new: [125] 010000710000000000000071feff6d722230aed5b12bf8effd742a80cf0c6f2d... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feff6d722230ae... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [193] 010000b500000000000000b5fefd6583b4b988955b6e5a0489fc14dc06be5a23... max: [98] 020000560000000000000056fefd97f5158beb62ace02883cab47623ed412cf8... max: [65] ab9a128175ac47076e42f0408e44a4e82abdc396d515356115fb6df09c8926da... max: [470] 18e4980795fc1834c912a4f8da4d4feca06094ed9efa7d804c2bf40dc285592a... max: [161] 2535f03258da61eb0e10605b1a7349a0942cce5bd549824fa235bdb73fc4e0e7... max: [61] a3127d085c3e52929ed421a6fe6ce23ec9b600d3d868c4ab034f2c32c607c8c5... max: [61] 84f075cb8e4e210862c6bfb5b24e46ed47224402909c574303323e4427994a56... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] 83fd4c39aeaae7035a846ab001ae3b1cf203e9ec51c42dcde4ff2d Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [16401] fd03fb6d16106908409483f79c87e6d764b9c768bc1e7aeeea86aaa8516913d2... max: [18] e147096ef2aa3c42ca64d1419d9b6aa64fcb max: [16401] 393e824539054d5b609fd95d0dd17d2e1ea78b6e5e70ba4c7e73ed8d944b45f1... max: [18] ae39feeb45b56cc959fc316eba41d56c579b client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefdaf31b87f6bca13c058063d9ba493c069d368... max: [105] 0200005d000000000000005dfefd73692941266008750c7d7456d475681879ee... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... max: [12] 0e0000000003000000000000 max: [45] 10000021000100000000002120261b4ff9e737b1452b4bbdcd19c5bee0d99380... max: [1] 01 max: [48] 00010000000000005c298dce59dc289b2200f860bc7dd1f5c42375114c93c460... max: [1] 01 max: [48] 0001000000000000d048f49eb7673247eacea603550382038cdeaee9b6036e33... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [16408] 00010000000000015d3ed7eee7b7946f3ff1d87c995007ac636e03a77782a471... max: [25] 0001000000000002126bd80b29fd775b20f232128db6d154cf max: [16408] 00010000000000011a9fbc19b639bd20eb5742095048b49c6e384b73ce3ad1a8... max: [25] 00010000000000021a9e28cadbb1eecfaf8148d373946b5209 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feff653f6edd164c22e24d9057b5f8aee5063e3d... max: [105] 0200005d000000000000005dfeff5f3542ab135d1f92e8238b90c22f481f0c5e... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... max: [12] 0e0000000003000000000000 max: [45] 10000021000100000000002120241aa50368b761e0e0e372fd4cdd4308b03ff3... max: [1] 01 max: [64] 822b7a29c8ea733b5d584bbeac01ea3ce74764fef05204059230fd95e2af1382... max: [1] 01 max: [64] 2aa33d3df691355c7b6ead6709c5af9b29cbfc8d5d2ab287cccf8e771c14480a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [16432] ceaafb43ce0f5bf4a693b5992c254b36dc3dad916cd1f7e5f7b1a79884bc7c40... max: [48] ac195a96318142bcc2cdf4731800384b29319bb3c14c8b9f294b74cbc51e82d4... max: [16432] 173fe13dbce03a2dcd57ede3dc48b8cdd534dbf1a7179215582a0f82e10d77c9... max: [48] 7ba5514178f79639f6270e512a78da0499b48fef9e574fe33caf952535b08872... client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/2 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [98] 020000560000000000000056fefde68758d7407c438512adc74fd36f19e91c66... max: [65] 2ed0f9318d0cb5075b922d475528ed2e13d7916bd34460cddd3b3df7d4dac889... max: [80] ec53147649d9fefbf9e3d1e61704b5b4f1527c66d2d3fabfe8768a21be507535... max: [80] 42c33bc0f0a202cd90a6d52bb68d58083cae78909375754e598b169e70631e4f... max: [80] ebd58195e070289758b7bb2012d260285bb0a40080f52508c72a321e675500f2... max: [80] dc4eacc608473e69230d79cc91faeca8206478fd5c1d3f33f1aa030210905b14... max: [80] 5186495764c7d89a49cbd68f857f189c41bc9da853dd58b3e94de02d9adabbcb... max: [80] 944cb756431ebf4061316cbcab6594604bab5398d15fe89d74b550348f798706... max: [80] b629125c921eefc8078f97db44b554b0903382b0a2db38e077af6e82d5e8eae0... max: [80] 2545cbc45e4d7964629ea8694fcd9b89115cbbcbd7afd66c366058147ac3b1f3... max: [62] 97ba3dcb6ede08c4e3d24bc433a32721b8fe4a954a2d77850fcaf7236315cd9f... max: [80] 206590d08d0a435fb519950f5987d084f3a3949a6934bffb3480461cf43d7ac7... max: [80] 40afd4c070c120d4a82876453cd2759764ea5a21b34a6108911d78f99226b878... max: [59] 53bc628733335c321742cef6c8516dfa4b6d3f4d0a18b4e1e2bd011c43ef1b2e... max: [61] efb2375c279a0e8c4bd719eced19e6d8ce2e4be884bfc798ee667f712a7245d4... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] 1f6bafb3fd2cfefaa04cfdf76f3606a88111b2d2b5d0f120efdc71 Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 25ff77ae9580c9d99b7c178d57d9c016202ca20d6bfcd2ed9ba225db8839ec8c... max: [80] eb95e3155049d7d81af49dbbeebbdc4c264934bc010ed2b33b080af4821da695... max: [18] 14dadcc53b6ed61cb57917496d3971c03875 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [105] 0200005d000000000000005dfefd2228be9c0d282c4f38015691b4fa4c5fcc4d... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... max: [12] 0e0000000003000000000000 max: [1] 01 max: [48] 00010000000000008e6e79ad6ad2982220ee3bec880bed8a99f42f4b11e9f88c... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 00010000000000013727fd69b95174005de20a6e7dfebece33154412f82761b0... max: [87] 0001000000000002e1225689b9cc2b51e95b6d9f7d1eeceb07af50b2e83bf183... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [105] 0200005d000000000000005dfeff7ac0da5ab6d4eab2356795831ab84817b74e... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... max: [12] 0e0000000003000000000000 max: [1] 01 max: [64] fbf8285a615d0d98b8f9871da7f588806c7750a9b15d862c83e2905f541effb0... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] f4d90847252679d8ce2a5a756d53b0ee1f45f1faace2fe68b7f050640f509a1c... max: [112] 7e0a091e6bac2a169fb71ec8ce3e4038d1cbf55c7a822d7b37d82eff7bd5e82d... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [193] 010000b500000000000000b5fefd20d6305f5476069e23986afa4af0a4b1f34e... max: [61] 9f2f51c5c3eab94c988a7c7e81f4617531a2f2cf46d1573284c340c06cb07d84... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 5d0df313fbfb68d2c13f1d8e4296a405572dc2bbbb0344f55addb8f8e25fc0ed... max: [80] c8e51110c63cc50ed9f55e128873ab859e69fd1353b1ccc6e5d0c27b86a79b0f... max: [18] 24c488d1cfe2566bf6762e076a1d423cea43 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefd84e25384de5da63426185ecc0498fdb1b7f2... max: [45] 10000021000100000000002120d5cc92c31f1f25668c256f095866cc4b12e900... max: [1] 01 max: [48] 000100000000000079fa7b43f75b94ad695182f626489956def3b105741c9184... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 000100000000000118b1b7ef21b62894b490a8f9a31d43e035a3eea001353e52... max: [87] 0001000000000002404abe5885209c9c321cffbf9bdcbf26cb77b4a1b9f47a01... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feff1203839c0a0391f25e2fcf0a55225cfa9e4a... max: [45] 1000002100010000000000212048eb12c37251b429ddf64b6806c087a9af8e53... max: [1] 01 max: [64] 899c3df043b030511d1decc1762171b6fa8379685d1fd964eea1326a78831e42... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 2800ecd8c81677ef74cbbd4908eb191dbb8abac1f2e8657ba415b3b740ea6207... max: [112] 6da43fc41808f3738476e44fa82a1b0f37bcdc0aa05c95a96cbcf5e75ba21723... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [193] 010000b500000000000000b5fefdc4bd1ed278d3917f69a0c218fbabab3d4817... max: [98] 020000560000000000000056fefdf9e5efdd79e0e61b5cb2894f878b9e6d91b7... max: [65] 31c4a9da2a3400183910e334315725c5a500d3c3eec0b9d80dcb079914abfa90... max: [80] 3288f8c9a23fe0a7e3b1225179ad18d4f99f21c38c0f65f37c19c64e68683b23... max: [80] 45772346a6183287bbdd3d937fb1fd2581e60bc2ac3cb4dcf2febc39c20f4916... max: [80] 1ca344338d7f4155f7624ea512d6afa621bd861604e9fc7fbbcb590fcb3f6938... max: [80] c2db30d822e851c4a7143d566981becfd2c52f11302d393b1b76b62169a2ffe6... max: [80] 44e42c1a71a766495ef55e92039d33e0ff88d81bae70b3821212378e9a699621... max: [80] fa12797a3677359227bbbf172c092057c4e92a7ff614260cb1a839aa42877de3... max: [80] e17bfb8ba403669c0d0838e1673c906b1f65d2301625f5433be8347b357a9dc1... max: [80] 5c214a826fabd32a9ce90f1f40f151d1d272300c7d471fd0096561296e687a35... max: [62] cd0f365d1ddf8cd6044f651f702173b2f202dcd1a20cdc2f767016ca69fe7b69... max: [80] ee44c19c48e7000759318cb593a1b926fafb883ceb29ade2c447bbded7920b73... max: [80] 8e4f0b56abc94ec5a99b48c663dba74d7c33780657a002aeb13ee28b8d328fdf... max: [59] 13ed640e19b050595fc0d2161317d17a991a29356f137181bf814e17042b34d1... max: [61] fbce601156ed753fa1746c1ea4b81749c5d09c9ce3e23f9be7c58344813635cb... max: [61] 047d23193fd0f6dd99b2f3d47eedc1c6d6145a6970a73f14353fc98b8b019724... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [27] dc62107f2984a0589be4751c1a408c000fb968d7a7d85c1f87f26b client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [116] f2325d5778928d494a076b96d7e2303874564f5fa5fd4fcae688d78590fd1b3f... max: [45] 4db4c638ae61bbb7dd8776e7056d4b9941f1851496a8a709d3ee17b870f6d5bd... max: [80] 8cc3102d31c09a67f13adc0b52f2bc232c600c157a66c0c8ea5bf77880ffb764... max: [80] 5850f735c16e03142bae23b494ee92f58fe70d38f74d84132002b0e6c4327316... max: [18] 821b972069a97231e791dcb6d3016a42dbfb server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefd1f1c3c2544689834ccdc5974310dad621561... max: [105] 0200005d000000000000005dfefd577541fc48edf544f8d567560c1c7567021e... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... max: [12] 0e0000000003000000000000 max: [45] 100000210001000000000021204e02cfceceba4121cd6cf8b360db909624aa8b... max: [1] 01 max: [48] 000100000000000090033e416f95761fff0686dbf80a7e289f1b4216a3a87a96... max: [1] 01 max: [48] 00010000000000003efdc4cbe6a9ffdccc7c48f4ec4064ede19b70514251d075... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [124] 0001000000000001c76f1d52d18d9aeeea849178f4234ce019f09b7057aa5c2f... max: [51] 0001000000000002132c117bf2444e21d0e748c682cc2e9c682fbd09939caccb... max: [88] 0001000000000001921b3915989da6ee3678f9a19d929f8a80d14582a15bfea2... max: [87] 000100000000000268fa0f12a438fad2be0286286dafc05bc49cabcd2fe24e79... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feffca42f516b299126ad3666053ece673f1b2d4... max: [105] 0200005d000000000000005dfeff07858828cb4a93b9a726116cdaf4b376871f... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... max: [12] 0e0000000003000000000000 max: [45] 100000210001000000000021202e82968fbd31985742f0af7a172b7c55e331ac... max: [1] 01 max: [64] 268cbe349b699eae635d8c417be3534e59b7b19cca01f2a5e0505f769dcc936b... max: [1] 01 max: [64] d45781e70aa2cb1c4bf47570609bb1a02fd88cba0d9fa96f80691cd45f212d67... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [144] 5f9b4d58d8529930754159598a9eee052700e1566d717080ed2a8b2f1a5c12e4... max: [64] d8cc557a10a48878e1e77dfed0deb4f45cb9f8862839e3efd3d80d5cf7a9118e... max: [112] 5b8ec827310afbcf864813838f5679a0d5c9e22a0a4671e1fe2d65e8b552ea82... max: [112] bac26af579981b55be3586d06c3b2dd1f8c7362f1ee95c3c2b34baf443e8c18a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/0 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [36] 0022000a00140012001d00170018001901000101010201030104001c0002f41f... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... server: Filtered packet: [888] 16fefd00000000000000000062020000560000000000000056fefd997da54366... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] fefd7bcded9191ba112051df40ea5825f649458c05380dd6952a4cf074baecb6... handshake new: [93] fefd7bcded9191ba112051df40ea5825f649458c05380dd6952a4cf074baecb6... record old: [105] 0200005d000000000000005dfefd7bcded9191ba112051df40ea5825f649458c... record new: [105] 0200005d000000000000005dfefd7bcded9191ba112051df40ea5825f649458c... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefd7bcded9191... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] feff0ffbe3b151f50f6d64cbfffdb070b0ce73745be9301312abe24a9a3a11c4... handshake new: [93] feff0ffbe3b151f50f6d64cbfffdb070b0ce73745be9301312abe24a9a3a11c4... record old: [105] 0200005d000000000000005dfeff0ffbe3b151f50f6d64cbfffdb070b0ce7374... record new: [105] 0200005d000000000000005dfeff0ffbe3b151f50f6d64cbfffdb070b0ce7374... server: Filtered packet: [797] 16feff000000000000000000690200005d000000000000005dfeff0ffbe3b151... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c000203e8... handshake new: [37] 0023000a00140012001d00170018001901000101010201030104001c00030100... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [49] 0800002500010000000000250023000a00140012001d00170018001901000101... server: Filtered packet: [889] 16fefd00000000000000000062020000560000000000000056fefd7b421647ce... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] fefdad3bfb95a26daaeacb0d3278f9a370781a0b8691e3b62eeb1b8274052f65... handshake new: [94] fefdad3bfb95a26daaeacb0d3278f9a370781a0b8691e3b62eeb1b8274052f65... record old: [105] 0200005d000000000000005dfefdad3bfb95a26daaeacb0d3278f9a370781a0b... record new: [106] 0200005e000000000000005efefdad3bfb95a26daaeacb0d3278f9a370781a0b... server: Filtered packet: [800] 16fefd0000000000000000006a0200005e000000000000005efefdad3bfb95a2... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] feffc392fc35bfc9d713f9eaa5e587a876103313f5507385071ededf3038c745... handshake new: [94] feffc392fc35bfc9d713f9eaa5e587a876103313f5507385071ededf3038c745... record old: [105] 0200005d000000000000005dfeffc392fc35bfc9d713f9eaa5e587a876103313... record new: [106] 0200005e000000000000005efeffc392fc35bfc9d713f9eaa5e587a876103313... server: Filtered packet: [798] 16feff0000000000000000006a0200005e000000000000005efeffc392fc35bf... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/0 Version: DTLS 1.3 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/0 (103 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/1 Version: DTLS 1.2 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/1 (103 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/2 Version: DTLS 1.0 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/2 (104 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 Version: DTLS 1.0 [ SKIPPED ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/0 (54 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/1 (54 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/2 (55 ms) [----------] 219 tests from GenericDatagram/TlsConnectGeneric (1638 ms total) [----------] 16 tests from AgentTests/TlsAgentTest [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/0 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/0 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/1 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/1 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/2 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/2 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/3 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/3 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/4 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/4 (3 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/5 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/5 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/6 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/6 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/7 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/7 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 (1 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/2 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/2 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/3 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/3 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/4 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/4 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/5 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/5 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/6 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/6 (3 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/7 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/7 (2 ms) [----------] 16 tests from AgentTests/TlsAgentTest (19 ms total) [----------] 4 tests from ClientTests13/TlsAgentTestClient13 [ RUN ] ClientTests13/TlsAgentTestClient13.CannedHello/0 client: Changing state from INIT to CONNECTING Process message: [95] 160304005a0200005603039cbc149b0e2efa0df3f05c707ae0d19b3e5a446bdf... [ OK ] ClientTests13/TlsAgentTestClient13.CannedHello/0 (0 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.CannedHello/1 client: Changing state from INIT to CONNECTING Process message: [111] 16030400000000000000000062020000560000000000000056fefd9cbc149b0e... [ OK ] ClientTests13/TlsAgentTestClient13.CannedHello/1 (1 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/0 client: Changing state from INIT to CONNECTING Process message: [99] 160304005e0200005603039cbc149b0e2efa0df3f05c707ae0d19b3e5a446bdf... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/0 (0 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/1 client: Changing state from INIT to CONNECTING Process message: [123] 1603040000000000000000006e020000560000000000000056fefd9cbc149b0e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/1 (1 ms) [----------] 4 tests from ClientTests13/TlsAgentTestClient13 (2 ms total) [----------] 20 tests from Version12Plus/TlsConnectTls12Plus [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/0 Version: TLS 1.3 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/0 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/1 Version: TLS 1.2 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/1 (3 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/2 Version: DTLS 1.3 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/2 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/3 Version: DTLS 1.2 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/3 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/0 Version: TLS 1.3 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/0 (9 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/1 Version: TLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/1 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/2 Version: DTLS 1.3 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/2 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/3 Version: DTLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/3 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/0 (5 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/1 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/2 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.ClientAuthDisjointSchemes/3 (4 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/0 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/1 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/2 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/3 (1 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/0 Version: TLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/0 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/1 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/1 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/2 Version: DTLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/2 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/3 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/3 (2 ms) [----------] 20 tests from Version12Plus/TlsConnectTls12Plus (74 ms total) [----------] 10 tests from Pre12Stream/TlsConnectPre12 [ RUN ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/0 Version: TLS 1.0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/0 (2 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/1 Version: TLS 1.1 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/1 (2 ms) [ RUN ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (7 ms) [ RUN ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 (6 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 (4 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/1 (4 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/0 (8 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/1 (10 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 (8 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/1 (8 ms) [----------] 10 tests from Pre12Stream/TlsConnectPre12 (59 ms total) [----------] 5 tests from Pre12Datagram/TlsConnectPre12 [ RUN ] Pre12Datagram/TlsConnectPre12.ServerAuthRsaPssFails/0 Version: DTLS 1.0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Datagram/TlsConnectPre12.ServerAuthRsaPssFails/0 (2 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (7 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 (4 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ResumeWithHigherVersionTls12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ResumeWithHigherVersionTls12/0 (8 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 (8 ms) [----------] 5 tests from Pre12Datagram/TlsConnectPre12 (29 ms total) [----------] 171 tests from Pre13Stream/TlsConnectGenericPre13 [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientAuthRequiredRejected/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140301000101 record drop: TLS 1.0 CCS 1000000000000:[1] 01 server: Filtered packet: [53] 160301003069e800610c48e46f42334a290cd357e0afb549716ee4dfe36a91ba... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [37] 1703010020711072baa7c7aaafe0e4d6acc50b6397d2b615d50ef878e67ae82e... server: Filtered packet: [37] 170301002026b29a76081b8ea09365ee614e650b761aedd0458aa92a24393a13... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140302000101 record drop: TLS 1.1 CCS 1000000000000:[1] 01 server: Filtered packet: [69] 16030200409d5307900c00d8a2815e479e9f562a259ae968b5d8a98e14e74037... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [53] 17030200303d55e89cfa2d251e13a061b2a62e4f46c354db57a5789feef2379d... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140303000101 record drop: TLS 1.2 CCS 1000000000000:[1] 01 server: Filtered packet: [45] 16030300280000000000000000c384fe20b914626a52e506abd51c8464ee2c1b... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [39] 17030300220000000000000001c9b54e968c62bef3011808138991a3c4463a5c... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140301000101 record drop: TLS 1.0 CCS 1000000000000:[1] 01 server: Filtered packet: [53] 1603010030e1dbe094d318bd2240b6b6b488381b9e51ce028543d3e6abb7e9ed... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [37] 1703010020163d76c92c85184eed1910a96fb909e5bdc7164984b168d0b25596... server: Filtered packet: [37] 1703010020985aa1b8a04c6898dd9bd151cbf5446cf37d9cf13bbf33d2361a03... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140302000101 record drop: TLS 1.1 CCS 1000000000000:[1] 01 server: Filtered packet: [69] 1603020040827c3d419394f2b4888da11ee27fd60d37a4b29b051a02c3397392... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [53] 1703020030decdfd05aa4bf3d6ae36152bcf51c939f6ceb37e10b8a6044d7372... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140303000101 record drop: TLS 1.2 CCS 1000000000000:[1] 01 server: Filtered packet: [45] 1603030028000000000000000084b9d5253f9cc68876d96d26185c7a063721a7... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [39] 170303002200000000000000013d648d3ae53d307b0c54f275e9da6e2624a65f... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 0301d76361efdc582724ae26f8c3e7390829596a9d202319f6b44e92bfbe5bf1... handshake new: [98] 0301d76361efdc582724ae26f8c3e7390829596a9d202319f6b44e92bfbe5bf1... record old: [731] 020000610301d76361efdc582724ae26f8c3e7390829596a9d202319f6b44e92... record new: [732] 020000620301d76361efdc582724ae26f8c3e7390829596a9d202319f6b44e92... server: Filtered packet: [737] 16030102dc020000620301d76361efdc582724ae26f8c3e7390829596a9d2023... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 03022a43887982e6266accb3a058dd00aea7f316ab38f602f908674f331c58c9... handshake new: [98] 03022a43887982e6266accb3a058dd00aea7f316ab38f602f908674f331c58c9... record old: [731] 0200006103022a43887982e6266accb3a058dd00aea7f316ab38f602f908674f... record new: [732] 0200006203022a43887982e6266accb3a058dd00aea7f316ab38f602f908674f... server: Filtered packet: [737] 16030202dc0200006203022a43887982e6266accb3a058dd00aea7f316ab38f6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 0303d8d738b4493617283b834c81c58cdcffebd912f6522e3aafbebc91969833... handshake new: [98] 0303d8d738b4493617283b834c81c58cdcffebd912f6522e3aafbebc91969833... record old: [733] 020000610303d8d738b4493617283b834c81c58cdcffebd912f6522e3aafbebc... record new: [734] 020000620303d8d738b4493617283b834c81c58cdcffebd912f6522e3aafbebc... server: Filtered packet: [739] 16030302de020000620303d8d738b4493617283b834c81c58cdcffebd912f652... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... record old: [713] 0200005d030193c27e164e5b00b7949b529217a57c7323db720b076b23547838... record new: [713] 0200005d030193c27e164e5b00b7949b529217a57c7323db720b076b23547838... server: Filtered packet: [718] 16030102c90200005d030193c27e164e5b00b7949b529217a57c7323db720b07... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... record old: [713] 0200005d0302ad835843813c1e3a952df95b1245da83f69f5f16661045be9f6a... record new: [713] 0200005d0302ad835843813c1e3a952df95b1245da83f69f5f16661045be9f6a... server: Filtered packet: [718] 16030202c90200005d0302ad835843813c1e3a952df95b1245da83f69f5f1666... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... record old: [715] 0200005d03039d559dfd3de363c1508e1e3d6ae2f7fcb2327ab171a134b55a44... record new: [715] 0200005d03039d559dfd3de363c1508e1e3d6ae2f7fcb2327ab171a134b55a44... server: Filtered packet: [720] 16030302cb0200005d03039d559dfd3de363c1508e1e3d6ae2f7fcb2327ab171... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301f21b275d36118b8f75b94f14d107acd5b23186274c25453d59e5... record new: [1190] 020000570301f21b275d36118b8f75b94f14d107acd5b23186274c25453d59e5... server: Filtered packet: [1195] 16030104a6020000570301f21b275d36118b8f75b94f14d107acd5b23186274c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302c354270f4e5759fa0bbf18495e853570fe6137dc21ca729e5b68... record new: [1190] 020000570302c354270f4e5759fa0bbf18495e853570fe6137dc21ca729e5b68... server: Filtered packet: [1195] 16030204a6020000570302c354270f4e5759fa0bbf18495e853570fe6137dc21... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303a24fe043b7d65b5f31b7d6d07836f2d842c478c48fdebcda5418... record new: [1192] 020000570303a24fe043b7d65b5f31b7d6d07836f2d842c478c48fdebcda5418... server: Filtered packet: [1197] 16030304a8020000570303a24fe043b7d65b5f31b7d6d07836f2d842c478c48f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301f975fb45e45dc6fac92509310ed17fcbd011350431dedd126e15... record new: [1190] 020000570301f975fb45e45dc6fac92509310ed17fcbd011350431dedd126e15... server: Filtered packet: [1195] 16030104a6020000570301f975fb45e45dc6fac92509310ed17fcbd011350431... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302e86f9bb3c4953bf341f5d4608afebf3f32df189ef6e712b04a46... record new: [1190] 020000570302e86f9bb3c4953bf341f5d4608afebf3f32df189ef6e712b04a46... server: Filtered packet: [1195] 16030204a6020000570302e86f9bb3c4953bf341f5d4608afebf3f32df189ef6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303ae6ba60270b610abb613eea2e3ccf62cfc54bde9a98695e8473a... record new: [1192] 020000570303ae6ba60270b610abb613eea2e3ccf62cfc54bde9a98695e8473a... server: Filtered packet: [1197] 16030304a8020000570303ae6ba60270b610abb613eea2e3ccf62cfc54bde9a9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1190] 020000570301fd547f3d5e36310585c00ea8cdbc44d43fef5b7f6c1497b22452... record new: [1191] 020000570301fd547f3d5e36310585c00ea8cdbc44d43fef5b7f6c1497b22452... server: Filtered packet: [1196] 16030104a7020000570301fd547f3d5e36310585c00ea8cdbc44d43fef5b7f6c... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1190] 020000570302df1291e3e836c5448f6c87586e2227e6030535596f8c13d7a833... record new: [1191] 020000570302df1291e3e836c5448f6c87586e2227e6030535596f8c13d7a833... server: Filtered packet: [1196] 16030204a7020000570302df1291e3e836c5448f6c87586e2227e6030535596f... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1192] 02000057030314bcd793623df32e6f3eeca2229770f28dc0676618d2b8e05ca8... record new: [1193] 02000057030314bcd793623df32e6f3eeca2229770f28dc0676618d2b8e05ca8... server: Filtered packet: [1198] 16030304a902000057030314bcd793623df32e6f3eeca2229770f28dc0676618... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 (449 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/2 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1190] 0200005703014f30f0d0459190d0621a0eee4be24dd96a75f4aec8c589b4fe01... record new: [3622] 0200005703014f30f0d0459190d0621a0eee4be24dd96a75f4aec8c589b4fe01... server: Filtered packet: [3627] 1603010e260200005703014f30f0d0459190d0621a0eee4be24dd96a75f4aec8... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1190] 020000570302a3aefbc583858959e4eba5cb9a4c1cdcebfd68d9a966777ec3d8... record new: [3622] 020000570302a3aefbc583858959e4eba5cb9a4c1cdcebfd68d9a966777ec3d8... server: Filtered packet: [3627] 1603020e26020000570302a3aefbc583858959e4eba5cb9a4c1cdcebfd68d9a9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1192] 020000570303e87ca2a9d5c878167f4c1ebd8f96039ad59af3db444dfb011cfb... record new: [3622] 020000570303e87ca2a9d5c878167f4c1ebd8f96039ad59af3db444dfb011cfb... server: Filtered packet: [3627] 1603030e26020000570303e87ca2a9d5c878167f4c1ebd8f96039ad59af3db44... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 Version: TLS 1.0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1736] 0200005d030192e308e22d8d5a00c4dbdf64077d3719ae34d7eebc78f1e03612... record new: [1736] 0200005d030192e308e22d8d5a00c4dbdf64077d3719ae34d7eebc78f1e03612... server: Filtered packet: [1741] 16030106c80200005d030192e308e22d8d5a00c4dbdf64077d3719ae34d7eebc... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 Version: TLS 1.1 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [584] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1737] 0200005d03023dc22a9e3cc9b24b5207f96e229c8e70ba2beb943bb4ecfc9b76... record new: [1736] 0200005d03023dc22a9e3cc9b24b5207f96e229c8e70ba2beb943bb4ecfc9b76... server: Filtered packet: [1741] 16030206c80200005d03023dc22a9e3cc9b24b5207f96e229c8e70ba2beb943b... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/2 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [586] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1739] 0200005d0303ade04d1a939e9f97a31e7fb3d938f41868f61c9672ca78199712... record new: [1738] 0200005d0303ade04d1a939e9f97a31e7fb3d938f41868f61c9672ca78199712... server: Filtered packet: [1743] 16030306ca0200005d0303ade04d1a939e9f97a31e7fb3d938f41868f61c9672... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 Version: TLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 Version: TLS 1.1 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 Version: TLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 Version: TLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 Version: TLS 1.1 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 Version: TLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/0 (13 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/1 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/2 (13 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/2 (14 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 0301f6f137ae284ddf9b9feceb1fdfe8f063ea5ed1d37aec4de748ae0ac5d349... handshake new: [103] 0301f6f137ae284ddf9b9feceb1fdfe8f063ea5ed1d37aec4de748ae0ac5d349... record old: [121] 010000750301f6f137ae284ddf9b9feceb1fdfe8f063ea5ed1d37aec4de748ae... record new: [107] 010000670301f6f137ae284ddf9b9feceb1fdfe8f063ea5ed1d37aec4de748ae... client: Filtered packet: [112] 160301006b010000670301f6f137ae284ddf9b9feceb1fdfe8f063ea5ed1d37a... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 0302aefc67ec24a815db2744a1ae74831e492d059d0a65db140bb80824032c6e... handshake new: [103] 0302aefc67ec24a815db2744a1ae74831e492d059d0a65db140bb80824032c6e... record old: [121] 010000750302aefc67ec24a815db2744a1ae74831e492d059d0a65db140bb808... record new: [107] 010000670302aefc67ec24a815db2744a1ae74831e492d059d0a65db140bb808... client: Filtered packet: [112] 160301006b010000670302aefc67ec24a815db2744a1ae74831e492d059d0a65... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [187] 030309bbe56ced89342a34b37a04c2dcf9012e78627fe07c30839023f3b153c5... handshake new: [173] 030309bbe56ced89342a34b37a04c2dcf9012e78627fe07c30839023f3b153c5... record old: [191] 010000bb030309bbe56ced89342a34b37a04c2dcf9012e78627fe07c30839023... record new: [177] 010000ad030309bbe56ced89342a34b37a04c2dcf9012e78627fe07c30839023... client: Filtered packet: [182] 16030100b1010000ad030309bbe56ced89342a34b37a04c2dcf9012e78627fe0... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [4] 03001d00 record old: [713] 0200005d0301efb5a1ce6dc0e66923306f253e017891b60f89bc998c3f42d79f... record new: [551] 0200005d0301efb5a1ce6dc0e66923306f253e017891b60f89bc998c3f42d79f... server: Filtered packet: [556] 16030102270200005d0301efb5a1ce6dc0e66923306f253e017891b60f89bc99... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [4] 03001d00 record old: [713] 0200005d0302bcaca3a62bad082600576078b2d1730596dc098e3cf4a689c0cc... record new: [551] 0200005d0302bcaca3a62bad082600576078b2d1730596dc098e3cf4a689c0cc... server: Filtered packet: [556] 16030202270200005d0302bcaca3a62bad082600576078b2d1730596dc098e3c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [4] 03001d00 record old: [715] 0200005d0303f6b237ad992239caeb3d4d19db371b54dc00315fcdd8cc901788... record new: [551] 0200005d0303f6b237ad992239caeb3d4d19db371b54dc00315fcdd8cc901788... server: Filtered packet: [556] 16030302270200005d0303f6b237ad992239caeb3d4d19db371b54dc00315fcd... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 20dc7808f5242702677e56d90078e1dad76df04a45dc3e14b7e41dfa3ab45dbd... handshake new: [1] 00 record old: [37] 1000002120dc7808f5242702677e56d90078e1dad76df04a45dc3e14b7e41dfa... record new: [5] 1000000100 client: Filtered packet: [69] 160301000510000001001403010001011603010030416cf260a5b32ef4a7a63f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 200097b8ea85558f7bf67d27060c692a8898c3c6719ec8d7b05f77094cc8a088... handshake new: [1] 00 record old: [37] 10000021200097b8ea85558f7bf67d27060c692a8898c3c6719ec8d7b05f7709... record new: [5] 1000000100 client: Filtered packet: [85] 1603020005100000010014030200010116030200403e4a4223b4e03fd52dfb1d... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 206282778259ec4d5cba6a09353337105f31ff6315d3b76b5c7c71feee55e1c9... handshake new: [1] 00 record old: [37] 10000021206282778259ec4d5cba6a09353337105f31ff6315d3b76b5c7c71fe... record new: [5] 1000000100 client: Filtered packet: [61] 1603030005100000010014030300010116030300280000000000000000467468... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0100010102 record old: [713] 0200005d0301f85c426626178ee1b33eb732cfc0bdc4f77fcd5a119b41551f03... record new: [552] 0200005d0301f85c426626178ee1b33eb732cfc0bdc4f77fcd5a119b41551f03... server: Filtered packet: [557] 16030102280200005d0301f85c426626178ee1b33eb732cfc0bdc4f77fcd5a11... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0100010102 record old: [713] 0200005d030275ddaa2c69d2a6e0381d918cee3df8f1339064f5ca9ebc60bbaf... record new: [552] 0200005d030275ddaa2c69d2a6e0381d918cee3df8f1339064f5ca9ebc60bbaf... server: Filtered packet: [557] 16030202280200005d030275ddaa2c69d2a6e0381d918cee3df8f1339064f5ca... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0100010102 record old: [715] 0200005d03036fc6ed921bbb139c1d427987a6d7d8e6a3eb889acc756345a3e2... record new: [552] 0200005d03036fc6ed921bbb139c1d427987a6d7d8e6a3eb889acc756345a3e2... server: Filtered packet: [557] 16030302280200005d03036fc6ed921bbb139c1d427987a6d7d8e6a3eb889acc... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0301000102 record old: [713] 0200005d030147a0c6672e01d0d9d3471a1c06c9eebc334c4130e6fbc6b18dac... record new: [552] 0200005d030147a0c6672e01d0d9d3471a1c06c9eebc334c4130e6fbc6b18dac... server: Filtered packet: [557] 16030102280200005d030147a0c6672e01d0d9d3471a1c06c9eebc334c4130e6... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0301000102 record old: [713] 0200005d0302fb3c9d8fb1e382aa1818b81aefce9f08d49376ab702516b75eeb... record new: [552] 0200005d0302fb3c9d8fb1e382aa1818b81aefce9f08d49376ab702516b75eeb... server: Filtered packet: [557] 16030202280200005d0302fb3c9d8fb1e382aa1818b81aefce9f08d49376ab70... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0301000102 record old: [715] 0200005d0303bc10bdc52201c827a1040e74a6414c7b2bae15f5d711af5fa802... record new: [552] 0200005d0303bc10bdc52201c827a1040e74a6414c7b2bae15f5d711af5fa802... server: Filtered packet: [557] 16030302280200005d0303bc10bdc52201c827a1040e74a6414c7b2bae15f5d7... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0300170102 record old: [713] 0200005d0301d215f7b2e4602b469771216ff8702075f125d8ae6ad553c94254... record new: [552] 0200005d0301d215f7b2e4602b469771216ff8702075f125d8ae6ad553c94254... server: Filtered packet: [557] 16030102280200005d0301d215f7b2e4602b469771216ff8702075f125d8ae6a... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0300170102 record old: [713] 0200005d0302a9f6fbbfee362382bdd71736703cfc27660392e9eac869abf496... record new: [552] 0200005d0302a9f6fbbfee362382bdd71736703cfc27660392e9eac869abf496... server: Filtered packet: [557] 16030202280200005d0302a9f6fbbfee362382bdd71736703cfc27660392e9ea... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0300170102 record old: [715] 0200005d0303daf58b38c729674a4f668025931b02bb6618a3ca4139055172e2... record new: [552] 0200005d0303daf58b38c729674a4f668025931b02bb6618a3ca4139055172e2... server: Filtered packet: [557] 16030302280200005d0303daf58b38c729674a4f668025931b02bb6618a3ca41... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 030174aa277e5d5fe42014c7f6f824016095f5a5378674d53246054198f2f200... handshake new: [92] 030174aa277e5d5fe42014c7f6f824016095f5a5378674d53246054198f2f200... record old: [713] 0200005d030174aa277e5d5fe42014c7f6f824016095f5a5378674d532460541... record new: [712] 0200005c030174aa277e5d5fe42014c7f6f824016095f5a5378674d532460541... server: Filtered packet: [717] 16030102c80200005c030174aa277e5d5fe42014c7f6f824016095f5a5378674... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0302da41d1ba7ffaf8399e783ba771e55401a666cd5183562f4c73354e61abda... handshake new: [92] 0302da41d1ba7ffaf8399e783ba771e55401a666cd5183562f4c73354e61abda... record old: [713] 0200005d0302da41d1ba7ffaf8399e783ba771e55401a666cd5183562f4c7335... record new: [712] 0200005c0302da41d1ba7ffaf8399e783ba771e55401a666cd5183562f4c7335... server: Filtered packet: [717] 16030202c80200005c0302da41d1ba7ffaf8399e783ba771e55401a666cd5183... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 030372c67bfe9b36102401b60d86c6327b00ed47e2e3b4f85c62bf829c0b7978... handshake new: [92] 030372c67bfe9b36102401b60d86c6327b00ed47e2e3b4f85c62bf829c0b7978... record old: [715] 0200005d030372c67bfe9b36102401b60d86c6327b00ed47e2e3b4f85c62bf82... record new: [714] 0200005c030372c67bfe9b36102401b60d86c6327b00ed47e2e3b4f85c62bf82... server: Filtered packet: [719] 16030302ca0200005c030372c67bfe9b36102401b60d86c6327b00ed47e2e3b4... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [117] 0301bb42d3ca04725ac7eaccb61d39b8f71a1eea183c8964a1cd7c261a503ad7... handshake new: [117] 0301bb42d3ca04725ac7eaccb61d39b8f71a1eea183c8964a1cd7c261a503ad7... record old: [121] 010000750301bb42d3ca04725ac7eaccb61d39b8f71a1eea183c8964a1cd7c26... record new: [121] 010000750301bb42d3ca04725ac7eaccb61d39b8f71a1eea183c8964a1cd7c26... client: Filtered packet: [126] 1603010079010000750301bb42d3ca04725ac7eaccb61d39b8f71a1eea183c89... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [117] 0302372a5f4e9bb430f6cb9fa17dd3e0581f346f357eac332163b96679d51276... handshake new: [117] 0302372a5f4e9bb430f6cb9fa17dd3e0581f346f357eac332163b96679d51276... record old: [121] 010000750302372a5f4e9bb430f6cb9fa17dd3e0581f346f357eac332163b966... record new: [121] 010000750302372a5f4e9bb430f6cb9fa17dd3e0581f346f357eac332163b966... client: Filtered packet: [126] 1603010079010000750302372a5f4e9bb430f6cb9fa17dd3e0581f346f357eac... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [187] 0303a66424b872165c4b5559da5939a90ed5843bf4be1ec6ac323cd4f59de750... handshake new: [187] 0303a66424b872165c4b5559da5939a90ed5843bf4be1ec6ac323cd4f59de750... record old: [191] 010000bb0303a66424b872165c4b5559da5939a90ed5843bf4be1ec6ac323cd4... record new: [191] 010000bb0303a66424b872165c4b5559da5939a90ed5843bf4be1ec6ac323cd4... client: Filtered packet: [196] 16030100bf010000bb0303a66424b872165c4b5559da5939a90ed5843bf4be1e... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 Version: TLS 1.0 [ SKIPPED ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 (0 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 030201cccbd0e38731edce2452e6164e9a79d0e4805d7d6f012c41b1311a1dca... handshake new: [89] 030101cccbd0e38731edce2452e6164e9a79d0e4805d7d6f012c41b1311a1dca... record old: [93] 02000059030201cccbd0e38731edce2452e6164e9a79d0e4805d7d6f012c41b1... record new: [93] 02000059030101cccbd0e38731edce2452e6164e9a79d0e4805d7d6f012c41b1... server: Filtered packet: [173] 160302005d02000059030101cccbd0e38731edce2452e6164e9a79d0e4805d7d... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 0303437029da8248a8aae0501417650148fc3fdc52249365bb79014a650d17a6... handshake new: [89] 0302437029da8248a8aae0501417650148fc3fdc52249365bb79014a650d17a6... record old: [93] 020000590303437029da8248a8aae0501417650148fc3fdc52249365bb79014a... record new: [93] 020000590302437029da8248a8aae0501417650148fc3fdc52249365bb79014a... server: Filtered packet: [173] 160303005d020000590302437029da8248a8aae0501417650148fc3fdc522493... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 0200005703014ba839df9794789d64e418124e28e3a719638434e44610ec1230... record new: [2510] 0200005703014ba839df9794789d64e418124e28e3a719638434e44610ec1230... server: Filtered packet: [2515] 16030109ce0200005703014ba839df9794789d64e418124e28e3a719638434e4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 020000570302f8d658f584bcdc2df843ca9d97f80683fc82ea5347372637a5b6... record new: [2510] 020000570302f8d658f584bcdc2df843ca9d97f80683fc82ea5347372637a5b6... server: Filtered packet: [2515] 16030209ce020000570302f8d658f584bcdc2df843ca9d97f80683fc82ea5347... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 020000570303b62f05a90ecb8593040a9c2b59759658135fc43eb029bb7fd77d... record new: [2510] 020000570303b62f05a90ecb8593040a9c2b59759658135fc43eb029bb7fd77d... server: Filtered packet: [2515] 16030309ce020000570303b62f05a90ecb8593040a9c2b59759658135fc43eb0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 (3 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/2 (2 ms) [----------] 171 tests from Pre13Stream/TlsConnectGenericPre13 (1316 ms total) [----------] 114 tests from Pre13Datagram/TlsConnectGenericPre13 [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientAuthRequiredRejected/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [14] 14feff0000000000000004000101 record drop: DTLS 1.0 CCS 4:[1] 01 server: Filtered packet: [77] 16feff0001000000000000004055526c21fb438f5d284b550ccad2c6745bf6de... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [14] 14fefd0000000000000004000101 record drop: DTLS 1.2 CCS 4:[1] 01 server: Filtered packet: [61] 16fefd000100000000000000300001000000000000b8d1d3d2eb76014fc1936e... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [14] 14feff0000000000000004000101 record drop: DTLS 1.0 CCS 4:[1] 01 server: Filtered packet: [77] 16feff000100000000000000405e20557bc386e08fc0af2e762a6349f673a8b2... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [14] 14fefd0000000000000004000101 record drop: DTLS 1.2 CCS 4:[1] 01 server: Filtered packet: [61] 16fefd0001000000000000003000010000000000004e961bc3c9c8997a5648c3... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] feffb705bce864a9209df4d816b568db9d7f375a6b1eb1328a7b9e25c2d1ea34... handshake new: [98] feffb705bce864a9209df4d816b568db9d7f375a6b1eb1328a7b9e25c2d1ea34... record old: [109] 020000610000000000000061feffb705bce864a9209df4d816b568db9d7f375a... record new: [110] 020000620000000000000062feffb705bce864a9209df4d816b568db9d7f375a... server: Filtered packet: [837] 16feff0000000000000000006e020000620000000000000062feffb705bce864... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] fefd21781d564bf981ecc0f60c124c7987aa996730aff24233bc8fc14c0cc387... handshake new: [98] fefd21781d564bf981ecc0f60c124c7987aa996730aff24233bc8fc14c0cc387... record old: [109] 020000610000000000000061fefd21781d564bf981ecc0f60c124c7987aa9967... record new: [110] 020000620000000000000062fefd21781d564bf981ecc0f60c124c7987aa9967... server: Filtered packet: [839] 16fefd0000000000000000006e020000620000000000000062fefd21781d564b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... record old: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... server: Filtered packet: [797] 16feff000000000000000000690200005d000000000000005dfeff7f8d7e137b... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefdf8fea7379a... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffb6ffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff7de83762f3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffb6ffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd54d718b932... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffd17d284d63... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd84e870c01d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a010100ffffffffffffffffadf85458a2bb4a9aaf... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff632c7dbaf5... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c010100ffffffffffffffffadf85458a2bb4a9aaf... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefda186dd2a7d... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 (15 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [3093] 0c000c090002000000000c090401800000000000000000000000000000000000... server: Filtered packet: [3706] 16feff00000000000000000063020000570000000000000057feff3c91565b0b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [3093] 0c000c090002000000000c090401800000000000000000000000000000000000... server: Filtered packet: [3706] 16fefd00000000000000000063020000570000000000000057fefd9f6e8fc392... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 Version: DTLS 1.0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 2:[208] 0c00024800020000000000c40100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1187] 16feff000000000000000000690200005d000000000000005dfeff1cf8611e4d... handshake old: [584] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [400] 0c00024800020000c4000184fe9ce98583ff8e4f1232eef28183c3fe3b1b4c6f... record new: [595] 0c00024700020000000002470100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [633] 16feff000000000000000202530c00024700020000000002470100ffffffffff... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 2:[208] 0c00024b00020000000000c40100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1187] 16fefd000000000000000000690200005d000000000000005dfefd022bdb8d61... handshake old: [587] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [403] 0c00024b00020000c4000187fe9ce98583ff8e4f1232eef28183c3fe3b1b4c6f... record new: [597] 0c00024900020000000002490100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [635] 16fefd000000000000000202550c00024900020000000002490100ffffffffff... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 Version: DTLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 Version: DTLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 Version: DTLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 Version: DTLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/0 (12 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/1 (13 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 (15 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 (14 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [114] feffd439d4f751d4e7050cbc84748926e18fb5a77a9fda72ce1937b59a4979c9... handshake new: [100] feffd439d4f751d4e7050cbc84748926e18fb5a77a9fda72ce1937b59a4979c9... record old: [126] 010000720000000000000072feffd439d4f751d4e7050cbc84748926e18fb5a7... record new: [112] 010000640000000000000064feffd439d4f751d4e7050cbc84748926e18fb5a7... client: Filtered packet: [125] 16feff00000000000000000070010000640000000000000064feffd439d4f751... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [184] fefda1924558b9ff0ea1d9ad13ec4f3981f99756a66434618558e0235def4c94... handshake new: [170] fefda1924558b9ff0ea1d9ad13ec4f3981f99756a66434618558e0235def4c94... record old: [196] 010000b800000000000000b8fefda1924558b9ff0ea1d9ad13ec4f3981f99756... record new: [182] 010000aa00000000000000aafefda1924558b9ff0ea1d9ad13ec4f3981f99756... client: Filtered packet: [195] 16feff000000000000000000b6010000aa00000000000000aafefda1924558b9... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [4] 03001d00 record old: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [16] 0c000004000200000000000403001d00 server: Filtered packet: [635] 16feff000000000000000000690200005d000000000000005dfefffc3ae2c392... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [4] 03001d00 record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [16] 0c000004000200000000000403001d00 server: Filtered packet: [635] 16fefd000000000000000000690200005d000000000000005dfefda8759e12f2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 207fc5919b9eb000653d7b5a03fdea654e904f4acc261453bfed908e6df20760... handshake new: [1] 00 record old: [45] 100000210001000000000021207fc5919b9eb000653d7b5a03fdea654e904f4a... record new: [13] 10000001000100000000000100 client: Filtered packet: [117] 16feff0000000000000001000d1000000100010000000000010014feff000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 20d3251c9e316aed48b52b2f777f6189772d1a1fd26a95438cf23040b6bbfc9d... handshake new: [1] 00 record old: [45] 10000021000100000000002120d3251c9e316aed48b52b2f777f6189772d1a1f... record new: [13] 10000001000100000000000100 client: Filtered packet: [101] 16fefd0000000000000001000d1000000100010000000000010014fefd000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0100010102 record old: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [17] 0c00000500020000000000050100010102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff7f299f8e40... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0100010102 record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [17] 0c00000500020000000000050100010102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefdc98cbea564... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0301000102 record old: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [17] 0c00000500020000000000050301000102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff45c6d59841... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0301000102 record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [17] 0c00000500020000000000050301000102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefda245ff935e... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0300170102 record old: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [17] 0c00000500020000000000050300170102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff6ca92a5a06... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [5] 0300170102 record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [17] 0c00000500020000000000050300170102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefdc3a8eb43d6... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] feff385c612dd46916a8ad345ff523798d4cdffec235b7f5bad2aa4ef62b5d8c... handshake new: [92] feff385c612dd46916a8ad345ff523798d4cdffec235b7f5bad2aa4ef62b5d8c... record old: [105] 0200005d000000000000005dfeff385c612dd46916a8ad345ff523798d4cdffe... record new: [104] 0200005c000000000000005cfeff385c612dd46916a8ad345ff523798d4cdffe... server: Filtered packet: [796] 16feff000000000000000000680200005c000000000000005cfeff385c612dd4... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] fefdf44374f8d1257dadbc4655ec11cff45588e11507d3e1671fb8193cb75e80... handshake new: [92] fefdf44374f8d1257dadbc4655ec11cff45588e11507d3e1671fb8193cb75e80... record old: [105] 0200005d000000000000005dfefdf44374f8d1257dadbc4655ec11cff45588e1... record new: [104] 0200005c000000000000005cfefdf44374f8d1257dadbc4655ec11cff45588e1... server: Filtered packet: [798] 16fefd000000000000000000680200005c000000000000005cfefdf44374f8d1... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [114] feffe2958681fda60715c20e33c62c34bdea46988c3877a4ff4842000fdd5a0a... handshake new: [114] feffe2958681fda60715c20e33c62c34bdea46988c3877a4ff4842000fdd5a0a... record old: [126] 010000720000000000000072feffe2958681fda60715c20e33c62c34bdea4698... record new: [126] 010000720000000000000072feffe2958681fda60715c20e33c62c34bdea4698... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feffe2958681fd... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [184] fefd30bde4a48c209199188c52c2cc8efcb79b455094d5e1294e141b14edc944... handshake new: [184] fefd30bde4a48c209199188c52c2cc8efcb79b455094d5e1294e141b14edc944... record old: [196] 010000b800000000000000b8fefd30bde4a48c209199188c52c2cc8efcb79b45... record new: [196] 010000b800000000000000b8fefd30bde4a48c209199188c52c2cc8efcb79b45... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd30bde4a48c... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 Version: DTLS 1.0 [ SKIPPED ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 (0 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] fefd0dbc646bb60f57fb5e0024f5313c757c6e9c6e68f9ed40617179207cb12a... handshake new: [89] feff0dbc646bb60f57fb5e0024f5313c757c6e9c6e68f9ed40617179207cb12a... record old: [101] 020000590000000000000059fefd0dbc646bb60f57fb5e0024f5313c757c6e9c... record new: [101] 020000590000000000000059feff0dbc646bb60f57fb5e0024f5313c757c6e9c... server: Filtered packet: [205] 16fefd00000000000000000065020000590000000000000059feff0dbc646bb6... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [2423] 0b00096b000100000000096b0009680009653082096130820548a00302010202... server: Filtered packet: [2573] 16feff00000000000000000063020000570000000000000057feff99f36fdcb5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [2423] 0b00096b000100000000096b0009680009653082096130820548a00302010202... server: Filtered packet: [2573] 16fefd00000000000000000063020000570000000000000057fefddf68af3a27... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 (3 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 (2 ms) [----------] 114 tests from Pre13Datagram/TlsConnectGenericPre13 (583 ms total) [----------] 40 tests from Version12Only/TlsConnectTls12 [ RUN ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/0 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthCheckSigAlg/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/0 Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/0 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/1 Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ClientAuthBigRsaCheckSigAlg/1 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/0 Version: TLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0809008050b627992aac6a00425e6b98ebf0f28732dc28b6275cc176e16662b9... handshake new: [132] 0804008050b627992aac6a00425e6b98ebf0f28732dc28b6275cc176e16662b9... record old: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... record new: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... client: Filtered packet: [835] 160303030b0b00025a0002570002543082025030820185a00302010202010630... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/0 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/1 Version: DTLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0809008095f168ab9e72e0c8303e694d8a8048c2f09e75b21693e2f295a21749... handshake new: [132] 0804008095f168ab9e72e0c8303e694d8a8048c2f09e75b21693e2f295a21749... record old: [144] 0f00008400030000000000840809008095f168ab9e72e0c8303e694d8a8048c2... record new: [144] 0f00008400030000000000840804008095f168ab9e72e0c8303e694d8a8048c2... client: Filtered packet: [917] 16fefd000000000000000102660b00025a000100000000025a00025700025430... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentRsaeSignatureScheme/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/0 Version: TLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008026c68299167287629402dbda38d41a3e725f9c91d10b124b433d1cd3... handshake new: [132] 0809008026c68299167287629402dbda38d41a3e725f9c91d10b124b433d1cd3... record old: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... record new: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... client: Filtered packet: [671] 16030302670b0001b60001b30001b0308201ac30820115a00302010202010230... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/1 Version: DTLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008054021278a359819d2b9696de668eb7e96722e08625752752551d1123... handshake new: [132] 0809008054021278a359819d2b9696de668eb7e96722e08625752752551d1123... record old: [144] 0f00008400030000000000840804008054021278a359819d2b9696de668eb7e9... record new: [144] 0f00008400030000000000840809008054021278a359819d2b9696de668eb7e9... client: Filtered packet: [753] 16fefd000000000000000101c20b0001b600010000000001b60001b30001b030... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthInconsistentPssSignatureScheme/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [757] 0200005d03034e6ceefa3daf6b4f7288557f0fce5b423744b8375c910685f3d7... record new: [727] 0200005d03034e6ceefa3daf6b4f7288557f0fce5b423744b8375c910685f3d7... server: Filtered packet: [732] 16030302d70200005d03034e6ceefa3daf6b4f7288557f0fce5b423744b8375c... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [20] 0d00000800030000000000080301400200000000 server: Filtered packet: [832] 16fefd000000000000000000690200005d000000000000005dfefd8d0e0530b9... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ClientAuthNoSigAlgs/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/1 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [32] 001e040305030603020308040805080604010501060102010402050206020202 handshake old: [187] 03035bc63a6f9004931314922b5e9f71c85f821f5c89ca71c1e141cd06621fe0... handshake new: [151] 03035bc63a6f9004931314922b5e9f71c85f821f5c89ca71c1e141cd06621fe0... record old: [191] 010000bb03035bc63a6f9004931314922b5e9f71c85f821f5c89ca71c1e141cd... record new: [155] 0100009703035bc63a6f9004931314922b5e9f71c85f821f5c89ca71c1e141cd... client: Filtered packet: [160] 160301009b0100009703035bc63a6f9004931314922b5e9f71c85f821f5c89ca... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [32] 001e040305030603020308040805080604010501060102010402050206020202 handshake old: [184] fefdb48a12c91ff347d1aa69af786cbf69afcbd1fc01e7b4e0d6295ea48549d6... handshake new: [148] fefdb48a12c91ff347d1aa69af786cbf69afcbd1fc01e7b4e0d6295ea48549d6... record old: [196] 010000b800000000000000b8fefdb48a12c91ff347d1aa69af786cbf69afcbd1... record new: [160] 010000940000000000000094fefdb48a12c91ff347d1aa69af786cbf69afcbd1... client: Filtered packet: [173] 16feff000000000000000000a0010000940000000000000094fefdb48a12c91f... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/0 (1 ms) [ RUN ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/1 (2 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030397965857c80fe63f3f7de9c555224e45122d1fe9274ccb2064e4... record new: [1192] 02000057030397965857c80fe63f3f7de9c555224e45122d1fe9274ccb2064e4... server: Filtered packet: [1197] 16030304a802000057030397965857c80fe63f3f7de9c555224e45122d1fe927... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd82bc882aaf... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/0 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/1 (8 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/0 (7 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/1 (9 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectEcdheP384/0 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectEcdheP384/0 (22 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectEcdheP384/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectEcdheP384/1 (22 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... record old: [715] 0200005d0303eb88ff599edeac26061ca75d6470c157e3f082e87610488a8022... record new: [715] 0200005d0303eb88ff599edeac26061ca75d6470c157e3f082e87610488a8022... server: Filtered packet: [720] 16030302cb0200005d0303eb88ff599edeac26061ca75d6470c157e3f082e876... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefdc97bdb43ac... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... record old: [715] 0200005d0303ea23f7a2ef976612be5752d135dee7c75f8bae58b970f443a8fb... record new: [715] 0200005d0303ea23f7a2ef976612be5752d135dee7c75f8bae58b970f443a8fb... server: Filtered packet: [720] 16030302cb0200005d0303ea23f7a2ef976612be5752d135dee7c75f8bae58b9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... handshake new: [168] 03001d20026e0bc3402310e4ffda21554fce1b028800ae5a702036320e8c6ce2... record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefd42e26addbc... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/1 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/0 (3 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/1 (4 ms) [----------] 40 tests from Version12Only/TlsConnectTls12 (217 ms total) [----------] 30 tests from SignatureSchemeRsa/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/4 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/5 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/6 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/7 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/8 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/9 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/4 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/5 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/6 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/7 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/8 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/9 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/4 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/5 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/6 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/7 (3 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/8 (4 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/9 (3 ms) [----------] 30 tests from SignatureSchemeRsa/TlsSignatureSchemeConfiguration (105 ms total) [----------] 12 tests from SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (4 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (4 ms) [----------] 12 tests from SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration (48 ms total) [----------] 12 tests from SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (6 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (7 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (5 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (7 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (5 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (7 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (6 ms) [----------] 12 tests from SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration (73 ms total) [----------] 6 tests from SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (3 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (4 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (3 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (4 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (3 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (3 ms) [----------] 6 tests from SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration (21 ms total) [----------] 12 tests from SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (7 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (7 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (4 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (5 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (6 ms) [----------] 12 tests from SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration (63 ms total) [----------] 12 tests from SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (13 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (13 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (13 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (13 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (12 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (12 ms) [----------] 12 tests from SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration (114 ms total) [----------] 12 tests from SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (9 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (5 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (9 ms) [----------] 12 tests from SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration (86 ms total) [----------] 12 tests from SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (13 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (6 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (13 ms) [----------] 12 tests from SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration (114 ms total) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 (5 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 (13 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 (13 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 (5 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 (3 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 (8 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 (4 ms) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest (408 ms total) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (10 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 (8 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 (8 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 (3 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 (3 ms) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (263 ms total) [----------] 72 tests from CipherSuiteAEAD/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/12 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/13 (12 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/14 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/15 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/16 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/17 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/12 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/13 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/14 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/15 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/16 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/17 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 (5 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 (3 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/12 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/13 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/14 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/15 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/16 (4 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/17 (8 ms) [----------] 72 tests from CipherSuiteAEAD/TlsCipherSuiteTest (479 ms total) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 (12 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 (1 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 (11 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 (11 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 (3 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 (9 ms) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest (403 ms total) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 (7 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 (3 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 (4 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 (3 ms) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (1449 ms total) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 (4 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 (8 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 (3 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 (5 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 (3 ms) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (730 ms total) [----------] 3520 tests from CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/0 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/2 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/3 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/4 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/5 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/6 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/7 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/8 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/9 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/10 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/11 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/12 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/13 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/14 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/15 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/16 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/17 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/18 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/19 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/20 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/21 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/22 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/23 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/24 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/25 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/26 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/27 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/28 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/29 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/30 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/31 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/32 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/33 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/34 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/35 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/36 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/37 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/38 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/39 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/40 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/41 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/42 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/43 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/44 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/45 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/46 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/47 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/48 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/49 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/50 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/51 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/52 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/53 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/54 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/55 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/56 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/57 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/58 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/59 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/60 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/61 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/62 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/63 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/64 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/65 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/66 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/67 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/68 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/69 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/70 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/71 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/72 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/73 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/74 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/75 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/76 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/77 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/78 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/79 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/80 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/81 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/82 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/83 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/84 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/85 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/86 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/87 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/88 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/89 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/90 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/91 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/92 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/93 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/94 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/95 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/96 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/97 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/98 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/99 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/100 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/101 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/102 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/103 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/104 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/105 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/106 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/107 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/108 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/109 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/111 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/112 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/113 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/114 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/115 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/116 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/117 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/118 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/119 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/120 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/121 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/122 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/123 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/124 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/125 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/126 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/127 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/128 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/129 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/130 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/131 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/132 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/133 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/134 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/135 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/136 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/137 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/138 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/139 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/140 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/141 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/142 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/143 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/144 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/145 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/146 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/147 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/148 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/149 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/150 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/151 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/152 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/153 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/154 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/155 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/156 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/157 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/158 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/159 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/160 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/161 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/162 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/163 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/164 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/165 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/166 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/167 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/168 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/169 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/170 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/171 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/172 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/173 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/174 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/175 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/176 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/177 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/178 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/179 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/180 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/181 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/182 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/183 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/184 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/185 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/186 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/187 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/188 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/189 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/190 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/191 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/192 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/193 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/194 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/195 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/196 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/197 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/198 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/199 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/200 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/201 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/202 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/203 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/204 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/205 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/206 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/207 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/208 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/209 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/210 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/211 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/212 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/213 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/214 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/215 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/216 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/217 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/218 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/219 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/220 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/221 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/222 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/223 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/224 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/225 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/226 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/227 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/228 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/229 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/230 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/231 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/232 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/233 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/234 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/235 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/236 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/237 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/238 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/239 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/240 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/241 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/242 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/243 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/244 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/245 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/246 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/247 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/248 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/249 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/250 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/251 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/252 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/253 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/254 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/255 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/256 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/257 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/258 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/259 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/260 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/261 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/262 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/263 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/264 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/265 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/266 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/267 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/268 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/269 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/270 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/271 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/272 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/273 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/274 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/275 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/276 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/277 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/278 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/279 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/280 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/281 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/282 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/283 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/284 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/285 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/286 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/287 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/288 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/289 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/290 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/291 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/292 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/293 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/294 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/295 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/296 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/297 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/298 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/299 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/300 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/301 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/302 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/303 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/304 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/305 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/306 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/307 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/308 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/309 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/310 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/311 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/312 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/313 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/314 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/315 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/316 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/317 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/318 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/319 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/320 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/321 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/322 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/323 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/324 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/325 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/326 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/327 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/328 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/329 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/330 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/331 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/332 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/333 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/334 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/335 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/336 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/337 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/338 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/339 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/340 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/341 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/342 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/343 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/344 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/345 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/346 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/347 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/348 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/349 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/350 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/351 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/352 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/353 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/354 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/355 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/356 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/357 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/358 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/359 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/360 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/361 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/362 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/363 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/364 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/365 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/366 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/367 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/368 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/369 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/370 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/371 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/372 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/373 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/374 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/375 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/376 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/377 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/378 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/379 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/380 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/381 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/382 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/383 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/384 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/385 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/386 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/387 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/388 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/389 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/390 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/391 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/392 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/393 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/394 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/395 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/396 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/397 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/398 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/399 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/400 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/401 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/402 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/403 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/404 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/405 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/406 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/407 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/408 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/409 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/410 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/411 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/412 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/413 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/414 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/415 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/416 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/417 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/418 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/419 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/420 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/421 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/422 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/423 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/424 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/425 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/426 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/427 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/428 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/429 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/430 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/431 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/432 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/433 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/434 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/435 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/436 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/437 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/438 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/439 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/440 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/441 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/442 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/443 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/444 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/445 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/446 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/447 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/448 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/449 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/450 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/451 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/452 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/453 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/454 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/455 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/456 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/457 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/458 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/459 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/460 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/461 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/462 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/463 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/464 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/465 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/466 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/467 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/468 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/469 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/470 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/471 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/472 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/473 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/474 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/475 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/476 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/477 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/478 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/479 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/480 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/481 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/482 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/483 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/484 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/485 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/486 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/487 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/488 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/489 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/490 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/491 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/492 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/493 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/494 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/495 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/496 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/497 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/498 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/499 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/500 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/501 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/502 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/503 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/504 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/505 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/506 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/507 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/508 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/509 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/510 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/511 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/512 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/513 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/514 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/515 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/516 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/517 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/518 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/519 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/520 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/521 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/522 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/523 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/524 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/525 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/526 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/527 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/528 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/529 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/530 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/531 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/532 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/533 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/534 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/535 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/536 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/537 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/538 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/539 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/540 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/541 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/542 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/543 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/544 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/545 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/546 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/547 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/548 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/549 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/550 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/551 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/552 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/553 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/554 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/555 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/556 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/557 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/558 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/559 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/560 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/561 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/562 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/563 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/564 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/565 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/566 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/567 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/568 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/569 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/570 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/571 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/572 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/573 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/574 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/575 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/576 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/577 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/578 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/579 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/580 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/581 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/582 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/583 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/584 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/585 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/586 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/587 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/588 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/589 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/590 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/591 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/592 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/593 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/594 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/595 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/596 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/597 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/598 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/599 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/601 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/602 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/603 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/604 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/605 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/606 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/607 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/608 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/609 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/610 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/611 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/612 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/613 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/614 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/616 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/617 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/618 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/619 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/620 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/621 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/622 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/623 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/624 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/626 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/628 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/629 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/630 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/631 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/633 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/634 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/635 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/637 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/638 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/639 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/640 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/642 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/644 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/645 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/646 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/647 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/649 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/650 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/651 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/652 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/653 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/654 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/655 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/656 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/658 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/659 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/660 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/661 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/662 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/663 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/664 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/665 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/666 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/667 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/668 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/669 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/670 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/671 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/672 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/673 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/674 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/675 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/676 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/677 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/678 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/679 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/680 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/681 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/682 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/683 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/684 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/685 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/686 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/687 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/688 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/689 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/690 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/691 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/692 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/693 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/694 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/695 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/696 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/697 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/698 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/699 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/700 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/701 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/702 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/703 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/704 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/705 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/706 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/707 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/708 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/709 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/710 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/711 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/712 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/713 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/714 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/715 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/716 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/717 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/718 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/719 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/720 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/721 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/722 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/723 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/724 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/725 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/726 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/727 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/728 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/729 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/730 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/731 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/732 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/733 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/734 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/735 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/736 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/737 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/738 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/739 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/740 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/741 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/742 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/743 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/744 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/745 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/746 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/747 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/748 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/749 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/750 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/751 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/752 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/753 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/754 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/755 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/756 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/757 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/758 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/759 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/760 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/761 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/762 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/763 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/764 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/765 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/766 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/767 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/768 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/769 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/770 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/771 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/772 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/773 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/774 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/776 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/777 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/778 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/779 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/780 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/781 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/782 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/784 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/785 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/786 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/787 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/788 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/789 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/790 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/791 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/792 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/793 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/794 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/795 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/796 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/797 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/798 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/799 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/800 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/801 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/802 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/803 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/804 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/805 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/806 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/807 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/808 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/809 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/810 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/811 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/812 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/813 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/814 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/815 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/816 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/817 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/818 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/819 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/820 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/821 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/822 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/823 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/824 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/825 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/826 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/827 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/828 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/829 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/830 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/831 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/832 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/833 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/834 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/835 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/836 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/837 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/838 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/839 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/840 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/841 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/842 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/843 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/844 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/845 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/846 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/847 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/848 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/849 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/850 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/851 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/852 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/853 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/854 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/855 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/856 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/857 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/858 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/859 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/860 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/861 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/862 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/863 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/864 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/865 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/866 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/867 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/868 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/869 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/870 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/871 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/872 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/873 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/874 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/875 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/876 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/877 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/878 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/879 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/0 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/2 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/3 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/4 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/5 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/6 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/7 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/8 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/9 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/10 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/11 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/12 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/13 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/14 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/15 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/16 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/17 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/18 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/19 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/20 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/21 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/22 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/23 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/24 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/25 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/26 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/27 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/28 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/29 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/30 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/31 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/32 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/33 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/34 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/35 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/36 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/37 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/38 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/39 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/40 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/41 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/42 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/43 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/44 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/45 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/46 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/47 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/48 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/49 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/50 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/51 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/52 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/53 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/54 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/55 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/56 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/57 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/58 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/59 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/60 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/61 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/62 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/63 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/64 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/65 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/66 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/67 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/68 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/69 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/70 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/71 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/72 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/73 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/74 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/75 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/76 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/77 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/78 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/79 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/80 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/81 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/82 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/83 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/84 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/85 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/86 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/87 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/88 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/89 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/90 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/91 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/92 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/93 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/94 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/95 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/96 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/97 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/98 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/99 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/100 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/101 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/102 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/103 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/104 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/105 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/106 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/107 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/108 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/109 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/110 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/111 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/112 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/113 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/114 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/115 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/116 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/117 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/118 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/119 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/120 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/121 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/122 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/123 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/124 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/125 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/126 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/127 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/128 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/129 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/130 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/131 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/132 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/133 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/134 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/135 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/136 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/137 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/138 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/139 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/140 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/141 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/142 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/143 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/144 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/145 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/146 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/147 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/148 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/149 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/150 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/151 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/152 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/153 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/154 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/155 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/156 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/157 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/158 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/159 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/160 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/161 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/162 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/163 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/164 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/165 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/166 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/167 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/168 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/169 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/170 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/171 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/172 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/173 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/174 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/175 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/176 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/177 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/178 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/179 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/180 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/181 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/182 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/183 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/184 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/185 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/186 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/187 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/188 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/189 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/190 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/191 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/192 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/193 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/194 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/195 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/196 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/197 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/198 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/199 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/200 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/201 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/202 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/203 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/204 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/205 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/206 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/207 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/208 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/209 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/210 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/211 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/212 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/213 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/214 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/215 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/216 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/217 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/218 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/219 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/220 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/221 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/222 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/223 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/224 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/225 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/226 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/227 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/228 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/229 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/230 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/231 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/232 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/233 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/234 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/235 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/236 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/237 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/238 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/239 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/240 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/241 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/242 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/243 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/244 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/245 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/246 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/247 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/248 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/249 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/250 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/251 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/252 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/253 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/254 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/255 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/256 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/257 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/258 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/259 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/260 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/261 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/262 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/263 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/264 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/265 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/266 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/267 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/268 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/269 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/270 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/271 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/272 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/273 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/274 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/275 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/276 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/277 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/278 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/279 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/280 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/281 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/282 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/283 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/284 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/285 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/286 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/287 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/288 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/289 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/290 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/291 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/292 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/293 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/294 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/295 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/296 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/297 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/298 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/299 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/300 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/301 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/302 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/303 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/304 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/305 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/306 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/307 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/308 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/309 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/310 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/311 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/312 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/313 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/314 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/315 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/316 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/317 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/318 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/319 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/320 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/321 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/322 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/323 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/324 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/325 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/326 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/327 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/328 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/329 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/440 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/441 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/442 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/443 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/444 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/445 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/446 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/447 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/448 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/449 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/450 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/451 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/452 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/453 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/454 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/455 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/456 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/457 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/458 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/459 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/460 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/461 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/462 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/463 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/464 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/465 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/466 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/467 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/468 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/469 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/470 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/471 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/472 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/473 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/474 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/475 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/476 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/477 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/478 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/479 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/480 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/481 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/482 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/483 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/484 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/485 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/486 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/487 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/488 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/489 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/490 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/491 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/492 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/493 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/494 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/495 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/496 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/497 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/498 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/499 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/500 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/501 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/502 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/503 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/504 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/505 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/506 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/507 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/508 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/509 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/510 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/511 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/512 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/513 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/514 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/515 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/516 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/517 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/518 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/519 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/520 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/521 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/522 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/523 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/524 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/525 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/526 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/527 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/528 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/529 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/530 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/531 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/532 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/533 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/534 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/535 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/536 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/537 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/538 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/539 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/540 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/541 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/542 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/543 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/544 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/545 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/546 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/547 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/548 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/549 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/550 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/551 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/552 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/553 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/554 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/555 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/556 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/557 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/558 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/559 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/560 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/561 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/562 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/563 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/564 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/565 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/566 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/567 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/568 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/569 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/570 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/571 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/572 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/573 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/574 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/575 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/576 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/577 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/578 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/579 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/580 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/581 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/582 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/583 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/584 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/585 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/586 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/587 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/588 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/589 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/590 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/591 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/592 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/593 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/594 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/595 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/596 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/597 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/598 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/599 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/600 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/601 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/602 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/603 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/604 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/605 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/606 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/607 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/608 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/609 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/610 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/611 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/612 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/613 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/614 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/615 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/616 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/617 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/618 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/619 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/620 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/621 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/622 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/623 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/624 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/625 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/626 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/627 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/628 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/629 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/630 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/631 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/632 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/633 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/634 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/635 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/636 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/637 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/638 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/639 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/640 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/641 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/642 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/643 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/644 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/645 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/646 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/647 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/648 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/649 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/650 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/651 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/652 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/653 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/654 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/655 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/656 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/657 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/658 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/659 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/660 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/661 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/662 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/663 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/664 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/665 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/666 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/667 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/668 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/669 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/670 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/671 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/672 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/673 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/674 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/675 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/676 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/677 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/678 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/679 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/680 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/681 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/682 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/683 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/684 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/685 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/686 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/687 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/688 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/689 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/690 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/691 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/692 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/693 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/694 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/695 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/696 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/697 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/698 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/699 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/700 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/701 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/702 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/703 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/704 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/705 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/706 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/707 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/708 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/709 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/710 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/711 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/712 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/713 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/714 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/715 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/716 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/717 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/718 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/719 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/720 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/721 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/722 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/723 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/724 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/725 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/726 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/727 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/728 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/729 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/730 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/731 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/732 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/733 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/734 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/735 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/736 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/737 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/738 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/739 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/740 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/741 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/742 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/743 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/744 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/745 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/746 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/747 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/748 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/749 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/750 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/751 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/752 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/753 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/754 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/755 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/756 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/757 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/758 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/759 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/760 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/761 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/762 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/763 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/764 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/765 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/766 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/767 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/768 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/769 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 (1 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/0 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/2 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/3 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/4 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/5 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/6 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/7 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/8 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/9 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/10 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/11 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/12 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/13 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/14 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/15 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/16 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/17 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/18 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/19 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/20 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/21 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/22 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/23 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/24 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/25 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/26 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/27 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/28 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/29 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/30 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/31 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/32 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/33 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/34 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/35 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/36 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/37 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/38 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/39 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/40 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/41 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/42 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/43 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/44 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/45 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/46 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/47 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/48 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/49 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/50 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/51 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/52 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/53 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/54 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/55 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/56 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/57 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/58 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/59 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/60 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/61 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/62 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/63 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/64 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/65 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/66 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/67 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/68 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/69 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/70 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/71 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/72 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/73 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/74 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/75 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/76 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/77 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/78 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/79 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/80 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/81 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/82 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/83 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/84 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/85 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/86 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/87 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/88 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/89 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/90 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/91 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/92 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/93 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/94 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/95 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/96 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/97 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/98 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/99 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/100 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/101 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/102 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/103 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/104 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/105 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/106 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/107 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/108 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/109 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/111 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/112 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/113 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/114 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/115 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/116 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/117 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/118 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/119 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/120 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/121 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/122 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/123 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/124 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/125 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/126 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/127 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/128 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/129 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/130 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/131 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/132 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/133 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/134 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/135 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/136 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/137 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/138 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/139 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/140 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/141 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/142 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/143 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/144 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/145 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/146 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/147 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/148 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/149 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/150 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/151 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/152 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/153 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/154 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/155 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/156 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/157 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/158 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/159 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/160 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/161 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/162 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/163 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/164 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/165 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/166 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/167 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/168 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/169 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/170 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/171 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/172 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/173 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/174 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/175 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/176 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/177 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/178 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/179 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/180 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/181 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/182 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/183 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/184 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/185 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/186 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/187 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/188 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/189 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/190 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/191 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/192 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/193 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/194 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/195 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/196 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/197 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/198 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/199 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/200 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/201 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/202 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/203 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/204 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/205 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/206 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/207 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/208 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/209 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/210 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/211 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/212 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/213 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/214 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/215 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/216 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/217 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/218 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/219 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/220 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/221 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/222 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/223 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/224 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/225 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/226 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/227 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/228 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/229 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/230 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/231 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/232 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/233 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/234 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/235 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/236 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/237 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/238 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/239 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/240 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/241 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/242 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/243 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/244 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/245 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/246 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/247 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/248 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/249 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/250 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/251 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/252 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/253 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/254 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/255 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/256 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/257 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/258 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/259 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/260 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/261 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/262 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/263 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/264 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/265 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/266 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/267 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/268 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/269 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/270 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/271 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/272 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/273 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/274 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/275 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/276 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/277 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/278 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/279 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/280 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/281 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/282 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/283 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/284 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/285 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/286 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/287 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/288 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/289 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/290 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/291 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/292 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/293 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/294 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/295 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/296 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/297 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/298 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/299 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/300 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/301 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/302 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/303 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/304 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/305 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/306 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/307 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/308 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/309 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/310 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/311 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/312 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/313 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/314 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/315 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/316 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/317 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/318 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/319 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/320 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/321 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/322 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/323 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/324 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/325 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/326 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/327 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/328 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/329 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/330 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/331 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/332 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/333 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/334 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/335 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/336 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/337 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/338 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/339 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/340 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/341 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/342 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/343 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/344 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/345 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/346 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/347 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/348 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/349 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/350 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/351 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/352 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/353 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/354 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/355 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/356 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/357 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/358 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/359 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/360 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/361 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/362 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/363 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/364 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/365 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/366 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/367 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/368 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/369 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/370 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/371 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/372 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/373 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/374 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/375 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/376 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/377 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/378 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/379 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/380 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/381 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/382 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/383 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/384 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/385 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/386 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/387 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/388 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/389 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/390 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/391 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/392 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/393 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/394 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/395 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/396 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/397 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/398 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/399 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/400 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/401 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/402 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/403 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/404 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/405 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/406 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/407 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/408 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/409 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/410 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/411 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/412 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/413 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/414 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/415 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/416 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/417 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/418 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/419 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/420 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/421 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/422 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/423 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/424 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/425 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/426 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/427 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/428 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/429 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/430 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/431 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/432 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/433 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/434 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/435 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/436 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/437 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/438 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/439 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/440 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/441 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/442 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/443 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/444 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/445 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/446 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/447 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/448 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/449 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/450 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/451 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/452 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/453 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/454 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/455 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/456 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/457 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/458 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/459 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/460 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/461 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/462 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/463 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/464 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/465 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/466 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/467 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/468 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/469 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/470 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/471 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/472 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/473 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/474 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/475 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/476 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/477 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/478 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/479 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/480 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/481 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/482 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/483 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/484 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/485 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/486 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/487 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/488 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/489 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/490 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/491 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/492 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/493 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/494 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/495 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/496 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/497 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/498 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/499 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/500 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/501 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/502 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/503 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/504 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/505 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/506 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/507 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/508 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/509 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/510 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/511 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/512 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/513 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/514 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/515 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/516 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/517 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/518 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/519 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/520 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/521 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/522 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/523 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/524 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/525 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/526 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/527 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/528 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/529 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/530 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/531 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/532 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/533 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/534 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/535 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/536 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/537 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/538 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/539 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/540 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/541 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/542 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/543 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/544 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/545 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/546 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/547 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/548 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/549 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/550 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/551 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/552 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/553 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/554 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/555 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/556 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/557 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/558 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/559 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/560 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/561 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/562 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/563 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/564 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/565 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/566 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/567 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/568 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/569 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/570 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/571 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/572 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/573 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/574 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/575 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/576 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/577 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/578 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/579 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/580 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/581 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/582 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/583 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/584 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/585 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/586 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/587 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/588 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/589 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/590 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/591 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/592 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/593 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/594 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/595 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/596 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/597 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/598 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/599 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/601 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/602 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/603 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/606 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/607 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/608 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/609 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/610 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/611 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/612 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/613 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/614 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/616 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/617 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/618 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/619 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/620 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/621 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/622 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/623 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/624 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/626 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/628 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/629 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/631 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/633 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/634 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/635 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/637 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/638 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/639 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/640 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/641 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/642 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/644 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/645 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/646 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/647 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/649 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/650 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/651 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/652 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/653 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/654 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/655 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/656 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/657 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/658 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/659 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/660 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/661 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/662 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/663 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/664 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/665 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/666 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/667 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/668 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/669 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/670 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/671 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/672 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/673 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/674 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/675 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/676 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/677 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/678 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/679 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/680 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/681 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/682 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/683 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/684 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/685 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/686 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/687 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/688 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/689 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/690 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/691 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/692 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/693 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/694 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/695 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/696 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/697 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/698 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/699 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/700 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/701 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/702 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/703 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/704 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/705 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/706 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/707 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/708 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/709 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/710 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/711 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/712 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/713 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/714 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/715 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/716 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/717 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/718 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/719 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/720 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/721 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/722 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/723 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/724 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/725 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/726 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/727 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/728 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/729 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/730 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/731 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/732 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/733 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/734 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/735 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/736 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/737 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/738 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/739 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/740 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/741 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/742 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/743 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/744 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/745 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/746 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/747 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/748 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/749 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/750 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/751 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/752 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/753 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/754 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/755 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/756 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/757 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/758 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/759 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/760 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/761 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/762 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/763 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/764 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/765 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/766 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/767 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/768 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/769 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/770 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/771 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/772 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/773 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/774 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/776 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/777 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/778 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/779 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/780 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/781 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/782 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/784 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/785 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/786 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/787 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/788 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/789 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/790 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/791 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/792 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/793 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/794 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/795 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/796 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/797 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/798 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/799 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/800 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/801 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/802 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/803 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/804 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/805 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/806 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/807 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/808 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/809 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/810 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/811 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/812 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/813 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/814 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/815 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/816 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/817 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/818 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/819 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/820 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/821 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/822 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/823 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/824 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/825 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/826 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/827 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/828 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/829 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/830 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/831 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/832 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/833 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/834 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/835 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/836 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/837 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/838 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/839 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/840 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/841 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/842 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/843 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/844 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/845 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/846 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/847 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/848 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/849 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/850 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/851 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/852 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/853 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/854 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/855 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/856 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/857 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/858 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/859 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/860 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/861 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/862 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/863 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/864 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/865 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/866 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/867 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/868 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/869 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/870 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/871 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/872 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/873 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/874 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/875 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/876 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/877 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/878 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/879 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/0 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/2 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/3 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/4 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/5 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/6 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/7 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/8 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/9 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/10 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/11 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/12 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/13 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/14 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/15 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/16 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/17 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/18 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/19 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/20 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/21 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/22 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/23 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/24 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/25 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/26 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/27 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/28 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/29 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/30 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/31 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/32 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/33 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/34 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/35 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/36 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/37 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/38 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/39 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/40 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/41 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/42 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/43 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/44 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/45 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/46 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/47 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/48 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/49 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/50 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/51 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/52 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/53 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/54 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/55 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/55 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/56 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/56 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/57 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/57 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/58 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/58 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/59 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/59 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/60 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/60 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/61 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/61 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/62 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/62 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/63 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/63 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/64 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/64 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/65 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/65 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/66 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/67 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/68 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/69 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/70 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/71 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/72 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/73 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/74 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/75 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/76 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/77 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/78 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/79 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/80 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/81 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/82 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/83 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/84 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/85 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/86 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/87 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/88 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/89 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/90 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/91 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/92 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/93 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/94 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/95 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/96 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/97 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/98 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/99 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/100 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/101 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/102 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/103 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/104 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/105 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/106 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/107 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/108 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/109 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/110 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/111 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/111 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/112 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/112 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/113 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/113 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/114 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/114 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/115 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/115 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/116 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/116 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/117 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/117 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/118 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/118 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/119 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/119 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/120 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/120 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/121 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/121 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/122 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/122 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/123 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/123 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/124 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/124 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/125 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/125 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/126 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/126 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/127 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/127 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/128 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/128 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/129 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/129 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/130 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/130 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/131 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/131 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/132 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/133 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/134 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/135 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/136 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/137 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/138 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/139 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/140 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/141 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/142 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/143 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/144 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/145 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/146 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/147 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/148 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/149 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/150 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/151 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/152 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/153 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/154 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/155 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/156 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/157 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/158 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/159 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/160 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/161 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/162 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/163 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/164 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/165 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/166 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/167 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/168 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/169 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/170 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/171 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/172 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/173 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/174 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/175 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/176 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/177 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/178 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/179 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/180 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/181 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/182 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/183 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/184 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/185 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/186 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/187 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/188 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/189 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/190 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/191 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/192 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/193 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/194 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/195 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/196 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/197 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/198 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/199 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/200 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/201 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/202 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/203 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/204 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/205 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/206 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/207 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/208 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/209 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/210 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/211 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/212 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/213 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/214 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/215 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/216 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/217 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/218 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/219 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/220 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/220 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/221 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/221 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/222 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/222 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/223 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/223 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/224 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/224 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/225 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/225 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/226 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/226 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/227 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/227 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/228 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/228 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/229 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/229 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/230 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/230 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/231 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/231 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/232 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/232 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/233 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/233 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/234 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/234 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/235 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/235 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/236 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/236 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/237 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/237 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/238 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/238 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/239 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/239 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/240 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/240 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/241 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/241 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/242 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/242 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/243 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/243 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/244 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/244 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/245 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/245 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/246 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/246 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/247 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/247 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/248 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/248 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/249 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/249 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/250 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/250 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/251 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/251 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/252 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/252 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/253 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/253 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/254 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/254 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/255 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/255 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/256 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/256 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/257 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/257 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/258 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/258 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/259 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/259 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/260 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/260 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/261 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/261 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/262 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/262 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/263 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/263 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/264 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/265 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/266 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/267 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/268 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/269 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/270 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/271 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/272 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/273 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/274 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/275 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/275 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/276 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/276 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/277 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/277 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/278 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/278 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/279 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/279 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/280 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/280 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/281 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/281 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/282 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/282 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/283 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/283 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/284 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/284 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/285 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/285 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/286 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/286 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/287 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/287 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/288 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/288 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/289 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/289 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/290 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/290 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/291 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/291 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/292 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/292 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/293 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/293 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/294 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/294 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/295 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/295 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/296 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/296 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/297 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/297 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/298 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/298 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/299 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/299 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/300 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/300 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/301 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/301 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/302 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/302 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/303 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/303 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/304 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/304 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/305 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/305 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/306 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/306 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/307 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/307 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/308 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/308 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/309 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/309 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/310 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/310 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/311 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/311 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/312 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/312 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/313 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/313 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/314 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/314 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/315 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/315 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/316 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/316 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/317 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/317 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/318 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/318 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/319 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/319 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/320 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/320 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/321 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/321 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/322 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/322 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/323 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/323 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/324 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/324 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/325 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/325 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/326 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/326 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/327 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/327 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/328 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/328 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/329 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/329 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/330 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/330 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/331 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/331 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/332 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/332 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/333 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/333 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/334 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/334 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/335 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/335 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/336 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/336 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/337 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/337 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/338 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/338 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/339 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/339 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/340 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/340 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/341 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/341 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/342 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/342 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/343 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/343 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/344 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/344 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/345 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/345 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/346 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/346 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/347 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/347 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/348 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/348 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/349 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/349 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/350 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/350 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/351 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/351 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/352 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/352 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/353 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/353 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/354 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/354 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/355 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/355 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/356 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/356 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/357 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/357 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/358 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/358 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/359 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/359 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/360 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/360 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/361 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/361 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/362 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/362 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/363 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/363 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/364 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/364 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/365 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/365 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/366 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/366 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/367 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/367 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/368 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/368 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/369 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/369 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/370 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/370 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/371 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/371 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/372 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/372 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/373 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/373 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/374 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/374 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/375 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/375 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/376 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/376 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/377 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/377 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/378 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/378 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/379 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/379 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/380 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/380 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/381 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/381 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/382 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/382 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/383 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/383 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/384 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/384 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/385 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/385 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/386 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/386 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/387 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/387 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/388 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/388 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/389 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/389 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/390 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/390 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/391 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/391 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/392 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/392 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/393 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/393 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/394 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/394 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/395 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/395 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/396 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/397 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/398 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/399 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/400 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/401 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/402 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/403 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/404 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/405 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/406 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/407 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/408 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/409 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/410 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/411 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/412 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/413 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/414 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/415 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/416 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/417 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/418 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/419 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/420 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/421 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/422 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/423 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/424 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/425 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/426 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/427 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/428 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/429 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/430 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/431 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/432 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/433 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/434 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/435 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/436 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/437 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/438 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/439 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/440 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/440 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/441 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/441 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/442 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/442 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/443 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/443 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/444 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/444 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/445 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/445 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/446 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/446 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/447 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/447 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/448 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/448 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/449 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/449 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/450 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/450 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/451 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/451 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/452 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/452 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/453 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/453 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/454 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/454 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/455 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/455 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/456 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/456 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/457 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/457 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/458 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/458 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/459 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/459 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/460 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/460 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/461 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/461 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/462 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/462 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/463 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/463 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/464 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/464 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/465 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/465 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/466 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/466 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/467 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/467 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/468 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/468 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/469 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/469 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/470 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/470 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/471 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/471 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/472 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/472 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/473 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/473 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/474 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/474 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/475 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/475 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/476 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/476 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/477 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/477 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/478 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/478 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/479 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/479 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/480 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/480 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/481 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/481 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/482 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/482 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/483 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/483 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/484 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/484 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/485 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/485 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/486 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/486 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/487 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/487 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/488 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/488 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/489 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/489 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/490 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/490 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/491 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/491 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/492 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/492 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/493 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/493 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/494 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/494 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/495 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/495 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/496 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/496 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/497 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/497 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/498 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/498 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/499 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/499 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/500 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/500 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/501 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/501 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/502 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/502 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/503 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/503 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/504 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/504 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/505 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/505 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/506 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/506 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/507 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/507 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/508 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/508 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/509 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/509 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/510 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/510 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/511 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/511 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/512 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/512 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/513 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/513 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/514 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/514 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/515 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/515 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/516 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/516 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/517 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/517 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/518 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/518 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/519 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/519 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/520 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/520 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/521 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/521 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/522 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/522 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/523 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/523 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/524 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/524 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/525 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/525 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/526 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/526 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/527 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/527 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/528 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/528 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/529 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/529 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/530 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/530 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/531 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/531 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/532 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/532 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/533 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/533 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/534 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/534 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/535 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/535 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/536 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/536 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/537 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/537 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/538 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/538 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/539 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/539 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/540 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/540 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/541 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/541 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/542 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/542 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/543 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/543 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/544 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/544 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/545 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/545 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/546 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/546 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/547 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/547 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/548 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/548 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/549 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/549 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/550 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/550 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/551 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/551 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/552 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/552 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/553 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/553 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/554 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/554 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/555 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/555 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/556 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/556 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/557 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/557 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/558 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/558 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/559 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/559 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/560 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/560 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/561 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/561 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/562 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/562 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/563 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/563 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/564 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/564 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/565 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/565 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/566 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/566 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/567 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/567 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/568 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/568 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/569 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/569 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/570 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/570 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/571 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/571 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/572 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/572 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/573 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/573 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/574 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/574 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/575 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/575 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/576 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/576 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/577 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/577 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/578 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/578 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/579 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/579 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/580 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/580 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/581 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/581 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/582 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/582 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/583 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/583 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/584 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/584 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/585 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/585 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/586 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/586 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/587 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/587 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/588 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/588 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/589 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/589 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/590 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/590 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/591 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/591 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/592 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/592 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/593 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/593 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/594 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/594 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/595 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/595 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/596 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/596 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/597 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/597 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/598 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/598 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/599 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/599 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/600 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/601 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/601 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/602 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/602 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/603 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/603 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/604 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/605 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/605 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/606 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/606 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/607 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/607 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/608 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/608 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/609 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/609 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/610 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/610 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/611 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/611 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/612 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/612 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/613 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/613 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/614 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/614 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/615 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/616 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/616 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/617 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/617 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/618 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/618 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/619 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/619 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/620 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/620 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/621 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/621 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/622 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/622 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/623 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/623 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/624 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/624 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/625 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/626 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/626 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/627 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/628 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/628 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/629 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/629 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/630 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/631 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/631 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/632 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/633 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/633 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/634 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/634 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/635 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/635 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/636 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/637 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/637 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/638 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/638 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/639 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/639 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/640 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/640 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/641 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/642 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/642 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/643 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/644 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/644 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/645 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/645 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/646 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/646 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/647 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/647 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/648 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/649 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/649 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/650 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/650 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/651 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/651 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/652 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/652 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/653 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/653 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/654 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/654 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/655 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/655 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/656 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/656 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/657 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/658 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/658 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/659 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/659 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/660 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/660 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/661 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/661 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/662 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/662 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/663 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/663 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/664 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/664 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/665 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/665 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/666 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/666 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/667 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/667 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/668 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/668 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/669 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/669 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/670 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/670 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/671 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/671 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/672 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/672 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/673 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/673 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/674 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/674 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/675 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/675 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/676 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/676 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/677 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/677 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/678 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/678 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/679 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/679 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/680 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/680 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/681 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/681 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/682 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/682 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/683 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/683 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/684 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/684 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/685 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/685 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/686 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/686 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/687 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/687 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/688 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/688 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/689 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/689 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/690 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/690 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/691 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/691 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/692 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/692 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/693 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/693 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/694 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/694 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/695 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/695 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/696 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/696 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/697 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/697 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/698 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/698 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/699 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/699 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/700 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/700 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/701 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/701 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/702 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/702 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/703 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/703 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/704 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/704 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/705 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/705 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/706 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/706 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/707 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/707 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/708 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/708 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/709 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/709 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/710 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/710 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/711 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/711 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/712 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/712 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/713 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/713 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/714 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/714 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/715 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/715 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/716 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/716 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/717 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/717 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/718 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/718 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/719 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/719 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/720 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/720 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/721 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/721 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/722 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/722 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/723 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/723 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/724 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/724 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/725 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/725 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/726 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/726 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/727 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/727 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/728 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/728 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/729 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/729 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/730 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/730 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/731 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/731 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/732 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/732 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/733 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/733 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/734 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/734 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/735 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/735 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/736 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/736 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/737 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/737 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/738 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/738 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/739 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/739 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/740 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/740 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/741 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/741 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/742 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/742 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/743 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/743 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/744 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/744 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/745 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/745 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/746 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/746 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/747 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/747 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/748 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/748 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/749 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/749 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/750 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/750 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/751 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/751 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/752 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/752 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/753 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/753 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/754 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/754 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/755 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/755 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/756 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/756 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/757 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/757 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/758 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/758 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/759 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/759 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/760 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/760 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/761 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/761 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/762 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/762 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/763 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/763 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/764 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/764 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/765 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/765 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/766 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/766 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/767 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/767 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/768 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/768 (3 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/769 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/769 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/770 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/770 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/771 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/771 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/772 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/772 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/773 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/773 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/774 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/774 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/775 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/776 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/776 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/777 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/777 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/778 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/778 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/779 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/779 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/780 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/780 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/781 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/781 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/782 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/782 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/783 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/784 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/784 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/785 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/785 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/786 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/786 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/787 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/787 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/788 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/788 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/789 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/789 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/790 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/790 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/791 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/791 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/792 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/793 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/794 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/795 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/796 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/797 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/798 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/799 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/800 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/801 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/802 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/803 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/804 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/805 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/806 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/807 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/808 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/809 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/810 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/811 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/812 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/813 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/814 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/815 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/816 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/817 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/818 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/819 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/820 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/821 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/822 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/823 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/824 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/825 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/826 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/827 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/828 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/829 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/830 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/831 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/832 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/833 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/834 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/835 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/836 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/837 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/838 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/839 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/840 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/841 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/842 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/843 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/844 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/845 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/846 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/847 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/848 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/849 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/850 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/851 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/852 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/853 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/854 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/855 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/856 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/857 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/858 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/858 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/859 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/859 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/860 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/860 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/861 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/861 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/862 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/862 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/863 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/863 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/864 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/864 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/865 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/865 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/866 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/866 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/867 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/867 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/868 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/868 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/869 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/869 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/870 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/870 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/871 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/871 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/872 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/872 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/873 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/873 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/874 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/874 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/875 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/875 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/876 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/876 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/877 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/877 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/878 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/878 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/879 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/879 (9 ms) [----------] 3520 tests from CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest (22064 ms total) [----------] 960 tests from CipherSuiteTLS13/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/0 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/1 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/2 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/3 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/4 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/6 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/7 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/8 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/9 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/10 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/11 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/12 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/13 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/14 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/15 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/16 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/17 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/18 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/19 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/20 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/21 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/22 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/23 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/24 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/25 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/26 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/27 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/28 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/29 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/30 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/31 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/32 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/33 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/34 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/35 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/36 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/37 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/38 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/39 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/40 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/41 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/42 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/43 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/44 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/45 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/46 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/47 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/48 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/49 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/50 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/51 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/52 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/53 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/54 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/55 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/56 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/57 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/58 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/59 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/60 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/61 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/62 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/63 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/64 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/65 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/66 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/67 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/68 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/69 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/70 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/71 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/72 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/73 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/74 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/75 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/76 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/77 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/78 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/79 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/80 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/81 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/82 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/83 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/84 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/85 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/86 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/87 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/88 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/89 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/90 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/91 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/92 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/93 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/94 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/95 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/96 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/97 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/98 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/99 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/100 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/101 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/102 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/103 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/104 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/105 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/106 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/107 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/108 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/109 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/110 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/111 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/112 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/113 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/114 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/115 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/116 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/117 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/118 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/119 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/120 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/121 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/122 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/123 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/124 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/125 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/126 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/127 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/128 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/129 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/130 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/131 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/132 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/133 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/134 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/135 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/136 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/137 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/138 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/139 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/140 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/141 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/142 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/143 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/144 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/145 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/146 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/147 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/148 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/149 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/150 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/151 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/152 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/153 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/154 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/155 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/156 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/157 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/158 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/159 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/160 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/161 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/162 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/163 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/164 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/165 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/166 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/167 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/168 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/169 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/170 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/171 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/172 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/173 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/174 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/175 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/176 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/177 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/178 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/179 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/180 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/181 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/182 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/183 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/184 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/185 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/186 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/187 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/188 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/189 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/190 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/191 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/192 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/193 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/194 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/195 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/196 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/197 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/198 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/199 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/200 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/201 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/202 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/203 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/204 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/205 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/206 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/207 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/208 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/209 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/210 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/211 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/212 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/213 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/214 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/215 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/216 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/217 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/218 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/219 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/220 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/221 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/222 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/223 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/224 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/225 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/226 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/227 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/228 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/229 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/230 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/231 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/232 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/233 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/234 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/235 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/236 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/237 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/238 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/239 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/0 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/1 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/2 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/3 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/4 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/5 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/6 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/7 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/8 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/9 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/10 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/11 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/12 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/13 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/14 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/15 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/16 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/17 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/18 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/19 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/20 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/21 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/22 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/23 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/24 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/25 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/26 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/27 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/28 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/29 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/30 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/31 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/32 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/33 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/34 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/35 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/36 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/37 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/38 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/39 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/40 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/41 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/42 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/43 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/44 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/45 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/46 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/47 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/48 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/49 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/50 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/51 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/52 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/53 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/54 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/55 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/56 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/57 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/58 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/59 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/60 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/61 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/62 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/63 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/64 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/65 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/66 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/67 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/68 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/69 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/70 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/71 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/72 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/73 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/74 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/75 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/76 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/77 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/78 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/79 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/80 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/81 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/82 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/83 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/84 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/85 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/86 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/87 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/88 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/89 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/90 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/91 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/92 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/93 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/94 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/95 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/96 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/97 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/98 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/99 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/100 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/101 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/102 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/103 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/104 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/105 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/106 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/107 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/108 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/109 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/110 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/111 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/112 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/113 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/114 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/115 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/116 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/117 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/118 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/119 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/120 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/121 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/122 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/123 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/124 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/125 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/126 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/127 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/128 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/129 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/130 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/131 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/132 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/133 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/134 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/135 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/136 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/137 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/138 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/139 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/140 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/141 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/142 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/143 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/144 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/145 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/146 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/147 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/148 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/149 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/150 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/151 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/152 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/153 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/154 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/155 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/156 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/157 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/158 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/159 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/160 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/161 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/162 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/163 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/164 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/165 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/166 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/167 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/168 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/169 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/170 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/171 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/172 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/173 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/174 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/175 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/176 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/177 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/178 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/179 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/180 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/181 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/182 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/183 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/184 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/185 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/186 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/187 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/188 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/189 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/190 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/191 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/192 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/193 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/194 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/195 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/196 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/197 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/198 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/199 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/200 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/201 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/202 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/203 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/204 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/205 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/206 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/207 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/208 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/209 (27 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/210 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/211 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/212 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/213 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/214 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/215 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/216 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/217 (45 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/218 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/219 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/220 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/221 (35 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/222 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/223 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/224 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/225 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/226 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/227 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/228 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/229 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/230 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/231 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/232 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/233 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/234 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/235 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/236 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/237 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/238 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/239 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/0 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/1 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/2 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/3 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/4 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/6 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/7 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/8 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/9 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/10 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/11 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/12 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/13 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/14 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/15 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/16 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/17 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/18 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/19 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/20 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/21 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/22 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/23 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/24 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/25 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/26 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/27 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/28 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/29 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/30 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/31 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/32 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/33 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/34 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/35 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/36 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/37 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/38 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/39 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/40 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/41 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/42 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/43 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/44 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/45 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/46 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/47 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/48 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/49 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/50 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/51 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/52 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/53 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/54 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/55 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/56 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/57 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/58 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/59 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/60 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/61 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/62 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/63 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/64 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/65 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/66 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/67 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/68 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/69 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/70 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/71 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/72 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/73 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/74 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/75 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/76 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/77 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/78 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/79 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/80 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/81 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/82 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/83 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/84 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/85 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/86 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/87 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/88 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/89 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/90 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/91 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/92 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/93 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/94 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/95 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/96 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/97 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/98 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/99 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/100 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/101 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/102 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/103 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/104 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/105 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/106 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/107 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/108 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/109 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/110 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/111 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/112 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/113 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/114 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/115 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/116 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/117 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/118 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/119 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fef58003081656ff463367ac535598b6a2e63dc98b4547fca4c9a2cc7152859... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/120 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f93220030ca77ba4759e75e9f64088e6e1fad8b2a12deee02941f00eb3c7742... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/121 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fce1d0030cb04e9060f9a2779244bf17253efcae5a4ce9083cd39b9fd268c45... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/122 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa3030030efe682edd7c741350867fd02f9042fafa0e3540d21c8d111ebe742... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/123 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f06210030c32ef7ca16c4aa6beba34052a9d35b3d919dfd64137449e0a2f766... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/124 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe5fc00306263547012d096bcdb2c5865202f91e6d4074f3166b98fe91a5b28... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/125 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f070e003089924ea46f05479f7a67e232ed6c7950c95327253e02017c14d9b7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/126 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ffc0700307405f40b3f5919df085807152fd3e7728ab4e42194e8962bf1ffb5... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/127 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb82900302a7d20df8d03de4e9cf1293470c216b7a79ac5962d6d078b6248aa... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/128 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fdfd0003093a566cbf59c08f67cde92fef52cd27e3e07859cc38f2a0ab00f90... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/129 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff97e003042524cdcdf8341531e7ec5422378745938ae8b1549a3cb6a091d8e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/130 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f02a8003065c57a35d476f254e367013567ee6f9dc7b67f57b7ac3e62ad1a0c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/131 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0aef00304f0b7ae9f4e84f6cdc5acf452e53f6b7094182c38bde6266547b9d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/132 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f051f00301b67d48aae1808b867930a6749d99b766ecb3b75e84bbf1bac77ec... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/133 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f18d300304100cd355a7af21693958d4423745cc9f7ad870f243b79e379666b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/134 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f540c00303f5b9a0127dd1df0882fa1b7b78aa987e9c9b328632dc65400d2d9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/135 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fae2a00307f0013d2f90b2a7a7098865e92a9f6e30089b53e91847bcb8b78db... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/136 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9fac0030d6a69c605abdcfa019bd32b0adc0a6eba9442f427e3587582bf17c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/137 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f068a003008ae5116de9d0f2b07a13aeffd8ead80c8786e0a6e50dc0daf2f37... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/138 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd09100301946cc4213291346d5b460634eeac738b61c68bb333a7fe72f2b08... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/139 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f95d300302f39c4d1f3cebb0aaa5d6f946914da5b5306bbd155b326b0558d0a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/140 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa79c0030876189ce605c01d08810a369a3b369a6fbffa86d359ce6603c334d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/141 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6e40003063cf67379aa494fd210bbc8929d5a40957d06417cb78bd3d32ff3e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/142 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe73e00308e1b387733b8d0741b5a03ae22433433f3a4fcf7f13d76e5963c48... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/143 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f123000304c668c06bca396231b90d4de811a48a280497a010d2ec216295560... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/144 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe58f00305f63e113cf0ba72a7e903b5dea425786e4ae5038cdb0fbb0550aae... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/145 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f82220030d7fb84a2cfe053465c2779b94c9e5dc52003a00a3346ab93f201c5... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/146 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f62960030001be908fad1f490de3bc57e04586544cf0168103c147df1fb24f7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/147 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7ee900301ee682c9f1cbef9c24f0e8a86249e98aebade1480b4142d97a79fa... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/148 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff9e10030fba3a3db7671ccc52553add6fbac8fe9b5004f03c257519ae97fb3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/149 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd90e0030fb8104e0b87f831a926e71a376c02d09fc592780804dcba8170080... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/150 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f276b0030e6b0af4c9ff4893f8ef0b9876d976606ada8a5452c9112e12b42a5... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/151 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fcd1600300d5af4d84399fc3b43c3ba4333a1e5dec90b90168a587a4d4ad501... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/152 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb2be00303ca4510d555d0eb7a425dc5fb5fe42ac0505098f10ab4fb5c8c366... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/153 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fba670030c953f32714a5f934b6ef65b1501e3108513889b905d45768e14186... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/154 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff8c800306a16a5750ffceac5d9bb135160e1f999b3da9ec3492733cae4bc6a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/155 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fda61003000f63db27b9a488bf0327b149ad5435a66f0f4dd52a6610a3657a6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/156 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6ff100306bd973e4ffa4809af4075b018bb03cc4171fabf2d68dc99ca0ea15... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/157 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f72b2003068110e0dd7b17cbdf5059d8abc947dfa46131a93f197e81e984a89... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/158 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1c5d0030d30c0761319fb833a2322f054531e5d19a147aa40e501ac3860949... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/159 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7e100030621d78dd165cc2b4798cc35460b83879c0d108f18edd7ea1c2d3df... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/160 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1d360030147fe2704a2f37f257d9094f0651da08d7f4d8b847322bd6b85dac... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/161 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fac5500301426b0f477d026fec85ed7533f56be27f6804989ec15045730139d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/162 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f855f0030cd43cfae6f622701d444a37adcb68456f98c8e663aa728aa921431... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/163 (5 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6ccf003002b8cfd5da7e26783de907c2678ae1a9945afac32873c581e025a0... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/164 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f58360030381d9be7648b0d430c8a0252ff6af178fbb415471d2fd0ae236f5a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/165 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2feaf40030425c64643b9a71121d1e11a52f986ffd5cee6c52ade114587b0e57... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/166 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe0cb00305c1a73a878eea6060bf9b4b0e3c3903863f961dbfc85119d712c1b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/167 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0ed50030ea9e9cbb49f56d32c11370496b6589c0db09e871c1125949b761f3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/168 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f14e70030929fb4e4e56563c42c8984b4557c132611259ca3ea1f41adae0418... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/169 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2f3b00305fd8d074e2dbdbff1f5857850e01bffc641acc0334d2e76cd88b8b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/170 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f303c003063b47a9a63b314c82438de55db1d43020af6f9128dea0b70f39caa... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/171 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f612e003095861cb52a1f9d669642e6333101747682fdf1b311e72a9a3120d0... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/172 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f089d0030cddfbd298db143c36c9fd2bf116942ea0ccc929c6a89cf2e937d2e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/173 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fbd2100309408e01e51440eb6750da3cbb9e62f2dbc6f45eae8701d6ca492a5... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/174 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb0b8003047a17fbaf029db83ef3907d7de7ad551c664f56cb842dfa24ebcd8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/175 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff84100305dc7253b8e8732b78a58047e45568a12801f9cfd1824e59ca94e17... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/176 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7e5c003056e91f24957eaf335d5da40ede258b6e1557f5808e524a10a2f2d5... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/177 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9f93003084a707ef6ce2bc2bf3bb830c30924ed1cde5d36ca9bc9451dc7a27... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/178 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2a970030ef79e6bacce9e615f1dd585fb435d0e13a3913c56bf3fc1ac29dcc... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/179 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3ab70030c2aac84e7913d0747c3a2f3ff93d404d81fd1740996c1844d630ad... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/180 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f232300301fa49ed35bd0c56769f13c05325e7af25e94be946bbcbd0fae9904... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/181 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1abb00308ac8406d64ea9d46194569b40443efcf808c46ddb3061668bc36b0... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/182 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa32f0030d1af45929382a3ad5bba6f1739cd20cba6e88e0b5bd7be7d4703a3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/183 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f05c00030192b9fc8f24edcfdcd2aa8858994f586265cdb027fb6a17285d35b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/184 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff9630030260e0c9d62a834cf5de36901fb576089ba324f0413f4bed0eafcfa... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/185 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f12c2003013b8583b4357901cf62f5a6a9d94a67f2fbdc854a82ee5c4bdec39... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/186 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0e1d003084dcdb2938e8136c2829b20ee727159f334063ef3b9dcb7fdec263... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/187 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa0700030fd5951aa506e77c45552783774965dd24e2dfc45776a414e276765... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/188 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f703000301aa46c7dcb4ce1b46c91527e016ba697323a56b8deacd1704a0551... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/189 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f333d00305f4ba6d88f9959abfd75282760fae792fc292dad18d64ebaa01a8a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/190 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2cae0030097b9ec082096455122d8f75e3d0b89148ad480e64e1342ba48813... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/191 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f46f8003055bf2455eaf14adba19728358472456eb8efa17d4a5c6a4eb93f23... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/192 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3cd90030892612594dfc422a9170e7997efcdfab595461d82f5db4fa89e94d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/193 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7433003078d0ee7e6b41e0a372ee5d35ab4bbe1fe6d8302ff8576ee75fd844... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/194 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb3c50030ab437e847eb9196c335d2fb87197d51d87ed1c3dedaac73ca92d37... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/195 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f88a500303aa74dcf0d978784dae3f71c587e108a42f9737a52fad84cc9abfa... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/196 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd1be0030a1c466fdb00bb550822398f443cad3094cb457033060b1a09372ba... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/197 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f59d5003050ff2088840795d3e7d2898df886f7c1ef6510e8c55ae7fa0428ea... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/198 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fdaee0030c2a680c60cb5c0183199f860d885fd8b27a3464af0eb54bf1f406f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/199 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff525003075ad209cd0612bf2aa14378dc4ff8b111a0250c78260fdff0711a1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/200 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f66bc00307d7639cbffd59ce0666c9da13279e7112d6cd1d6ac1cd4d9d04b32... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/201 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fabf60030591d7b5f0cb24930f4a18e7c323afe25c605e655b0ed8877d1dadb... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/202 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f63e900307620fd32556de8b7461d36b5dcf1031aff6f62ac96b66a4edced7b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/203 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1ce9003061ccc3006b924b64599ca3e884535b21dca63ee4f0028bebd86651... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/204 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc341003025bbd5a0d8b7ef7ac6946885c30d58686ae5ce58df18abda47de12... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/205 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fbc05003047025f16234ecffb6b6ba508dabb584c767fef9bd6a55c5c6e79db... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/206 (4 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ffc4f003012de31e155c966faebdca48b58f3205a641e89999a74bf25b6efcf... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/207 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1fa60030632b2abeeafbaa4c9ae23c05b9cf1ecf904b55435941e41faff6f4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/208 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f20670030ee5b9a10bb4e55d1d12fb3377b2e66b12df61eb207470820999eee... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/209 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5a30003063a9eaa7ccd854bbb54dbf22b39cf7cd493b6f992a75364e4946c1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/210 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd76f00306bc8f0a1a15efe4a8533ee1d288274c6253e63c0b194fa22afaa7d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/211 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fcb900030ca5d85006a0618bb891303571e90a924c47a214b2c4e65292956ae... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/212 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4d5700303bda8cf8300060c718f42c128c92fcfd430d722d03e04acbaf924c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/213 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f38610030db848d663243fedb84ea051c20ca6508067957fb4074161bb97f6f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/214 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f24e600308686a14866b7ddbdafd1e334801c97134c8d0d3b5d763775669065... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/215 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f37210030168adcbec9aaea2017387b4a5fc1c05ea9dd28f68fa557f6fbc5b6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/216 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f73b10030169995afbeef9876dac2e0b3dd8098edb725d6e2fecd46a074a964... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/217 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3d5a0030dde151c79beacd602be63f942d73531afb9ad1a11572cec14eb412... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/218 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd5c00030ed30f8b5198b6af86e7300df9e1d50b77d5ffbe5e81ffb1f2b9612... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/219 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f14120030c82747830434755bd7bedbcd1c47d389644d01afb3e061032afb0b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/220 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa3040030f0ed1889579e5ab647bf959152696c228153bac3bb3798d860d7ab... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/221 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe1870030fa4bc1f939a85d4bef630b2856ed1cc425664216ba973af2ded4e2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/222 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe70f0030fbd614d31603ecba488648baa52f1623b98562faac666456ab94d1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/223 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd01100300718d6046fdfd26e78fd315efd8a00d4f43b19426e67731248863e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/224 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff4a00030a9c5764ee8a3f0a746801b41194a73985c855027be877b11b39326... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/225 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4b3c00306009f167ebc440a8fdaf5522aec5181d327651539c2fbdfd0926ee... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/226 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f781e0030417b64eea16b697419ac98b12594f5e897bb35675e493cd8182fc1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/227 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f12740030e86e93eea6923d9250bfb4d5669a3fd2f3e830da3253758abfcc49... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/228 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff8680030da10e1c1fbeadfe43b0d0866b127cf1ddd8d2f7c2b3acee3753a4b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/229 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f51760030e7c2606bba81ab15224e9e75b6cd93c778da105ae62e7758064a15... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/230 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fbaa800303a7efd116c5d16f4ddc57d08901f7f84803dff024235c2c845141b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/231 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8c380030ff78f24b64621f0ea92cafc13b426827c54bb55654125f6b9f7250... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/232 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5bdd0030d8fabcb8bbf30b490007dac4c31e8cb0f50bf26f5ece17a88bc616... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/233 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f289800307b5495484a399c904f6851f0dc9f32e6fbe7314801bf4efd958d30... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/234 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3ff30030739d860f87204025774a326cbe57f90f97839eebd0c5d4f6909d20... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/235 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd9f70030093bb18a926230d93b60834e4e41f1e981e24bcd1b7f22906e7479... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/236 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5f7d0030cedb881c65bf4ceeb03e3cfa20c2360a69a2a71b5d00f50ef12a6e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/237 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa2320030a32992e1928eb06f040b13784495a026921b00031b04889f656fc7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/238 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0aed003035b3fc72326c448b441ad56219dbfa9f2d51e8a4f667156db6460e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/239 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 (1 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 (0 ms) [----------] 960 tests from CipherSuiteTLS13/TlsCipherSuiteTest (11111 ms total) [----------] 72 tests from CipherSuiteTLS13AllGroups/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/0 (6 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/1 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/2 (19 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/3 (15 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/4 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/5 (16 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/6 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/7 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/8 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/9 (7 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/10 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/11 (20 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/12 (15 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/13 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/14 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/15 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/16 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/17 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/0 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/1 (26 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/2 (44 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/3 (33 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/4 (25 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/5 (38 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/6 (52 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/7 (94 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/8 (217 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/9 (18 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/10 (26 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/11 (44 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/12 (33 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/13 (25 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/14 (38 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/15 (53 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/16 (95 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/17 (217 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/0 (6 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/1 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/2 (20 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/3 (14 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/4 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/5 (16 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/6 (25 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/7 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/8 (106 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f32d200302745e37f1c911ade96cd547e7baa1c1ffded37a69b2152c36c22d8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/9 (6 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9019003050c913969c4a561e41a1d142d7fec92126c2ab289ed4f16eaba2a0... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/10 (11 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f04d6003083e1fef12dfb63f5db43e60b05a39fdceb77050e2060f69076cb77... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/11 (20 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fee8f0030e25e130f55e4194b676eaab2e56bf507b4c0c8e4045b204ea30cbe... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/12 (15 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fab33003014763941a76c90ce37d02530cd95123c71f544d9faa76a593d3b9a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/13 (10 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fce3100303acdb6082bf69be9ac6fb33b9d7865f2b436e7e124b6399862b0e7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/14 (17 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f39100030c008c1ca598c378fc80596620c1bf22bbc35f4d5097d527fb127f3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/15 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3a4e0030c94dbecef8dc27404169d4981ba42b5c430ae7e7f6a04ea3ed0a11... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/16 (45 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd64700300ef598f7f1922dfa06a08cea0ad6f6db5e1f5d41820ffc30fc47f6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/17 (107 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 (1 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 (0 ms) [----------] 72 tests from CipherSuiteTLS13AllGroups/TlsCipherSuiteTest (2111 ms total) [----------] 8 tests from TestSecurityStatus/SecurityStatusTest [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 (3 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/7 (4 ms) [----------] 8 tests from TestSecurityStatus/SecurityStatusTest (27 ms total) [----------] 72 tests from DamageYStream/TlsDamageDHYTest [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301a9e1e938df014aa12fc2d4bb19a976cfa8f380d845020c4bf570... record new: [1190] 020000570301a9e1e938df014aa12fc2d4bb19a976cfa8f380d845020c4bf570... server: Filtered packet: [1195] 16030104a6020000570301a9e1e938df014aa12fc2d4bb19a976cfa8f380d845... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301e42be7ec5fab366ffea4ac8268e8fcd896672f9b609eb99ec747... record new: [1190] 020000570301e42be7ec5fab366ffea4ac8268e8fcd896672f9b609eb99ec747... server: Filtered packet: [1195] 16030104a6020000570301e42be7ec5fab366ffea4ac8268e8fcd896672f9b60... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301342293935e377dadd26c2a8b06bfcc2aa129dbda2b3c57493e89... record new: [1190] 020000570301342293935e377dadd26c2a8b06bfcc2aa129dbda2b3c57493e89... server: Filtered packet: [1195] 16030104a6020000570301342293935e377dadd26c2a8b06bfcc2aa129dbda2b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030141b662e5f942df286d3af61e0037a080105568ba157d106b7c8e... record new: [1190] 02000057030141b662e5f942df286d3af61e0037a080105568ba157d106b7c8e... server: Filtered packet: [1195] 16030104a602000057030141b662e5f942df286d3af61e0037a080105568ba15... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301a26bd3ab0cec65e141610f9caa58677aa2653d5410ee24c17b74... record new: [1190] 020000570301a26bd3ab0cec65e141610f9caa58677aa2653d5410ee24c17b74... server: Filtered packet: [1195] 16030104a6020000570301a26bd3ab0cec65e141610f9caa58677aa2653d5410... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301de62a8d302834557b06f2101b77daf083970f20f38163b2a4df8... record new: [1190] 020000570301de62a8d302834557b06f2101b77daf083970f20f38163b2a4df8... server: Filtered packet: [1195] 16030104a6020000570301de62a8d302834557b06f2101b77daf083970f20f38... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030104b1881b0910efa56e2a7c646f91383be9633f69f20061ace510... record new: [1190] 02000057030104b1881b0910efa56e2a7c646f91383be9633f69f20061ace510... server: Filtered packet: [1195] 16030104a602000057030104b1881b0910efa56e2a7c646f91383be9633f69f2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703015f4a4180b0aa8871d34df36b9e6bdf554c97e854cf868ab60a0a... record new: [1190] 0200005703015f4a4180b0aa8871d34df36b9e6bdf554c97e854cf868ab60a0a... server: Filtered packet: [1195] 16030104a60200005703015f4a4180b0aa8871d34df36b9e6bdf554c97e854cf... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030176e975309c7cf84a5a5ed0027e354d8ead37841f12ba5143d9ce... record new: [1191] 02000057030176e975309c7cf84a5a5ed0027e354d8ead37841f12ba5143d9ce... server: Filtered packet: [1196] 16030104a702000057030176e975309c7cf84a5a5ed0027e354d8ead37841f12... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301b887aa36964b6dc196acc7a10ae85bc5b78803e3db642692507f... record new: [1191] 020000570301b887aa36964b6dc196acc7a10ae85bc5b78803e3db642692507f... server: Filtered packet: [1196] 16030104a7020000570301b887aa36964b6dc196acc7a10ae85bc5b78803e3db... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703012ec1723dd99eb591acf6db1dfbf58d6e7dd30da20e7063a1f02e... record new: [1191] 0200005703012ec1723dd99eb591acf6db1dfbf58d6e7dd30da20e7063a1f02e... server: Filtered packet: [1196] 16030104a70200005703012ec1723dd99eb591acf6db1dfbf58d6e7dd30da20e... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703011350ae6b70b293a088099bcaf0b61430f5e2b48722d3c6b2c385... record new: [1191] 0200005703011350ae6b70b293a088099bcaf0b61430f5e2b48722d3c6b2c385... server: Filtered packet: [1196] 16030104a70200005703011350ae6b70b293a088099bcaf0b61430f5e2b48722... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302dd87fdc5d83ef5ddc6f6029e4a79b3fd20a45f63650d0fdef748... record new: [1190] 020000570302dd87fdc5d83ef5ddc6f6029e4a79b3fd20a45f63650d0fdef748... server: Filtered packet: [1195] 16030204a6020000570302dd87fdc5d83ef5ddc6f6029e4a79b3fd20a45f6365... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703025def30cda436ac4ff61f0ac82a58f3ccde25a1f8adb082e696b1... record new: [1190] 0200005703025def30cda436ac4ff61f0ac82a58f3ccde25a1f8adb082e696b1... server: Filtered packet: [1195] 16030204a60200005703025def30cda436ac4ff61f0ac82a58f3ccde25a1f8ad... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302ceda069782c08589b1dffd28a6aba84a7c60eaa7846965171ed4... record new: [1190] 020000570302ceda069782c08589b1dffd28a6aba84a7c60eaa7846965171ed4... server: Filtered packet: [1195] 16030204a6020000570302ceda069782c08589b1dffd28a6aba84a7c60eaa784... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703026fe7aff02cf311f6cad06fa0f87468c351a0dcc216ba751d6ec8... record new: [1190] 0200005703026fe7aff02cf311f6cad06fa0f87468c351a0dcc216ba751d6ec8... server: Filtered packet: [1195] 16030204a60200005703026fe7aff02cf311f6cad06fa0f87468c351a0dcc216... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030231c41ebfcc9c7f42fa1afa6047b892e6e4449af84ae64a322134... record new: [1190] 02000057030231c41ebfcc9c7f42fa1afa6047b892e6e4449af84ae64a322134... server: Filtered packet: [1195] 16030204a602000057030231c41ebfcc9c7f42fa1afa6047b892e6e4449af84a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302fe5bad9aaa94b64d1a6246e4f35e38098d97a127c86e1f0b866e... record new: [1190] 020000570302fe5bad9aaa94b64d1a6246e4f35e38098d97a127c86e1f0b866e... server: Filtered packet: [1195] 16030204a6020000570302fe5bad9aaa94b64d1a6246e4f35e38098d97a127c8... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703024841969e9151f096079ac55ac675c11ba2be0470a39b63ae24d3... record new: [1190] 0200005703024841969e9151f096079ac55ac675c11ba2be0470a39b63ae24d3... server: Filtered packet: [1195] 16030204a60200005703024841969e9151f096079ac55ac675c11ba2be0470a3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302c0263496a4440e9d609e5595aedf093b9b9a2e0ed260038268be... record new: [1190] 020000570302c0263496a4440e9d609e5595aedf093b9b9a2e0ed260038268be... server: Filtered packet: [1195] 16030204a6020000570302c0263496a4440e9d609e5595aedf093b9b9a2e0ed2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703029a35d23c2e79e0f57bd6fb17ab9c4d91015f7e4e834799d0b5f1... record new: [1191] 0200005703029a35d23c2e79e0f57bd6fb17ab9c4d91015f7e4e834799d0b5f1... server: Filtered packet: [1196] 16030204a70200005703029a35d23c2e79e0f57bd6fb17ab9c4d91015f7e4e83... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030239df057b6615b137e1671215c6bd541911885fefc3fab222ae6f... record new: [1191] 02000057030239df057b6615b137e1671215c6bd541911885fefc3fab222ae6f... server: Filtered packet: [1196] 16030204a702000057030239df057b6615b137e1671215c6bd541911885fefc3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030279ff321aefcd0e5e8888b5741dad73a078a73f53030499e6ffc1... record new: [1191] 02000057030279ff321aefcd0e5e8888b5741dad73a078a73f53030499e6ffc1... server: Filtered packet: [1196] 16030204a702000057030279ff321aefcd0e5e8888b5741dad73a078a73f5303... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703025ee7dd4287906c10dd33481833c06e99107c3b67b9df1297efa8... record new: [1191] 0200005703025ee7dd4287906c10dd33481833c06e99107c3b67b9df1297efa8... server: Filtered packet: [1196] 16030204a70200005703025ee7dd4287906c10dd33481833c06e99107c3b67b9... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703039459607886ed6fe00eec6acc3e9b48296413a57e8979902a1a58... record new: [1192] 0200005703039459607886ed6fe00eec6acc3e9b48296413a57e8979902a1a58... server: Filtered packet: [1197] 16030304a80200005703039459607886ed6fe00eec6acc3e9b48296413a57e89... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703030cb81895a016c5b34af7de408fd30f8ab8e3ecbfd34fe1943f94... record new: [1192] 0200005703030cb81895a016c5b34af7de408fd30f8ab8e3ecbfd34fe1943f94... server: Filtered packet: [1197] 16030304a80200005703030cb81895a016c5b34af7de408fd30f8ab8e3ecbfd3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703034f3f48519f6b5f0f83b08f8e416296f226e587b8327ed7410540... record new: [1192] 0200005703034f3f48519f6b5f0f83b08f8e416296f226e587b8327ed7410540... server: Filtered packet: [1197] 16030304a80200005703034f3f48519f6b5f0f83b08f8e416296f226e587b832... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303be3f6b9ebc020b7910b948a41fd7ef81d4ec33ea5afe78cd1446... record new: [1192] 020000570303be3f6b9ebc020b7910b948a41fd7ef81d4ec33ea5afe78cd1446... server: Filtered packet: [1197] 16030304a8020000570303be3f6b9ebc020b7910b948a41fd7ef81d4ec33ea5a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303260bcb19bc7ec63e66727d6cda947bdcacc97dc020faa46da00c... record new: [1192] 020000570303260bcb19bc7ec63e66727d6cda947bdcacc97dc020faa46da00c... server: Filtered packet: [1197] 16030304a8020000570303260bcb19bc7ec63e66727d6cda947bdcacc97dc020... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303e6a1b4cf3f934c3c64b1ad5049034aeff7de534f2406cc0df60f... record new: [1192] 020000570303e6a1b4cf3f934c3c64b1ad5049034aeff7de534f2406cc0df60f... server: Filtered packet: [1197] 16030304a8020000570303e6a1b4cf3f934c3c64b1ad5049034aeff7de534f24... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303ad88583ff23e77698110837332b39e9799431796fc8952df690a... record new: [1192] 020000570303ad88583ff23e77698110837332b39e9799431796fc8952df690a... server: Filtered packet: [1197] 16030304a8020000570303ad88583ff23e77698110837332b39e9799431796fc... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030341e1aaf2665f231cd95a6a1ad5ae827249bb72e183a097c183ce... record new: [1192] 02000057030341e1aaf2665f231cd95a6a1ad5ae827249bb72e183a097c183ce... server: Filtered packet: [1197] 16030304a802000057030341e1aaf2665f231cd95a6a1ad5ae827249bb72e183... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030376f9e39b400808f88240a1509bcc93042b8db1a2477c5718a4f2... record new: [1193] 02000057030376f9e39b400808f88240a1509bcc93042b8db1a2477c5718a4f2... server: Filtered packet: [1198] 16030304a902000057030376f9e39b400808f88240a1509bcc93042b8db1a247... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303e21b6302c4f066ef7f4a2fe49f3baad7d78694115097793b7bfd... record new: [1193] 020000570303e21b6302c4f066ef7f4a2fe49f3baad7d78694115097793b7bfd... server: Filtered packet: [1198] 16030304a9020000570303e21b6302c4f066ef7f4a2fe49f3baad7d786941150... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703035014baddd04b5c074860fa51ba323a9cc9b343005b205ad664c0... record new: [1193] 0200005703035014baddd04b5c074860fa51ba323a9cc9b343005b205ad664c0... server: Filtered packet: [1198] 16030304a90200005703035014baddd04b5c074860fa51ba323a9cc9b343005b... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (5 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303f5f460c05658aa62f90071dd571e4b4f55ff262494803defb203... record new: [1193] 020000570303f5f460c05658aa62f90071dd571e4b4f55ff262494803defb203... server: Filtered packet: [1198] 16030304a9020000570303f5f460c05658aa62f90071dd571e4b4f55ff262494... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (4 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e0694dde16fbb561d96698fbebdb441db7463cc3a165d5259a1bd4b22f7b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100e0694dde16fbb561d96698fbebdb441db7463cc3a165d5259a1b... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010099fae215ab4f180509aa465f1a7854c47d9846b468d82352a64695035e6e... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010099fae215ab4f180509aa465f1a7854c47d9846b468d82352a646... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010039662f6fe2522b16195894c22dc79526e1968cc38dfa4047528b27f8ad94... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010039662f6fe2522b16195894c22dc79526e1968cc38dfa4047528b... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100edee707c22baffc05516f34cd5aa09125ac153dacad61648f6f4d2a24d0b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100edee707c22baffc05516f34cd5aa09125ac153dacad61648f6f4... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b30013ae958c395497b20c8d6a0eda3e96b91724e301f4ec60d3dc5880d1... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100b30013ae958c395497b20c8d6a0eda3e96b91724e301f4ec60d3... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ad337d5ac3e98da6a1513644061b18f71d49f91ac77bfb6ec81a76a667c3... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100ad337d5ac3e98da6a1513644061b18f71d49f91ac77bfb6ec81a... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100447e64b91b40564f0750c75d51be179a3bb54ff91de878d02a5d269f15bf... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100447e64b91b40564f0750c75d51be179a3bb54ff91de878d02a5d... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f05ea8eea4ccddbcd89c0e2c46369f73512e025a901a2ecaa9875057a8bb... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100f05ea8eea4ccddbcd89c0e2c46369f73512e025a901a2ecaa987... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010099db7cd080c35fe31ff30cd21047a65f93435b1973d436b01a6a21a4f51c... handshake new: [259] 01010199db7cd080c35fe31ff30cd21047a65f93435b1973d436b01a6a21a4f5... record old: [262] 10000102010099db7cd080c35fe31ff30cd21047a65f93435b1973d436b01a6a... record new: [263] 1000010301010199db7cd080c35fe31ff30cd21047a65f93435b1973d436b01a... client: Filtered packet: [327] 16030101071000010301010199db7cd080c35fe31ff30cd21047a65f93435b19... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b8bc774bbbd033059cf1cd8024c1603d5d4ed9537f6978cdd7ad8852e761... handshake new: [259] 010101b8bc774bbbd033059cf1cd8024c1603d5d4ed9537f6978cdd7ad8852e7... record old: [262] 100001020100b8bc774bbbd033059cf1cd8024c1603d5d4ed9537f6978cdd7ad... record new: [263] 10000103010101b8bc774bbbd033059cf1cd8024c1603d5d4ed9537f6978cdd7... client: Filtered packet: [327] 160301010710000103010101b8bc774bbbd033059cf1cd8024c1603d5d4ed953... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010079535c904c370a9198af8ee653773b4f920d1f598dbb581a5df79f46fdc6... handshake new: [259] 01010079535c904c370a9198af8ee653773b4f920d1f598dbb581a5df79f46fd... record old: [262] 10000102010079535c904c370a9198af8ee653773b4f920d1f598dbb581a5df7... record new: [263] 1000010301010079535c904c370a9198af8ee653773b4f920d1f598dbb581a5d... client: Filtered packet: [327] 16030101071000010301010079535c904c370a9198af8ee653773b4f920d1f59... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (8 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e226690bc3f60bdab0271cb02d5ffbeb94b433b67e3c2e1feee47c068fc9... handshake new: [259] 010100e226690bc3f60bdab0271cb02d5ffbeb94b433b67e3c2e1feee47c068f... record old: [262] 100001020100e226690bc3f60bdab0271cb02d5ffbeb94b433b67e3c2e1feee4... record new: [263] 10000103010100e226690bc3f60bdab0271cb02d5ffbeb94b433b67e3c2e1fee... client: Filtered packet: [327] 160301010710000103010100e226690bc3f60bdab0271cb02d5ffbeb94b433b6... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b4baf70a26e4e90870e1a40831d120b027ce3ca6fbc2e398ff822b8a5fe2... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100b4baf70a26e4e90870e1a40831d120b027ce3ca6fbc2e398ff82... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d5e09078173f876bcbcbfcdab8941c5902eb82588f81c7766d1bf58c5620... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100d5e09078173f876bcbcbfcdab8941c5902eb82588f81c7766d1b... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010058772d4206474a7311a316a53ca67f60d0c89d073b6555b4b66965f82382... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010058772d4206474a7311a316a53ca67f60d0c89d073b6555b4b669... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b68e12967233a7b8b72c183e56ac448e22de93411ad391e916fe903e88f2... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100b68e12967233a7b8b72c183e56ac448e22de93411ad391e916fe... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010084c8e13c9d32fbbefa1bcab3cbf2d0411be93f00313b19668be077881f38... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010084c8e13c9d32fbbefa1bcab3cbf2d0411be93f00313b19668be0... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f79aaf1ef8b9fc7468b81288fd0b3b299571cd98d2b580f7473ea670b081... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100f79aaf1ef8b9fc7468b81288fd0b3b299571cd98d2b580f7473e... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b6e26c578ce44dbcd2b3f2a7c2a00dbace229a855d76d32c077b15aeac5f... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100b6e26c578ce44dbcd2b3f2a7c2a00dbace229a855d76d32c077b... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c02f3a258378028d228c6b0ec109b1bc433eb1b239d11b11497d0351e510... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100c02f3a258378028d228c6b0ec109b1bc433eb1b239d11b11497d... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100dccd09c6eb65e2cd9ecb902188d3650aa6311dd469dff3951be362c729b8... handshake new: [259] 010101dccd09c6eb65e2cd9ecb902188d3650aa6311dd469dff3951be362c729... record old: [262] 100001020100dccd09c6eb65e2cd9ecb902188d3650aa6311dd469dff3951be3... record new: [263] 10000103010101dccd09c6eb65e2cd9ecb902188d3650aa6311dd469dff3951b... client: Filtered packet: [343] 160302010710000103010101dccd09c6eb65e2cd9ecb902188d3650aa6311dd4... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002741b8656b15d89151d4392663a1318284dde6ab8dbf264557061c35bfe3... handshake new: [259] 0101012741b8656b15d89151d4392663a1318284dde6ab8dbf264557061c35bf... record old: [262] 1000010201002741b8656b15d89151d4392663a1318284dde6ab8dbf26455706... record new: [263] 100001030101012741b8656b15d89151d4392663a1318284dde6ab8dbf264557... client: Filtered packet: [343] 1603020107100001030101012741b8656b15d89151d4392663a1318284dde6ab... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100de855973f5b637cff5259752b622f047025b15a9519a68b765d0002d7014... handshake new: [259] 010100de855973f5b637cff5259752b622f047025b15a9519a68b765d0002d70... record old: [262] 100001020100de855973f5b637cff5259752b622f047025b15a9519a68b765d0... record new: [263] 10000103010100de855973f5b637cff5259752b622f047025b15a9519a68b765... client: Filtered packet: [343] 160302010710000103010100de855973f5b637cff5259752b622f047025b15a9... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (8 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010020b12c0fab56dff8831758b4bbd49fc2049ccb8c63e914fc68a6ec237dab... handshake new: [259] 01010020b12c0fab56dff8831758b4bbd49fc2049ccb8c63e914fc68a6ec237d... record old: [262] 10000102010020b12c0fab56dff8831758b4bbd49fc2049ccb8c63e914fc68a6... record new: [263] 1000010301010020b12c0fab56dff8831758b4bbd49fc2049ccb8c63e914fc68... client: Filtered packet: [343] 16030201071000010301010020b12c0fab56dff8831758b4bbd49fc2049ccb8c... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000166f6ca11ee6a82341dd0cadf75504bc46b02c98137dfa4c1072bd46ace... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201000166f6ca11ee6a82341dd0cadf75504bc46b02c98137dfa4c107... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003c10bec4d7a05cd35b5b9d8fffafbd81a8fea0261f410302021b2807ff4f... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201003c10bec4d7a05cd35b5b9d8fffafbd81a8fea0261f410302021b... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100702bd6c5826a3dee7e264759dc8be3dd5ee4a1d4388c49801fd6aca2757b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100702bd6c5826a3dee7e264759dc8be3dd5ee4a1d4388c49801fd6... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b1816694369adf56731008ec1e017b00d4110a43eddaceae915e432b1232... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100b1816694369adf56731008ec1e017b00d4110a43eddaceae915e... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008c93bc68ccf650c2c524e8828892dc650adeed0bcf6daf5c45e71d36dfdd... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201008c93bc68ccf650c2c524e8828892dc650adeed0bcf6daf5c45e7... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005bf3f5d2bd126ab5a4b68edbbe6e6cd39ec800772b57bb41fc2149cad5be... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201005bf3f5d2bd126ab5a4b68edbbe6e6cd39ec800772b57bb41fc21... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005730cdf2e663305b23fa0bab28d9044b25e7656297550d1f9c0af405ff18... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201005730cdf2e663305b23fa0bab28d9044b25e7656297550d1f9c0a... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c44b22406af1176d39f809afc8cf158b407678957aa76462a9c0129dcd7a... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100c44b22406af1176d39f809afc8cf158b407678957aa76462a9c0... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (6 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b855dca5d8880f0037eb9f610a6536a7577b68b3dd5ca77a2cf7f80eb7e3... handshake new: [259] 010101b855dca5d8880f0037eb9f610a6536a7577b68b3dd5ca77a2cf7f80eb7... record old: [262] 100001020100b855dca5d8880f0037eb9f610a6536a7577b68b3dd5ca77a2cf7... record new: [263] 10000103010101b855dca5d8880f0037eb9f610a6536a7577b68b3dd5ca77a2c... client: Filtered packet: [319] 160303010710000103010101b855dca5d8880f0037eb9f610a6536a7577b68b3... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009cc2b434fc62e67e09464a7a4bfa82e8a1fa252752dafd058a085ce1ceb3... handshake new: [259] 0101019cc2b434fc62e67e09464a7a4bfa82e8a1fa252752dafd058a085ce1ce... record old: [262] 1000010201009cc2b434fc62e67e09464a7a4bfa82e8a1fa252752dafd058a08... record new: [263] 100001030101019cc2b434fc62e67e09464a7a4bfa82e8a1fa252752dafd058a... client: Filtered packet: [319] 1603030107100001030101019cc2b434fc62e67e09464a7a4bfa82e8a1fa2527... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100119de4667f714aa9c8cba1b22dcbb0cd7cfc968f22ed739f31c875f7c21f... handshake new: [259] 010100119de4667f714aa9c8cba1b22dcbb0cd7cfc968f22ed739f31c875f7c2... record old: [262] 100001020100119de4667f714aa9c8cba1b22dcbb0cd7cfc968f22ed739f31c8... record new: [263] 10000103010100119de4667f714aa9c8cba1b22dcbb0cd7cfc968f22ed739f31... client: Filtered packet: [319] 160303010710000103010100119de4667f714aa9c8cba1b22dcbb0cd7cfc968f... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (7 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100cd344c09ec6f4cd2d277365f10036c16e43a24a011bab3715e786b40b20e... handshake new: [259] 010100cd344c09ec6f4cd2d277365f10036c16e43a24a011bab3715e786b40b2... record old: [262] 100001020100cd344c09ec6f4cd2d277365f10036c16e43a24a011bab3715e78... record new: [263] 10000103010100cd344c09ec6f4cd2d277365f10036c16e43a24a011bab3715e... client: Filtered packet: [319] 160303010710000103010100cd344c09ec6f4cd2d277365f10036c16e43a24a0... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (8 ms) [----------] 72 tests from DamageYStream/TlsDamageDHYTest (409 ms total) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057fefffb5445b291... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff048edd1657... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff923789341b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff29d73ef4d4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffdfff7db7b6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffd1545dde94... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff7359af0942... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffba1156b70b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff8bc60d736a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff35d473ae9a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff3d21a86e12... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff7b915d0382... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd3640d42385... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefda462cf0de1... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdeeef44dd72... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd0f110cf48a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd55d6cdc03b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd1dec43b8e5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd10c0a2296f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefde097552e1e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefdd1acda07ec... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefdb9d6d31833... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd7cebda4808... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (4 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd2abb1e69ec... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (5 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001b4f1890daee3448b2bafbdc0c253b2be0ea5d11a49d0f3686500430c31a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201001b4f1890daee3448b2bafbdc0c253b2be0ea... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008908d9813913003c07249fb513e046726ef55c0f44c6d55e97040ad4be5f... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201008908d9813913003c07249fb513e046726ef5... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010080743bfb305cdbb05fc70577eda954d2c4e47efdb0ee5b84fb2bc6bcfa0a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010080743bfb305cdbb05fc70577eda954d2c4e4... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e365d54c1c1328d96cba205dd4b027514e37b1bae88e3d47d6fc7595d432... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100e365d54c1c1328d96cba205dd4b027514e37... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010001538977c1a956b0209e74f7d06e4c8aceb320834de7a243e805c1a5b56d... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 100001020001000000000102010001538977c1a956b0209e74f7d06e4c8aceb3... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100aea6734f25447d0bd41192d9f68a4f7bd6e69975d46782247d6be65e8a43... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100aea6734f25447d0bd41192d9f68a4f7bd6e6... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010015f3b81f71fb26913f2d8d801ac362766e7c106c9569a5665b3acf763017... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 100001020001000000000102010015f3b81f71fb26913f2d8d801ac362766e7c... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010079203d5b0aa034bfd44a6fc133700b8ad1ad01d21224b1c93b94f748b16d... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 100001020001000000000102010079203d5b0aa034bfd44a6fc133700b8ad1ad... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e0e4693353f7ac1745221a10bb54a8bf9fe3ec828e4255d4ec198ce55253... handshake new: [259] 010101e0e4693353f7ac1745221a10bb54a8bf9fe3ec828e4255d4ec198ce552... record old: [270] 1000010200010000000001020100e0e4693353f7ac1745221a10bb54a8bf9fe3... record new: [271] 100001030001000000000103010101e0e4693353f7ac1745221a10bb54a8bf9f... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101e0e46933... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c31459f7e9b4c549e778a5f9d487dc90c4aeb64c6ff9294312b19edc69c2... handshake new: [259] 010101c31459f7e9b4c549e778a5f9d487dc90c4aeb64c6ff9294312b19edc69... record old: [270] 1000010200010000000001020100c31459f7e9b4c549e778a5f9d487dc90c4ae... record new: [271] 100001030001000000000103010101c31459f7e9b4c549e778a5f9d487dc90c4... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101c31459f7... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006fed824158e18cafd9ea9546f2dd9e8411861e4c617bc3301ad130227039... handshake new: [259] 0101006fed824158e18cafd9ea9546f2dd9e8411861e4c617bc3301ad1302270... record old: [270] 10000102000100000000010201006fed824158e18cafd9ea9546f2dd9e841186... record new: [271] 1000010300010000000001030101006fed824158e18cafd9ea9546f2dd9e8411... client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101006fed8241... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003baa7d234724cd2429968a8cfbeffbc38b8079b7cd5b7b0ad583b8d8bf78... handshake new: [259] 0101003baa7d234724cd2429968a8cfbeffbc38b8079b7cd5b7b0ad583b8d8bf... record old: [270] 10000102000100000000010201003baa7d234724cd2429968a8cfbeffbc38b80... record new: [271] 1000010300010000000001030101003baa7d234724cd2429968a8cfbeffbc38b... client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101003baa7d23... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (8 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010001a11e5053f1a0d1a0f1eb41a996c00d484aa52ec79e86dedf3ab2c59f6b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010001a11e5053f1a0d1a0f1eb41a996c00d484a... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ba73e9932d69a626d7e5c2680b253be43e64f2115421c35abe3533590446... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100ba73e9932d69a626d7e5c2680b253be43e64... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010051508c5af2fbd211b680db8f85e6fe4cfe717ccd32b06aab0ce4a00510b6... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010051508c5af2fbd211b680db8f85e6fe4cfe71... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100894d91156dd3317ff1c1426810271b93858382cfac472f1b9f7374c50666... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100894d91156dd3317ff1c1426810271b938583... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004ccca5ab19329f07313f94efe9860b625c3303b1c0e7b85520189b70269c... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201004ccca5ab19329f07313f94efe9860b625c33... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005c96076fee10634c9b4b060ac432f822f9b63dc34f5a0e6df77d0e570c65... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201005c96076fee10634c9b4b060ac432f822f9b6... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100bfe30e4bbec427b89a71d5de8093945412b9c7cb75bd15c0da378bea9ee1... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100bfe30e4bbec427b89a71d5de8093945412b9... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (6 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001dd29d0f447c4bf35396c646b6ecc7ad1566d2105d6ca9df090e98601437... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201001dd29d0f447c4bf35396c646b6ecc7ad1566... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000d42a7303d304c4f42d397e4438dd3d76899ac991eafbc4f74bdc4103473... handshake new: [259] 0101010d42a7303d304c4f42d397e4438dd3d76899ac991eafbc4f74bdc41034... record old: [270] 10000102000100000000010201000d42a7303d304c4f42d397e4438dd3d76899... record new: [271] 1000010300010000000001030101010d42a7303d304c4f42d397e4438dd3d768... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101010d42a730... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f58fbfd481ca0b098c45c66b4808f428ddfc3590bd6e46add6be5313110e... handshake new: [259] 010101f58fbfd481ca0b098c45c66b4808f428ddfc3590bd6e46add6be531311... record old: [270] 1000010200010000000001020100f58fbfd481ca0b098c45c66b4808f428ddfc... record new: [271] 100001030001000000000103010101f58fbfd481ca0b098c45c66b4808f428dd... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101f58fbfd4... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a532892b32f7a59f3977ae38e68c6dbc02f8993ac2c30a695bf138ffc420... handshake new: [259] 010100a532892b32f7a59f3977ae38e68c6dbc02f8993ac2c30a695bf138ffc4... record old: [270] 1000010200010000000001020100a532892b32f7a59f3977ae38e68c6dbc02f8... record new: [271] 100001030001000000000103010100a532892b32f7a59f3977ae38e68c6dbc02... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010100a532892b... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (7 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010011a8ffbb292d50f6e33453a2911d65c12ef2e81d3bc86f0709b21834f43a... handshake new: [259] 01010011a8ffbb292d50f6e33453a2911d65c12ef2e81d3bc86f0709b21834f4... record old: [270] 100001020001000000000102010011a8ffbb292d50f6e33453a2911d65c12ef2... record new: [271] 10000103000100000000010301010011a8ffbb292d50f6e33453a2911d65c12e... client: Filtered packet: [359] 16fefd0000000000000001010f10000103000100000000010301010011a8ffbb... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (8 ms) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (274 ms total) [----------] 14 tests from DatagramPre13/TlsConnectDatagramPre13 [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/0 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/1 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/0 (54 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/1 (54 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Drop packet client: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/0 (460 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Drop packet client: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/1 (461 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/0 (358 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/1 (359 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/0 (54 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/1 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/0 (358 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/1 (357 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/0 (358 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/1 (357 ms) [----------] 14 tests from DatagramPre13/TlsConnectDatagramPre13 (3395 ms total) [----------] 22 tests from DatagramDrop13/TlsDropDatagram13 [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 0:[187] 010000af00000000000000affefdc2322190feb537d4681f5b1b449703b3f511... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/0 (56 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 0:[187] 010000af00000000000000affefd89d8fae0a94ce3da91e46d42fd174193c93e... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/1 (56 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefded57cb47492989753fe57c010f25e0b47101... record drop: DTLS 1.3 <46> 20000000059b3:[65] b6cd874e8ec912cd5ab478e9b9137ebb14e560726db0d621719249a9c0dc63d7... record drop: DTLS 1.3 <46> 200000000f955:[470] 714dd48bfa364a23d438cb70607f693ce537ca9e2a6214d4df2487e0cf1aca8b... record drop: DTLS 1.3 <46> 20000000089ee:[161] 3ff17f7d118866a934e497c1264a15a9f8dbd9029041a879f8041819f991746e... record drop: DTLS 1.3 <46> 200000000a6bd:[61] 62c3143cb18e87ad54a2f5611badc9b40b514d6613723328cf0344efa28af60a... server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/0 (54 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd9811f30b5cffe1438deda22f1216806a749b... record drop: DTLS 1.3 <46> 200000000eaf8:[65] da2a85cd52c1612a8ac2017a835bfda0ce70f882c07483ca9f9df5acadaefb4e... record drop: DTLS 1.3 <46> 20000000056f4:[470] 42576824ba610377ecb1905d93ae0a8f0720b9eba1135f0e271f9bc2a11debf1... record drop: DTLS 1.3 <46> 20000000076e7:[161] 9d73983f8f1780b1d11f69ad643334679d4b5372410af57ddff422bed0cb0ad7... record drop: DTLS 1.3 <46> 200000000cb7c:[61] 0bb9b8fc47e26904bf38ed77963a7b4461e73a091535a0ed449feac5514eeb12... server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/1 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefdd15caaa85d4ec6bd31d0149406fb4caa00dc... server: Filtered packet: [777] 2ef7a400412c37e76aa82ea45189fb96bbbf5d7415a63ef992dcf9dcb4fa7281... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/0 (54 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd5c32f6053edb28b52f38631d608a162ac977... server: Filtered packet: [777] 2e944a00414be39c50251ba3d6b576bcf382279c4bbe57ae253bc539aba132ca... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/1 (55 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000a030:[65] f944b06e047585fdd41d6298fb1d3ee4ebcbe0ba7fba60d42a5e8b934be31459... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefda95e27b54b... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 20000000052d2:[65] 9d11590d642b4529f124f9c4077978388da0e43e7143a070045bb739c8498e41... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefd8d3c9abb18... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/1 (5 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED record drop: DTLS 1.3 <35> 30000000000c5:[27] 39377b9ce14381a72c904ac27cbfb1df0d67c4a36e6ca66e62ff5f server: Drop packet Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED record drop: DTLS 1.3 <47> 300000000645c:[27] f93c48425cfb788d1058f64dd001d3577cb2eb52fa35992521a859 server: Drop packet Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/1 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000fef8:[161] 75acfc067c00c27e8dc105ab87eab7cdb2750a98043ab1878f45835e4986a1a1... client: Filtered packet: [547] 2ed80601dc36728b99fc899e8ba195b75eb426bd6f7b0a8dbac34c6081e975a6... client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/0 (20 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000b1df:[161] 321059c6215536fffe5048a671862dd009319584dc44888d882c38e9912d9143... client: Filtered packet: [547] 2e780701dc0471afb8b93c56245c684b0469260212afe2decafc5a0c02610201... client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/1 (19 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000daf6:[259] dc1adc98038d8331d241d174b8703e4a4bfe46ffd172806f7f9ca8d17c6946d5... server: Filtered packet: [181] 16fefd00000000000000000062020000560000000000000056fefd345e48911a... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000d18f:[259] 9eb3baea8464fd86cde85f26bb0efa2776af49a1846c31f2d47a39c9c4569e94... server: Filtered packet: [181] 16fefd00000000000000000062020000560000000000000056fefd37d155ffb5... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/1 (5 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000004a:[240] 04a6020ac7f2978e8f12729b3fd6c214f5e1d8fd22385c91ca8d6c6fb21afec5... server: Filtered packet: [166] 2e8e3500a174667c8f9c85c6753c77f6476cd0573176494c557cc3d8b118da13... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000006a18:[240] 5ade36ab66ae9fc3982661fe853f6b896713ec161a7df0ffcf10dc182ae46eaf... server: Filtered packet: [166] 2e934800a126afc1350829ed3a3b06ffa36db1c212ca8b3c133b71e0aaf1ad5e... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/1 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/0 (9 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/1 (8 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake record drop: DTLS 1.3 <46> 20000000010b9:[69] 49f6bd996e08955f14ecda9b4d5b1a093cb0bfc1fbee96d1632c0b2e48354d4e... server: Filtered packet: [183] 16fefd000000000000000000680200005c000000000000005cfefd24766078d8... 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/0 (9 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake record drop: DTLS 1.3 <46> 200000000d68f:[69] 7869c7b14725c95e02553e8f3944dbc54e8f9555132b04f486b28ee415eb6709... server: Filtered packet: [183] 16fefd000000000000000000680200005c000000000000005cfefdf630ab7ca1... 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/1 (8 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000d82e:[65] 24207df13f6af2e176369e9c8e22edd5cbd8241237ce149af27a9b82156a4441... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefd655f4f7c8e... server: Send Direct [70] 2ed82e004124207df13f6af2e176369e9c8e22edd5cbd8241237ce149af27a9b... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/0 (4 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000b3f8:[65] 3259d45c1eea591fbc1e24eb2905dc40e5f9763f57f43f311ea87a2a83d508b2... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefd63e57ad36a... server: Send Direct [70] 2eb3f800413259d45c1eea591fbc1e24eb2905dc40e5f9763f57f43f311ea87a... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/1 (5 ms) [----------] 22 tests from DatagramDrop13/TlsDropDatagram13 (446 ms total) [----------] 4 tests from DatagramFragment13/TlsFragmentationAndRecoveryTest [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000a997:[470] 433f99d107b3a54c73ddf7dd781f2f3ad3f2e84cf0adb901d743f04170430e58... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefd2f36fb94ba... record drop: DTLS 1.3 <46> 2000000009781:[251] 997a2dca7dc1c0d9cc7322b3eeaa43bf9a7496ba61a00afe4a4c315bfd77260b... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000005 client: Drop packet record drop: DTLS 1.3 <46> 2000000009e87:[177] 03c9aa8a201e77bca034682168f4adeb2c89eb2f2078c8bd20a0a2e1b0956fda... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/0 (4 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000177e:[470] 4e57a0d87c53643fcbf89e23511de46423c963968f3b1ca6b0c96951712d1f4c... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefda7dd63dbd1... record drop: DTLS 1.3 <46> 20000000092d2:[251] c82e25521e6b4e373ee95ab1278bfd104dfaab8576766c5049624d18fe02c15d... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000005 client: Drop packet record drop: DTLS 1.3 <46> 200000000d30a:[177] 5546e823b78d94a72387b7c1d8a503a8dd8484c45d7b8d889c4923361c3cd756... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/1 (5 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000c835:[470] 441f36d4c52d3e4c8177bfaf1da15effd5554db8c6ac42c46e6213ecfc787685... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefd2868c951a4... record drop: DTLS 1.3 <46> 200000000390c:[248] d222355ec46665b1454d0996867212883a9c0c8a8f326d96005aebbbe2f73214... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000004 client: Drop packet record drop: DTLS 1.3 <46> 20000000078df:[177] 986cd63b8f11a0833ec3d64123a993e87a5263961cb074b86960ddbe6da2fa13... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/0 (5 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 20000000011e6:[470] c64a92a8f0eeeb02f7bba0a80d52dc5699341abae35793947f8762f33c7e282d... server: Filtered packet: [413] 16fefd00000000000000000062020000560000000000000056fefd0490e2f711... record drop: DTLS 1.3 <46> 2000000007972:[248] cb3c35e62c7ffa01f8962e49ec3a3dfad1977db1c83b88429e618a7206ab6376... server: Drop packet record drop: DTLS 1.2 ACK 2:[26] 0018000000000000000000020000000000000002000000000004 client: Drop packet record drop: DTLS 1.3 <46> 2000000006a4f:[177] e945ed3374b180eed41058c67be674cc6a784911aa102eeb8cf17a1b34e31aef... server: Drop packet client: Send Direct [39] 1afefd0000000000000002001a00180000000000000000000200000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/1 (4 ms) [----------] 4 tests from DatagramFragment13/TlsFragmentationAndRecoveryTest (18 ms total) [----------] 6 tests from DatagramReorder13/TlsReorderDatagram13 [ RUN ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd7e161d60ac17b213e5c9a419831f9827d354... record drop: DTLS 1.3 <46> 2000000005fea:[65] 014156e346a24dc063f8ce5780f47eccca86abf2b95a7e90462a91159b8f4904... record drop: DTLS 1.3 <46> 200000000d457:[259] 7c2a9ed61d4fc69eb20732bbe38e9ee8e1859e8aece1900a28af1b1db14725d2... server: Drop packet record drop: DTLS 1.3 <46> 200000000a096:[240] 0e24943286da121bef5070bec11b80dd45de7734929d3bad230e92ea0957af4d... record drop: DTLS 1.3 <46> 200000000a035:[161] 621f835c780ae501e30a192d9dff86f9f70a993ecf22bc137494548b21e4d681... server: Drop packet record drop: DTLS 1.3 <46> 2000000006e31:[61] d7e99deab744a601a9e251d85458f14698e6eaae4f5d437a8f652d6bd732a05c... server: Drop packet server: Send Direct [111] 16fefd00000000000000000062020000560000000000000056fefd7e161d60ac... server: Send Direct [70] 2e5fea0041014156e346a24dc063f8ce5780f47eccca86abf2b95a7e90462a91... server: Send Direct [245] 2ea09600f00e24943286da121bef5070bec11b80dd45de7734929d3bad230e92... server: Send Direct [264] 2ed45701037c2a9ed61d4fc69eb20732bbe38e9ee8e1859e8aece1900a28af1b... server: Send Direct [166] 2ea03500a1621f835c780ae501e30a192d9dff86f9f70a993ecf22bc13749454... server: Send Direct [66] 2e6e31003dd7e99deab744a601a9e251d85458f14698e6eaae4f5d437a8f652d... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/0 (5 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefdfe3e944470dba19f441a4e2907910f011b3a... record drop: DTLS 1.3 <46> 200000000478c:[65] 7802b1b37e9826993d53a1468382bd8a390eeb9330240286759377970c039157... record drop: DTLS 1.3 <46> 2000000006484:[259] de46f1d6a701afb0746cda2f15a4e30e992b75c79741390bf34e35995e6d3abc... server: Drop packet record drop: DTLS 1.3 <46> 200000000405d:[240] 288186da49a7dbb99eed4177e2f125f0298f388ac3f15c48935a84a7261da63b... record drop: DTLS 1.3 <46> 200000000f6c0:[161] 8b57c6eae05680426b6898ad71b2ba0712dca039a611a4f40bbdd6a882e737da... server: Drop packet record drop: DTLS 1.3 <46> 200000000549c:[61] 7b05f26eed86de2bed3f24ae6c09d9fd40a73f0fc67bf50dcbaf524010086003... server: Drop packet server: Send Direct [111] 16fefd00000000000000000062020000560000000000000056fefdfe3e944470... server: Send Direct [70] 2e478c00417802b1b37e9826993d53a1468382bd8a390eeb9330240286759377... server: Send Direct [245] 2e405d00f0288186da49a7dbb99eed4177e2f125f0298f388ac3f15c48935a84... server: Send Direct [264] 2e64840103de46f1d6a701afb0746cda2f15a4e30e992b75c79741390bf34e35... server: Send Direct [166] 2ef6c000a18b57c6eae05680426b6898ad71b2ba0712dca039a611a4f40bbdd6... server: Send Direct [66] 2e549c003d7b05f26eed86de2bed3f24ae6c09d9fd40a73f0fc67bf50dcbaf52... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/1 (4 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 100000000e30a:[23] 85929b087d400892713a419ac683519a0586fa0912450e client: Drop packet record drop: DTLS 1.3 <45> 100000000d509:[29] 952da1bbec3e3f37d16ae94a97b95ed2d17270615bd78268d48760b120 record drop: DTLS 1.3 <46> 2000000000e1e:[61] fedbd53447f8651e7f694563319b0963e66e89f041794767904dec8ff6482f43... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2dd509001d952da1bbec3e3f37d16ae94a97b95ed2d17270615bd78268d48760... client: Send Direct [28] 2de30a001785929b087d400892713a419ac683519a0586fa0912450e client: Send Direct [66] 2e0e1e003dfedbd53447f8651e7f694563319b0963e66e89f041794767904dec... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/0 (9 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 100000000537c:[23] 3e5b56970bc7521c10d237ac56fdad5253ecfd1df365aa client: Drop packet record drop: DTLS 1.3 <45> 1000000007ab9:[29] 436dc40de0df05364c5a41b02a27dc4d3535f1091fd98f3fb797dd2df9 record drop: DTLS 1.3 <46> 200000000dc4f:[61] e9853ff3b9279a32faa2204dacd9f103be86569941d276368653defaba81fc99... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d7ab9001d436dc40de0df05364c5a41b02a27dc4d3535f1091fd98f3fb797dd... client: Send Direct [28] 2d537c00173e5b56970bc7521c10d237ac56fdad5253ecfd1df365aa client: Send Direct [66] 2edc4f003de9853ff3b9279a32faa2204dacd9f103be86569941d276368653de... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/1 (8 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 1000000002717:[23] b401c509c6e6cf2dfff24d4068a6da46e39541e047c2d2 client: Drop packet record drop: DTLS 1.3 <45> 1000000001a4b:[29] da8c5689800ff90d6af6a46eb91857c37301106d6dddb39d08988a163d record drop: DTLS 1.3 <46> 200000000a3e1:[61] fee50fa455d9c99efe8946910bfa0a3af67a8abe747a4c1bdb803358d294f5a6... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d1a4b001dda8c5689800ff90d6af6a46eb91857c37301106d6dddb39d08988a... client: Send Direct [66] 2ea3e1003dfee50fa455d9c99efe8946910bfa0a3af67a8abe747a4c1bdb8033... client: Send Direct [28] 2d27170017b401c509c6e6cf2dfff24d4068a6da46e39541e047c2d2 server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/0 (9 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 100000000d6be:[23] 6bc15c71b975451234c0c2d9ee84df64161407d414ebe9 client: Drop packet record drop: DTLS 1.3 <45> 100000000238f:[29] 69476c6377a55328f5d7099812de12f5720a6abee9b0b23b9f577dd0a8 record drop: DTLS 1.3 <46> 20000000060f3:[61] 1f26e8ac3fa4e443690007a48d74dcad924b1146c41a6d848dcfcebeb2084c3e... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d238f001d69476c6377a55328f5d7099812de12f5720a6abee9b0b23b9f577d... client: Send Direct [66] 2e60f3003d1f26e8ac3fa4e443690007a48d74dcad924b1146c41a6d848dcfce... client: Send Direct [28] 2dd6be00176bc15c71b975451234c0c2d9ee84df64161407d414ebe9 server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/1 (8 ms) [----------] 6 tests from DatagramReorder13/TlsReorderDatagram13 (43 ms total) [----------] 24 tests from DatagramOnly/TlsConnectDatagram [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/1 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/2 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [794] 2cfefd00000000000000000004010203042e029500414785a36f85b5feedc973... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/0 (55 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [698] 17fefd000000000000000000040102030416fefd000000000000000101c20b00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/1 (53 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [696] 17feff000000000000000000040102030416feff000000000000000101c20b00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/2 (55 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/0 (56 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/1 (56 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/2 (55 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [231] 16feff00000000000000000066010000b5000000000000005afefdcca54459ec... client: Filtered packet: [66] 2e380b003de1b7d8156b6034f7696919c5101a93f755ed0bdebc25932be876eb... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [72] 2fa49c004381ff33f37926f8f729b28617a210bf249714917c608372ca684f18... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [24] 2fc5c10013f914de1f4582aa7db6fde1f5afb844276923fb client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [234] 16feff00000000000000000068010000b8000000000000005cfefde9f886baea... client: Filtered packet: [158] 16fefd0000000000000002001c10000021000100000000001020ff000ce47280... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Filtered packet: [87] 17fefd0001000000000001004a0001000000000001ace88079ddc029fbc9315e... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [39] 15fefd0001000000000002001a00010000000000023ef967bf8e90b0a4fef15b... client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [164] 16feff00000000000000000045010000720000000000000039feff4a5e8b7e25... client: Filtered packet: [174] 16feff0000000000000002001c100000210001000000000010202b30615fa8de... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Filtered packet: [109] 17feff000100000000000100606ad2673ab08b2a16a204c5db1e10b82ad335dd... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [61] 15feff000100000000000200305bd31ce691e615a48ad258fd4203b18873d398... client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/2 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [913] 16fefd0000000000000000003702000056000000000000002bfefde96580d121... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Filtered packet: [32] 2ff261001b3ce20719612eb4cbf67805047c523ab5ccd1c49e6a48ecb713b6f1 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Filtered packet: [72] 2f08780043773778d66ae66b37eedffcf0b82cf55064e94d1b63363b8a1d519d... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [874] 16fefd0000000000000000003a0200005d000000000000002efefde629e1d214... server: Filtered packet: [75] 14fefd000000000000000700010116fefd000100000000000000300001000000... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [87] 17fefd0001000000000001004a000100000000000151de8357f4d1cf6f042290... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/1 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [872] 16feff0000000000000000003a0200005d000000000000002efeff7776eeff80... server: Filtered packet: [91] 14feff000000000000000700010116feff000100000000000000403725bccb59... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [109] 17feff00010000000000010060b52bb967e3292b00be25571f4b89cf0f1e71aa... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/2 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/2 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/0 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/2 (4 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/0 (5 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/1 (3 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/2 (4 ms) [----------] 24 tests from DatagramOnly/TlsConnectDatagram (398 ms total) [----------] 4 tests from Datagram12Plus/TlsConnectDatagram12Plus [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/0 (4 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/1 (3 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/0 (5 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/1 (3 ms) [----------] 4 tests from Datagram12Plus/TlsConnectDatagram12Plus (15 ms total) [----------] 24 tests from KeyExchangeTest/TlsKeyExchangeTest [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 (17 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 (18 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/4 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/5 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 (17 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 (17 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/4 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/5 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 (17 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 (17 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/4 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/5 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/0 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/1 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/2 (7 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/3 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/3 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/4 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/4 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/5 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/5 (7 ms) [----------] 24 tests from KeyExchangeTest/TlsKeyExchangeTest (292 ms total) [----------] 36 tests from Pre13StreamOnly/TlsConnectStreamPre13 [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/0 (11 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/1 (11 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/2 (10 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0301e65ea827067e4458f470a02e0702be373ec7d789d56424cfe68866945a4b... handshake new: [93] 0301cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [713] 0200005d0301e65ea827067e4458f470a02e0702be373ec7d789d56424cfe688... record new: [713] 0200005d0301cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [718] 16030102c90200005d0301cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03020553b7a7ec81f6155e05638ac7c2be4f2b33e7ad3285fd4bade71ddeefdb... handshake new: [93] 0302cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [713] 0200005d03020553b7a7ec81f6155e05638ac7c2be4f2b33e7ad3285fd4bade7... record new: [713] 0200005d0302cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [718] 16030202c90200005d0302cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0303ae14b61c4f9605036a0187ba22f2421c985de2c8b85167697b15587b2d55... handshake new: [93] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [715] 0200005d0303ae14b61c4f9605036a0187ba22f2421c985de2c8b85167697b15... record new: [715] 0200005d0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [720] 16030302cb0200005d0303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [110] 16030100251000002120d4f7f1662fb5d6aafd73561520ff5532ca810340dbff... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/0 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [126] 160302002510000021206022854f8908eb3cb9bd2d4f3ac1fb26ffd2a01d787d... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [102] 16030300251000002120c4cfe2b288d4dc9496343e895b9f3189e41aa53b82e3... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [68] 16030100041400000c140301000101160301003054466c41d6e3bf43776e0547... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/0 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [84] 16030200041400000c1403020001011603020040bf40b066359f3b6f84585e1f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/1 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [60] 16030300041400000c140303000101160303002800000000000000000ec0221e... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTED to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/0 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/1 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/2 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/0 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/1 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/2 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/0 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/1 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 008009c2fe3e52324c6e5bc5454020ce0db6ad6fefa66b0e0f30d6a5b3f1cbd5... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 10000082008009c2fe3e52324c6e5bc5454020ce0db6ad6fefa66b0e0f30d6a5... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00800b1d2483c41733a1ee133bcc27ad0ea7f4e31aeeb3dfb60d20d57e256fd6... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 1000008200800b1d2483c41733a1ee133bcc27ad0ea7f4e31aeeb3dfb60d20d5... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080933147538b3fb6f96879b1c5a82f40c11261b4a3289db399318db9436837... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 100000820080933147538b3fb6f96879b1c5a82f40c11261b4a3289db399318d... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 (2 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00801ccea8ca12757cfd926bd49d515f22898c3f0fb246271f1eb500f9e02fc2... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 1000008200801ccea8ca12757cfd926bd49d515f22898c3f0fb246271f1eb500... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 (2 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00801fcd7a13d66f91cee35a294e193e5586d242c19a249f3e6199cfdf7ab962... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 1000008200801fcd7a13d66f91cee35a294e193e5586d242c19a249f3e6199cf... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 008091645bd1fb42b7f76867f35b9c1348e28a738c9ff9468f20b1d692821db7... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 10000082008091645bd1fb42b7f76867f35b9c1348e28a738c9ff9468f20b1d6... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 (3 ms) [----------] 36 tests from Pre13StreamOnly/TlsConnectStreamPre13 (150 ms total) [----------] 16 tests from KeyExchangeTest/TlsKeyExchangeTest13 [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/0 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/0 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/1 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/1 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/0 (8 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/1 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/0 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/1 (4 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/0 (9 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/1 (8 ms) [----------] 16 tests from KeyExchangeTest/TlsKeyExchangeTest13 (120 ms total) [----------] 68 tests from ExtensionStream/TlsExtensionTestGeneric [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [180] 030346a58b90d81faa31856c454dd6f72d723b79555c5f95c59dd6a64eaffeab... handshake new: [180] 030346a58b90d81faa31856c454dd6f72d723b79555c5f95c59dd6a64eaffeab... record old: [184] 010000b4030346a58b90d81faa31856c454dd6f72d723b79555c5f95c59dd6a6... record new: [184] 010000b4030346a58b90d81faa31856c454dd6f72d723b79555c5f95c59dd6a6... client: Filtered packet: [189] 16030100b8010000b4030346a58b90d81faa31856c454dd6f72d723b79555c5f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [187] 03035cd02af5a06276a1b23b44fd4c92d6bfb6f55fb3369e184afd1a375b183c... handshake new: [187] 03035cd02af5a06276a1b23b44fd4c92d6bfb6f55fb3369e184afd1a375b183c... record old: [191] 010000bb03035cd02af5a06276a1b23b44fd4c92d6bfb6f55fb3369e184afd1a... record new: [191] 010000bb03035cd02af5a06276a1b23b44fd4c92d6bfb6f55fb3369e184afd1a... client: Filtered packet: [196] 16030100bf010000bb03035cd02af5a06276a1b23b44fd4c92d6bfb6f55fb336... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [117] 0302bb2bf02a1ee00158fddd32900aa474b9c573c2d140e00589e35ab48fc455... handshake new: [117] 0302bb2bf02a1ee00158fddd32900aa474b9c573c2d140e00589e35ab48fc455... record old: [121] 010000750302bb2bf02a1ee00158fddd32900aa474b9c573c2d140e00589e35a... record new: [121] 010000750302bb2bf02a1ee00158fddd32900aa474b9c573c2d140e00589e35a... client: Filtered packet: [126] 1603010079010000750302bb2bf02a1ee00158fddd32900aa474b9c573c2d140... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [117] 03016ebf82553a271edf938addd9bd4200f8714bc0ed498a2d986bc93d93e13c... handshake new: [117] 03016ebf82553a271edf938addd9bd4200f8714bc0ed498a2d986bc93d93e13c... record old: [121] 0100007503016ebf82553a271edf938addd9bd4200f8714bc0ed498a2d986bc9... record new: [121] 0100007503016ebf82553a271edf938addd9bd4200f8714bc0ed498a2d986bc9... client: Filtered packet: [126] 16030100790100007503016ebf82553a271edf938addd9bd4200f8714bc0ed49... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [180] 0303d6f950b6a30f1b97c7cb20481f66db679e5df38c78ffb2db6fc729a21521... handshake new: [180] 0303d6f950b6a30f1b97c7cb20481f66db679e5df38c78ffb2db6fc729a21521... record old: [184] 010000b40303d6f950b6a30f1b97c7cb20481f66db679e5df38c78ffb2db6fc7... record new: [184] 010000b40303d6f950b6a30f1b97c7cb20481f66db679e5df38c78ffb2db6fc7... client: Filtered packet: [189] 16030100b8010000b40303d6f950b6a30f1b97c7cb20481f66db679e5df38c78... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [187] 0303e2df1415f942502c56e189096696260105096d3d59cfa9ffa1fd46edf4e0... handshake new: [187] 0303e2df1415f942502c56e189096696260105096d3d59cfa9ffa1fd46edf4e0... record old: [191] 010000bb0303e2df1415f942502c56e189096696260105096d3d59cfa9ffa1fd... record new: [191] 010000bb0303e2df1415f942502c56e189096696260105096d3d59cfa9ffa1fd... client: Filtered packet: [196] 16030100bf010000bb0303e2df1415f942502c56e189096696260105096d3d59... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [117] 0302608b30e3c39b6aaa3d0b61e11d439734b6f8dcdf920cdbbcf77c5cbab8db... handshake new: [117] 0302608b30e3c39b6aaa3d0b61e11d439734b6f8dcdf920cdbbcf77c5cbab8db... record old: [121] 010000750302608b30e3c39b6aaa3d0b61e11d439734b6f8dcdf920cdbbcf77c... record new: [121] 010000750302608b30e3c39b6aaa3d0b61e11d439734b6f8dcdf920cdbbcf77c... client: Filtered packet: [126] 1603010079010000750302608b30e3c39b6aaa3d0b61e11d439734b6f8dcdf92... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [117] 03016a50e3bcbd7c2b0d440f0541bf8a5303427b55d9ebd8bc1ee10d5abb47ef... handshake new: [117] 03016a50e3bcbd7c2b0d440f0541bf8a5303427b55d9ebd8bc1ee10d5abb47ef... record old: [121] 0100007503016a50e3bcbd7c2b0d440f0541bf8a5303427b55d9ebd8bc1ee10d... record new: [121] 0100007503016a50e3bcbd7c2b0d440f0541bf8a5303427b55d9ebd8bc1ee10d... client: Filtered packet: [126] 16030100790100007503016a50e3bcbd7c2b0d440f0541bf8a5303427b55d9eb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [180] 0303678914a82b7ad3f1504f6c490747d1c2aeeeebb24f343cebddf273fa36de... handshake new: [176] 0303678914a82b7ad3f1504f6c490747d1c2aeeeebb24f343cebddf273fa36de... record old: [184] 010000b40303678914a82b7ad3f1504f6c490747d1c2aeeeebb24f343cebddf2... record new: [180] 010000b00303678914a82b7ad3f1504f6c490747d1c2aeeeebb24f343cebddf2... client: Filtered packet: [185] 16030100b4010000b00303678914a82b7ad3f1504f6c490747d1c2aeeeebb24f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [187] 0303cfbcc55f059f164346370f4f84d88c47bc9a29550f04d39629ecb25fee0d... handshake new: [183] 0303cfbcc55f059f164346370f4f84d88c47bc9a29550f04d39629ecb25fee0d... record old: [191] 010000bb0303cfbcc55f059f164346370f4f84d88c47bc9a29550f04d39629ec... record new: [187] 010000b70303cfbcc55f059f164346370f4f84d88c47bc9a29550f04d39629ec... client: Filtered packet: [192] 16030100bb010000b70303cfbcc55f059f164346370f4f84d88c47bc9a29550f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [117] 03022b39e947b915bbffd3632128693176700b3d2f648a0b672b1bbd53c3fffd... handshake new: [113] 03022b39e947b915bbffd3632128693176700b3d2f648a0b672b1bbd53c3fffd... record old: [121] 0100007503022b39e947b915bbffd3632128693176700b3d2f648a0b672b1bbd... record new: [117] 0100007103022b39e947b915bbffd3632128693176700b3d2f648a0b672b1bbd... client: Filtered packet: [122] 16030100750100007103022b39e947b915bbffd3632128693176700b3d2f648a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [117] 03018e320a6e0dcf786f3532277c87aea8f3356ce4846d2fe3ad6564d85070bc... handshake new: [113] 03018e320a6e0dcf786f3532277c87aea8f3356ce4846d2fe3ad6564d85070bc... record old: [121] 0100007503018e320a6e0dcf786f3532277c87aea8f3356ce4846d2fe3ad6564... record new: [117] 0100007103018e320a6e0dcf786f3532277c87aea8f3356ce4846d2fe3ad6564... client: Filtered packet: [122] 16030100750100007103018e320a6e0dcf786f3532277c87aea8f3356ce4846d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [180] 0303a0957891fca8d4708d01c851021997b0c7f6a448a4443d2852cdd9d58754... handshake new: [198] 0303a0957891fca8d4708d01c851021997b0c7f6a448a4443d2852cdd9d58754... record old: [184] 010000b40303a0957891fca8d4708d01c851021997b0c7f6a448a4443d2852cd... record new: [202] 010000c60303a0957891fca8d4708d01c851021997b0c7f6a448a4443d2852cd... client: Filtered packet: [207] 16030100ca010000c60303a0957891fca8d4708d01c851021997b0c7f6a448a4... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303d3202d6126fcc4e152c159d59bd87a86c572eb25326c4506d594cfa35d56... handshake new: [205] 0303d3202d6126fcc4e152c159d59bd87a86c572eb25326c4506d594cfa35d56... record old: [191] 010000bb0303d3202d6126fcc4e152c159d59bd87a86c572eb25326c4506d594... record new: [209] 010000cd0303d3202d6126fcc4e152c159d59bd87a86c572eb25326c4506d594... client: Filtered packet: [214] 16030100d1010000cd0303d3202d6126fcc4e152c159d59bd87a86c572eb2532... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 03023dc922152a28573c7e075291e362a812bf4c7faa1f78b33e6b3e2b810d3a... handshake new: [135] 03023dc922152a28573c7e075291e362a812bf4c7faa1f78b33e6b3e2b810d3a... record old: [121] 0100007503023dc922152a28573c7e075291e362a812bf4c7faa1f78b33e6b3e... record new: [139] 0100008703023dc922152a28573c7e075291e362a812bf4c7faa1f78b33e6b3e... client: Filtered packet: [144] 160301008b0100008703023dc922152a28573c7e075291e362a812bf4c7faa1f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 030109a00be9b6ebc41413735791af03265dc63b3848f15032217652a3110d00... handshake new: [135] 030109a00be9b6ebc41413735791af03265dc63b3848f15032217652a3110d00... record old: [121] 01000075030109a00be9b6ebc41413735791af03265dc63b3848f15032217652... record new: [139] 01000087030109a00be9b6ebc41413735791af03265dc63b3848f15032217652... client: Filtered packet: [144] 160301008b01000087030109a00be9b6ebc41413735791af03265dc63b3848f1... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [180] 030340bc54a913b0d202b7e8caad867a86467e15ca03c129503eb1e4d28d527a... handshake new: [186] 030340bc54a913b0d202b7e8caad867a86467e15ca03c129503eb1e4d28d527a... record old: [184] 010000b4030340bc54a913b0d202b7e8caad867a86467e15ca03c129503eb1e4... record new: [190] 010000ba030340bc54a913b0d202b7e8caad867a86467e15ca03c129503eb1e4... client: Filtered packet: [195] 16030100be010000ba030340bc54a913b0d202b7e8caad867a86467e15ca03c1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [187] 0303edae486fe81827a07358e61b625443ae110d211dab5fa3cbfda0a9eccfa5... handshake new: [193] 0303edae486fe81827a07358e61b625443ae110d211dab5fa3cbfda0a9eccfa5... record old: [191] 010000bb0303edae486fe81827a07358e61b625443ae110d211dab5fa3cbfda0... record new: [197] 010000c10303edae486fe81827a07358e61b625443ae110d211dab5fa3cbfda0... client: Filtered packet: [202] 16030100c5010000c10303edae486fe81827a07358e61b625443ae110d211dab... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [117] 0302c919c83e16723474caff4db2146ced371823429bdc34398ef1ad53261808... handshake new: [123] 0302c919c83e16723474caff4db2146ced371823429bdc34398ef1ad53261808... record old: [121] 010000750302c919c83e16723474caff4db2146ced371823429bdc34398ef1ad... record new: [127] 0100007b0302c919c83e16723474caff4db2146ced371823429bdc34398ef1ad... client: Filtered packet: [132] 160301007f0100007b0302c919c83e16723474caff4db2146ced371823429bdc... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [117] 0301cde595f744fbe1c530dd12de8379b98ecd456612e8d4d10272f6dad2fd9c... handshake new: [123] 0301cde595f744fbe1c530dd12de8379b98ecd456612e8d4d10272f6dad2fd9c... record old: [121] 010000750301cde595f744fbe1c530dd12de8379b98ecd456612e8d4d10272f6... record new: [127] 0100007b0301cde595f744fbe1c530dd12de8379b98ecd456612e8d4d10272f6... client: Filtered packet: [132] 160301007f0100007b0301cde595f744fbe1c530dd12de8379b98ecd456612e8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [180] 0303dd7bfdba2ac53a8e04caf620b1ec92a1a7c0faada35ef5fb47c90c36bb90... handshake new: [171] 0303dd7bfdba2ac53a8e04caf620b1ec92a1a7c0faada35ef5fb47c90c36bb90... record old: [184] 010000b40303dd7bfdba2ac53a8e04caf620b1ec92a1a7c0faada35ef5fb47c9... record new: [175] 010000ab0303dd7bfdba2ac53a8e04caf620b1ec92a1a7c0faada35ef5fb47c9... client: Filtered packet: [180] 16030100af010000ab0303dd7bfdba2ac53a8e04caf620b1ec92a1a7c0faada3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [187] 030317dd08e0b9616f714e600741d8b08675ceae95dfde61c6c3c51240278909... handshake new: [178] 030317dd08e0b9616f714e600741d8b08675ceae95dfde61c6c3c51240278909... record old: [191] 010000bb030317dd08e0b9616f714e600741d8b08675ceae95dfde61c6c3c512... record new: [182] 010000b2030317dd08e0b9616f714e600741d8b08675ceae95dfde61c6c3c512... client: Filtered packet: [187] 16030100b6010000b2030317dd08e0b9616f714e600741d8b08675ceae95dfde... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [117] 03025fefdbc60f4de033a64d33fa8cf23db9017527805e3ea5bc205c2debba24... handshake new: [108] 03025fefdbc60f4de033a64d33fa8cf23db9017527805e3ea5bc205c2debba24... record old: [121] 0100007503025fefdbc60f4de033a64d33fa8cf23db9017527805e3ea5bc205c... record new: [112] 0100006c03025fefdbc60f4de033a64d33fa8cf23db9017527805e3ea5bc205c... client: Filtered packet: [117] 16030100700100006c03025fefdbc60f4de033a64d33fa8cf23db9017527805e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [117] 03011de5f4958cef8b9ae75920cef0fc92372d720fd97b0dec38f1247a7b3714... handshake new: [108] 03011de5f4958cef8b9ae75920cef0fc92372d720fd97b0dec38f1247a7b3714... record old: [121] 0100007503011de5f4958cef8b9ae75920cef0fc92372d720fd97b0dec38f124... record new: [112] 0100006c03011de5f4958cef8b9ae75920cef0fc92372d720fd97b0dec38f124... client: Filtered packet: [117] 16030100700100006c03011de5f4958cef8b9ae75920cef0fc92372d720fd97b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [190] 0303328d63814d333c93e57e0389b138cf320125435862a37bc18ce67cd84531... handshake new: [184] 0303328d63814d333c93e57e0389b138cf320125435862a37bc18ce67cd84531... record old: [194] 010000be0303328d63814d333c93e57e0389b138cf320125435862a37bc18ce6... record new: [188] 010000b80303328d63814d333c93e57e0389b138cf320125435862a37bc18ce6... client: Filtered packet: [193] 16030100bc010000b80303328d63814d333c93e57e0389b138cf320125435862... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [197] 0303580364c7a23e2816028b0265100ab70a6e3795d56fc35ced38f68c2066e8... handshake new: [191] 0303580364c7a23e2816028b0265100ab70a6e3795d56fc35ced38f68c2066e8... record old: [201] 010000c50303580364c7a23e2816028b0265100ab70a6e3795d56fc35ced38f6... record new: [195] 010000bf0303580364c7a23e2816028b0265100ab70a6e3795d56fc35ced38f6... client: Filtered packet: [200] 16030100c3010000bf0303580364c7a23e2816028b0265100ab70a6e3795d56f... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [127] 0302562b4060fdc5947255c591652c2470bc6a8f3f11baa8ab3380d73c0d11a1... handshake new: [121] 0302562b4060fdc5947255c591652c2470bc6a8f3f11baa8ab3380d73c0d11a1... record old: [131] 0100007f0302562b4060fdc5947255c591652c2470bc6a8f3f11baa8ab3380d7... record new: [125] 010000790302562b4060fdc5947255c591652c2470bc6a8f3f11baa8ab3380d7... client: Filtered packet: [130] 160301007d010000790302562b4060fdc5947255c591652c2470bc6a8f3f11ba... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [127] 0301203bcc5121843b87de89e1381bd7885eead2c097959d31dd9681c3bf273b... handshake new: [121] 0301203bcc5121843b87de89e1381bd7885eead2c097959d31dd9681c3bf273b... record old: [131] 0100007f0301203bcc5121843b87de89e1381bd7885eead2c097959d31dd9681... record new: [125] 010000790301203bcc5121843b87de89e1381bd7885eead2c097959d31dd9681... client: Filtered packet: [130] 160301007d010000790301203bcc5121843b87de89e1381bd7885eead2c09795... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [190] 03038cdaa3b25fa3ff90c39c472a6654427bacada3004c0f6acca8ed05e42488... handshake new: [186] 03038cdaa3b25fa3ff90c39c472a6654427bacada3004c0f6acca8ed05e42488... record old: [194] 010000be03038cdaa3b25fa3ff90c39c472a6654427bacada3004c0f6acca8ed... record new: [190] 010000ba03038cdaa3b25fa3ff90c39c472a6654427bacada3004c0f6acca8ed... client: Filtered packet: [195] 16030100be010000ba03038cdaa3b25fa3ff90c39c472a6654427bacada3004c... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [197] 0303bd31e11c10eabf163d16a6575e43b614c57a5d68e9699a4328fa29d8a444... handshake new: [193] 0303bd31e11c10eabf163d16a6575e43b614c57a5d68e9699a4328fa29d8a444... record old: [201] 010000c50303bd31e11c10eabf163d16a6575e43b614c57a5d68e9699a4328fa... record new: [197] 010000c10303bd31e11c10eabf163d16a6575e43b614c57a5d68e9699a4328fa... client: Filtered packet: [202] 16030100c5010000c10303bd31e11c10eabf163d16a6575e43b614c57a5d68e9... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [127] 0302f1318d6d25fc06cf84a6937bf2e040ca6bab44f8f9bf7f9aa141fa5574a3... handshake new: [123] 0302f1318d6d25fc06cf84a6937bf2e040ca6bab44f8f9bf7f9aa141fa5574a3... record old: [131] 0100007f0302f1318d6d25fc06cf84a6937bf2e040ca6bab44f8f9bf7f9aa141... record new: [127] 0100007b0302f1318d6d25fc06cf84a6937bf2e040ca6bab44f8f9bf7f9aa141... client: Filtered packet: [132] 160301007f0100007b0302f1318d6d25fc06cf84a6937bf2e040ca6bab44f8f9... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [127] 0301c37a90e6fbe5336381274770a6dc788045562f82a57cc3b74940d901c3cc... handshake new: [123] 0301c37a90e6fbe5336381274770a6dc788045562f82a57cc3b74940d901c3cc... record old: [131] 0100007f0301c37a90e6fbe5336381274770a6dc788045562f82a57cc3b74940... record new: [127] 0100007b0301c37a90e6fbe5336381274770a6dc788045562f82a57cc3b74940... client: Filtered packet: [132] 160301007f0100007b0301c37a90e6fbe5336381274770a6dc788045562f82a5... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [190] 0303fe198ec30885c6123701974fc62cf34beaf362e2f39ca0848284a04b798f... handshake new: [185] 0303fe198ec30885c6123701974fc62cf34beaf362e2f39ca0848284a04b798f... record old: [194] 010000be0303fe198ec30885c6123701974fc62cf34beaf362e2f39ca0848284... record new: [189] 010000b90303fe198ec30885c6123701974fc62cf34beaf362e2f39ca0848284... client: Filtered packet: [194] 16030100bd010000b90303fe198ec30885c6123701974fc62cf34beaf362e2f3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [197] 03032fda8ca5ca035a7ec55c38bdb65fd898516e72b414516bfb9fdd71e751aa... handshake new: [192] 03032fda8ca5ca035a7ec55c38bdb65fd898516e72b414516bfb9fdd71e751aa... record old: [201] 010000c503032fda8ca5ca035a7ec55c38bdb65fd898516e72b414516bfb9fdd... record new: [196] 010000c003032fda8ca5ca035a7ec55c38bdb65fd898516e72b414516bfb9fdd... client: Filtered packet: [201] 16030100c4010000c003032fda8ca5ca035a7ec55c38bdb65fd898516e72b414... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [127] 03021595953a1a38bef4d035c509c73d2eaacd598aa09fd2701f01a1ac11e45f... handshake new: [122] 03021595953a1a38bef4d035c509c73d2eaacd598aa09fd2701f01a1ac11e45f... record old: [131] 0100007f03021595953a1a38bef4d035c509c73d2eaacd598aa09fd2701f01a1... record new: [126] 0100007a03021595953a1a38bef4d035c509c73d2eaacd598aa09fd2701f01a1... client: Filtered packet: [131] 160301007e0100007a03021595953a1a38bef4d035c509c73d2eaacd598aa09f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [127] 0301ab82477d70d4f31636805b7b045a0a46ae44ebecbb672c9cef5c659657d3... handshake new: [122] 0301ab82477d70d4f31636805b7b045a0a46ae44ebecbb672c9cef5c659657d3... record old: [131] 0100007f0301ab82477d70d4f31636805b7b045a0a46ae44ebecbb672c9cef5c... record new: [126] 0100007a0301ab82477d70d4f31636805b7b045a0a46ae44ebecbb672c9cef5c... client: Filtered packet: [131] 160301007e0100007a0301ab82477d70d4f31636805b7b045a0a46ae44ebecbb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [190] 03039fdb3c31a25b2130b0997d6a442e39f35bd555f5c06898df76cc4053851c... handshake new: [189] 03039fdb3c31a25b2130b0997d6a442e39f35bd555f5c06898df76cc4053851c... record old: [194] 010000be03039fdb3c31a25b2130b0997d6a442e39f35bd555f5c06898df76cc... record new: [193] 010000bd03039fdb3c31a25b2130b0997d6a442e39f35bd555f5c06898df76cc... client: Filtered packet: [198] 16030100c1010000bd03039fdb3c31a25b2130b0997d6a442e39f35bd555f5c0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [197] 030310efa6a32d6a2cf70b75a64a0e8c545fd2d949b6cdbf0e9a51f20b8e1058... handshake new: [196] 030310efa6a32d6a2cf70b75a64a0e8c545fd2d949b6cdbf0e9a51f20b8e1058... record old: [201] 010000c5030310efa6a32d6a2cf70b75a64a0e8c545fd2d949b6cdbf0e9a51f2... record new: [200] 010000c4030310efa6a32d6a2cf70b75a64a0e8c545fd2d949b6cdbf0e9a51f2... client: Filtered packet: [205] 16030100c8010000c4030310efa6a32d6a2cf70b75a64a0e8c545fd2d949b6cd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [127] 030251d62b765a96bd09455a534692ce186da7e828c6c8ee4839fb318a0fe066... handshake new: [126] 030251d62b765a96bd09455a534692ce186da7e828c6c8ee4839fb318a0fe066... record old: [131] 0100007f030251d62b765a96bd09455a534692ce186da7e828c6c8ee4839fb31... record new: [130] 0100007e030251d62b765a96bd09455a534692ce186da7e828c6c8ee4839fb31... client: Filtered packet: [135] 16030100820100007e030251d62b765a96bd09455a534692ce186da7e828c6c8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [127] 0301d34905ff0aeb71cce597a7088106e636332e37f083fe2c85e9e6250213fd... handshake new: [126] 0301d34905ff0aeb71cce597a7088106e636332e37f083fe2c85e9e6250213fd... record old: [131] 0100007f0301d34905ff0aeb71cce597a7088106e636332e37f083fe2c85e9e6... record new: [130] 0100007e0301d34905ff0aeb71cce597a7088106e636332e37f083fe2c85e9e6... client: Filtered packet: [135] 16030100820100007e0301d34905ff0aeb71cce597a7088106e636332e37f083... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [190] 03032f7e9995a3ba5efc5ea2245b1fecd5111aa863e179588704e13ceeb8ebd9... handshake new: [189] 03032f7e9995a3ba5efc5ea2245b1fecd5111aa863e179588704e13ceeb8ebd9... record old: [194] 010000be03032f7e9995a3ba5efc5ea2245b1fecd5111aa863e179588704e13c... record new: [193] 010000bd03032f7e9995a3ba5efc5ea2245b1fecd5111aa863e179588704e13c... client: Filtered packet: [198] 16030100c1010000bd03032f7e9995a3ba5efc5ea2245b1fecd5111aa863e179... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [197] 03038d235c37dab536e5d9f0bb75442e55271bcb51eb3b1054dd7900f19394c6... handshake new: [196] 03038d235c37dab536e5d9f0bb75442e55271bcb51eb3b1054dd7900f19394c6... record old: [201] 010000c503038d235c37dab536e5d9f0bb75442e55271bcb51eb3b1054dd7900... record new: [200] 010000c403038d235c37dab536e5d9f0bb75442e55271bcb51eb3b1054dd7900... client: Filtered packet: [205] 16030100c8010000c403038d235c37dab536e5d9f0bb75442e55271bcb51eb3b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [127] 03020cca5ae592b59add883e2c64a6be2cc89a3ef8df306cbb316789c80b871b... handshake new: [126] 03020cca5ae592b59add883e2c64a6be2cc89a3ef8df306cbb316789c80b871b... record old: [131] 0100007f03020cca5ae592b59add883e2c64a6be2cc89a3ef8df306cbb316789... record new: [130] 0100007e03020cca5ae592b59add883e2c64a6be2cc89a3ef8df306cbb316789... client: Filtered packet: [135] 16030100820100007e03020cca5ae592b59add883e2c64a6be2cc89a3ef8df30... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [127] 03011df98ddb1dc555214b0f737745bac40add0a1851e04e3fcf4599f784198e... handshake new: [126] 03011df98ddb1dc555214b0f737745bac40add0a1851e04e3fcf4599f784198e... record old: [131] 0100007f03011df98ddb1dc555214b0f737745bac40add0a1851e04e3fcf4599... record new: [130] 0100007e03011df98ddb1dc555214b0f737745bac40add0a1851e04e3fcf4599... client: Filtered packet: [135] 16030100820100007e03011df98ddb1dc555214b0f737745bac40add0a1851e0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [190] 0303ff1af8507d2e1a659e316fdbd82f7a7d30759ce25b8b30ddc41604c5d52a... handshake new: [189] 0303ff1af8507d2e1a659e316fdbd82f7a7d30759ce25b8b30ddc41604c5d52a... record old: [194] 010000be0303ff1af8507d2e1a659e316fdbd82f7a7d30759ce25b8b30ddc416... record new: [193] 010000bd0303ff1af8507d2e1a659e316fdbd82f7a7d30759ce25b8b30ddc416... client: Filtered packet: [198] 16030100c1010000bd0303ff1af8507d2e1a659e316fdbd82f7a7d30759ce25b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [197] 0303fc3c7d3a4ee68cdae06d5388055bff7cfecbdb97346653d6ec2c7bf5e42e... handshake new: [196] 0303fc3c7d3a4ee68cdae06d5388055bff7cfecbdb97346653d6ec2c7bf5e42e... record old: [201] 010000c50303fc3c7d3a4ee68cdae06d5388055bff7cfecbdb97346653d6ec2c... record new: [200] 010000c40303fc3c7d3a4ee68cdae06d5388055bff7cfecbdb97346653d6ec2c... client: Filtered packet: [205] 16030100c8010000c40303fc3c7d3a4ee68cdae06d5388055bff7cfecbdb9734... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [127] 03023a10d6cc395b208650d3a9d8df4b25a7411ba2767d4f3e51cc1ab82b4947... handshake new: [126] 03023a10d6cc395b208650d3a9d8df4b25a7411ba2767d4f3e51cc1ab82b4947... record old: [131] 0100007f03023a10d6cc395b208650d3a9d8df4b25a7411ba2767d4f3e51cc1a... record new: [130] 0100007e03023a10d6cc395b208650d3a9d8df4b25a7411ba2767d4f3e51cc1a... client: Filtered packet: [135] 16030100820100007e03023a10d6cc395b208650d3a9d8df4b25a7411ba2767d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [127] 03013afea3dfd786173b431b3bf525c7e053b043b78d6716819f5ac50f5c6bef... handshake new: [126] 03013afea3dfd786173b431b3bf525c7e053b043b78d6716819f5ac50f5c6bef... record old: [131] 0100007f03013afea3dfd786173b431b3bf525c7e053b043b78d6716819f5ac5... record new: [130] 0100007e03013afea3dfd786173b431b3bf525c7e053b043b78d6716819f5ac5... client: Filtered packet: [135] 16030100820100007e03013afea3dfd786173b431b3bf525c7e053b043b78d67... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [180] 03030396da1b5ce3a015b33b168a06e3c60ba12e3c8656753c24f0427d23cb88... handshake new: [156] 03030396da1b5ce3a015b33b168a06e3c60ba12e3c8656753c24f0427d23cb88... record old: [184] 010000b403030396da1b5ce3a015b33b168a06e3c60ba12e3c8656753c24f042... record new: [160] 0100009c03030396da1b5ce3a015b33b168a06e3c60ba12e3c8656753c24f042... client: Filtered packet: [165] 16030100a00100009c03030396da1b5ce3a015b33b168a06e3c60ba12e3c8656... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [187] 0303927112b683a822c1a45e5089aa79b2d15cdd82723934cce9a70ea0f36a76... handshake new: [173] 0303927112b683a822c1a45e5089aa79b2d15cdd82723934cce9a70ea0f36a76... record old: [191] 010000bb0303927112b683a822c1a45e5089aa79b2d15cdd82723934cce9a70e... record new: [177] 010000ad0303927112b683a822c1a45e5089aa79b2d15cdd82723934cce9a70e... client: Filtered packet: [182] 16030100b1010000ad0303927112b683a822c1a45e5089aa79b2d15cdd827239... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/1 (7 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 03025e43f4dba3e46c3c6d905e8ec53206c7d011a4eb29c44374079c69283572... handshake new: [103] 03025e43f4dba3e46c3c6d905e8ec53206c7d011a4eb29c44374079c69283572... record old: [121] 0100007503025e43f4dba3e46c3c6d905e8ec53206c7d011a4eb29c44374079c... record new: [107] 0100006703025e43f4dba3e46c3c6d905e8ec53206c7d011a4eb29c44374079c... client: Filtered packet: [112] 160301006b0100006703025e43f4dba3e46c3c6d905e8ec53206c7d011a4eb29... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/2 (6 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 03017ff17d004bcb7f08c5de0c2cd3401b9a121d769df16bb1564ebccde5c4b4... handshake new: [103] 03017ff17d004bcb7f08c5de0c2cd3401b9a121d769df16bb1564ebccde5c4b4... record old: [121] 0100007503017ff17d004bcb7f08c5de0c2cd3401b9a121d769df16bb1564ebc... record new: [107] 0100006703017ff17d004bcb7f08c5de0c2cd3401b9a121d769df16bb1564ebc... client: Filtered packet: [112] 160301006b0100006703017ff17d004bcb7f08c5de0c2cd3401b9a121d769df1... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/3 (7 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [3] 000100 handshake old: [180] 03039640553ee799eeafab9f2358e72e99a527764f168f6e3be774aea6c26e29... handshake new: [163] 03039640553ee799eeafab9f2358e72e99a527764f168f6e3be774aea6c26e29... record old: [184] 010000b403039640553ee799eeafab9f2358e72e99a527764f168f6e3be774ae... record new: [167] 010000a303039640553ee799eeafab9f2358e72e99a527764f168f6e3be774ae... client: Filtered packet: [172] 16030100a7010000a303039640553ee799eeafab9f2358e72e99a527764f168f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [187] 0303e4a46cc9fa92693beae27df539f28c31dc3a6f8b6b8ced847ce39751dd1c... handshake new: [180] 0303e4a46cc9fa92693beae27df539f28c31dc3a6f8b6b8ced847ce39751dd1c... record old: [191] 010000bb0303e4a46cc9fa92693beae27df539f28c31dc3a6f8b6b8ced847ce3... record new: [184] 010000b40303e4a46cc9fa92693beae27df539f28c31dc3a6f8b6b8ced847ce3... client: Filtered packet: [189] 16030100b8010000b40303e4a46cc9fa92693beae27df539f28c31dc3a6f8b6b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [117] 0302b99aa5f5bc597d988ef16ae9e7b69ee0c2753504d6e2ff1daf5a8e958b74... handshake new: [110] 0302b99aa5f5bc597d988ef16ae9e7b69ee0c2753504d6e2ff1daf5a8e958b74... record old: [121] 010000750302b99aa5f5bc597d988ef16ae9e7b69ee0c2753504d6e2ff1daf5a... record new: [114] 0100006e0302b99aa5f5bc597d988ef16ae9e7b69ee0c2753504d6e2ff1daf5a... client: Filtered packet: [119] 16030100720100006e0302b99aa5f5bc597d988ef16ae9e7b69ee0c2753504d6... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [117] 0301c5adacc183af501d1b9c0791e83533d307096188bfda2d41b8a1447c47d9... handshake new: [110] 0301c5adacc183af501d1b9c0791e83533d307096188bfda2d41b8a1447c47d9... record old: [121] 010000750301c5adacc183af501d1b9c0791e83533d307096188bfda2d41b8a1... record new: [114] 0100006e0301c5adacc183af501d1b9c0791e83533d307096188bfda2d41b8a1... client: Filtered packet: [119] 16030100720100006e0301c5adacc183af501d1b9c0791e83533d307096188bf... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/3 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [4] 09990000 handshake old: [180] 0303d416a6fe8978339321225ccb48c7453d9e874668228713822ba2e179ccf1... handshake new: [164] 0303d416a6fe8978339321225ccb48c7453d9e874668228713822ba2e179ccf1... record old: [184] 010000b40303d416a6fe8978339321225ccb48c7453d9e874668228713822ba2... record new: [168] 010000a40303d416a6fe8978339321225ccb48c7453d9e874668228713822ba2... client: Filtered packet: [173] 16030100a8010000a40303d416a6fe8978339321225ccb48c7453d9e87466822... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [187] 0303764b1bf0bf6d4c455dfdf062f2ecb16c38c20d4cfc4833e4d6d49e672d91... handshake new: [181] 0303764b1bf0bf6d4c455dfdf062f2ecb16c38c20d4cfc4833e4d6d49e672d91... record old: [191] 010000bb0303764b1bf0bf6d4c455dfdf062f2ecb16c38c20d4cfc4833e4d6d4... record new: [185] 010000b50303764b1bf0bf6d4c455dfdf062f2ecb16c38c20d4cfc4833e4d6d4... client: Filtered packet: [190] 16030100b9010000b50303764b1bf0bf6d4c455dfdf062f2ecb16c38c20d4cfc... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [117] 0302adc5352afae0fc7a7f5b2a8b1cf9c1a6844c54b67c1f2a09662537f3746c... handshake new: [111] 0302adc5352afae0fc7a7f5b2a8b1cf9c1a6844c54b67c1f2a09662537f3746c... record old: [121] 010000750302adc5352afae0fc7a7f5b2a8b1cf9c1a6844c54b67c1f2a096625... record new: [115] 0100006f0302adc5352afae0fc7a7f5b2a8b1cf9c1a6844c54b67c1f2a096625... client: Filtered packet: [120] 16030100730100006f0302adc5352afae0fc7a7f5b2a8b1cf9c1a6844c54b67c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [117] 03018c5c3030a09f3c4b77d71a9e46a3cf19296c94817e5f39650f92ea2d901e... handshake new: [111] 03018c5c3030a09f3c4b77d71a9e46a3cf19296c94817e5f39650f92ea2d901e... record old: [121] 0100007503018c5c3030a09f3c4b77d71a9e46a3cf19296c94817e5f39650f92... record new: [115] 0100006f03018c5c3030a09f3c4b77d71a9e46a3cf19296c94817e5f39650f92... client: Filtered packet: [120] 16030100730100006f03018c5c3030a09f3c4b77d71a9e46a3cf19296c94817e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [5] 0002000000 handshake old: [180] 03037b1b87d583e5deeb74112cd29c4728d5b082f1b676ec2f3c1b2319b0836b... handshake new: [165] 03037b1b87d583e5deeb74112cd29c4728d5b082f1b676ec2f3c1b2319b0836b... record old: [184] 010000b403037b1b87d583e5deeb74112cd29c4728d5b082f1b676ec2f3c1b23... record new: [169] 010000a503037b1b87d583e5deeb74112cd29c4728d5b082f1b676ec2f3c1b23... client: Filtered packet: [174] 16030100a9010000a503037b1b87d583e5deeb74112cd29c4728d5b082f1b676... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [187] 0303507712ba11bc470b11ef80a3182c6c9c00998535e2526309448ce16ac39f... handshake new: [182] 0303507712ba11bc470b11ef80a3182c6c9c00998535e2526309448ce16ac39f... record old: [191] 010000bb0303507712ba11bc470b11ef80a3182c6c9c00998535e2526309448c... record new: [186] 010000b60303507712ba11bc470b11ef80a3182c6c9c00998535e2526309448c... client: Filtered packet: [191] 16030100ba010000b60303507712ba11bc470b11ef80a3182c6c9c00998535e2... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [117] 0302f2ec563148ea994bf411db416a779a6fdcf70d81d768b8f22e724141b2e9... handshake new: [112] 0302f2ec563148ea994bf411db416a779a6fdcf70d81d768b8f22e724141b2e9... record old: [121] 010000750302f2ec563148ea994bf411db416a779a6fdcf70d81d768b8f22e72... record new: [116] 010000700302f2ec563148ea994bf411db416a779a6fdcf70d81d768b8f22e72... client: Filtered packet: [121] 1603010074010000700302f2ec563148ea994bf411db416a779a6fdcf70d81d7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [117] 0301c06969bc442b03eeddde5732647227cfaa70c8f90edb4da647740ed09766... handshake new: [112] 0301c06969bc442b03eeddde5732647227cfaa70c8f90edb4da647740ed09766... record old: [121] 010000750301c06969bc442b03eeddde5732647227cfaa70c8f90edb4da64774... record new: [116] 010000700301c06969bc442b03eeddde5732647227cfaa70c8f90edb4da64774... client: Filtered packet: [121] 1603010074010000700301c06969bc442b03eeddde5732647227cfaa70c8f90e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 (2 ms) [----------] 68 tests from ExtensionStream/TlsExtensionTestGeneric (179 ms total) [----------] 51 tests from ExtensionDatagram/TlsExtensionTestGeneric [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [181] fefd93e6fcce083225bd3da22070e9abb9dc95d11fef1aafdd0dd2345a74ef0a... handshake new: [181] fefd93e6fcce083225bd3da22070e9abb9dc95d11fef1aafdd0dd2345a74ef0a... record old: [193] 010000b500000000000000b5fefd93e6fcce083225bd3da22070e9abb9dc95d1... record new: [193] 010000b500000000000000b5fefd93e6fcce083225bd3da22070e9abb9dc95d1... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefd93e6fcce08... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [184] fefdb699bd1989ded642fc4024c2287b84ccd10984b836735532f8b459428b83... handshake new: [184] fefdb699bd1989ded642fc4024c2287b84ccd10984b836735532f8b459428b83... record old: [196] 010000b800000000000000b8fefdb699bd1989ded642fc4024c2287b84ccd109... record new: [196] 010000b800000000000000b8fefdb699bd1989ded642fc4024c2287b84ccd109... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefdb699bd1989... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [114] feff36dd0bef5de7e7a001e811909d920cce1a13d58141f8a960b19d7deef79a... handshake new: [114] feff36dd0bef5de7e7a001e811909d920cce1a13d58141f8a960b19d7deef79a... record old: [126] 010000720000000000000072feff36dd0bef5de7e7a001e811909d920cce1a13... record new: [126] 010000720000000000000072feff36dd0bef5de7e7a001e811909d920cce1a13... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff36dd0bef5d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [181] fefdbf0b99e9a4ad02684a72c2a9023728d52735bbb39b6bb57e66ad4beefca7... handshake new: [181] fefdbf0b99e9a4ad02684a72c2a9023728d52735bbb39b6bb57e66ad4beefca7... record old: [193] 010000b500000000000000b5fefdbf0b99e9a4ad02684a72c2a9023728d52735... record new: [193] 010000b500000000000000b5fefdbf0b99e9a4ad02684a72c2a9023728d52735... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefdbf0b99e9a4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [184] fefd1dd1f68366e4cf952b2da76f685913ccd29b612785e81eade9cefebc6e98... handshake new: [184] fefd1dd1f68366e4cf952b2da76f685913ccd29b612785e81eade9cefebc6e98... record old: [196] 010000b800000000000000b8fefd1dd1f68366e4cf952b2da76f685913ccd29b... record new: [196] 010000b800000000000000b8fefd1dd1f68366e4cf952b2da76f685913ccd29b... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd1dd1f68366... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [114] feff430be98f9d30b293b926a9c75b31250dc1944d5184f3ef004fc9ddde6395... handshake new: [114] feff430be98f9d30b293b926a9c75b31250dc1944d5184f3ef004fc9ddde6395... record old: [126] 010000720000000000000072feff430be98f9d30b293b926a9c75b31250dc194... record new: [126] 010000720000000000000072feff430be98f9d30b293b926a9c75b31250dc194... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff430be98f9d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [181] fefda7b27f76ae813f86dcea6ad46b67a5616337dba2c0349ba44e7a5a242dbc... handshake new: [177] fefda7b27f76ae813f86dcea6ad46b67a5616337dba2c0349ba44e7a5a242dbc... record old: [193] 010000b500000000000000b5fefda7b27f76ae813f86dcea6ad46b67a5616337... record new: [189] 010000b100000000000000b1fefda7b27f76ae813f86dcea6ad46b67a5616337... client: Filtered packet: [202] 16feff000000000000000000bd010000b100000000000000b1fefda7b27f76ae... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [184] fefd1743fb3937aa7f58d54109cd692b0fdf8fa6665f0bd367812b044d251e6d... handshake new: [180] fefd1743fb3937aa7f58d54109cd692b0fdf8fa6665f0bd367812b044d251e6d... record old: [196] 010000b800000000000000b8fefd1743fb3937aa7f58d54109cd692b0fdf8fa6... record new: [192] 010000b400000000000000b4fefd1743fb3937aa7f58d54109cd692b0fdf8fa6... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefd1743fb3937... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [114] feff8be9cf467c6df0a59d3c9144aca9d47e7a24e0f2ed6a338f5111ff30dad6... handshake new: [110] feff8be9cf467c6df0a59d3c9144aca9d47e7a24e0f2ed6a338f5111ff30dad6... record old: [126] 010000720000000000000072feff8be9cf467c6df0a59d3c9144aca9d47e7a24... record new: [122] 0100006e000000000000006efeff8be9cf467c6df0a59d3c9144aca9d47e7a24... client: Filtered packet: [135] 16feff0000000000000000007a0100006e000000000000006efeff8be9cf467c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [181] fefd174039597bb08b4d9d33380522820e63dc03bd3119b4ca20c35f07b23529... handshake new: [199] fefd174039597bb08b4d9d33380522820e63dc03bd3119b4ca20c35f07b23529... record old: [193] 010000b500000000000000b5fefd174039597bb08b4d9d33380522820e63dc03... record new: [211] 010000c700000000000000c7fefd174039597bb08b4d9d33380522820e63dc03... client: Filtered packet: [224] 16feff000000000000000000d3010000c700000000000000c7fefd174039597b... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefdf4e438e386aa35245ed7674d96e17abb2fc767a82ad0a25caa5203b2a164... handshake new: [202] fefdf4e438e386aa35245ed7674d96e17abb2fc767a82ad0a25caa5203b2a164... record old: [196] 010000b800000000000000b8fefdf4e438e386aa35245ed7674d96e17abb2fc7... record new: [214] 010000ca00000000000000cafefdf4e438e386aa35245ed7674d96e17abb2fc7... client: Filtered packet: [227] 16feff000000000000000000d6010000ca00000000000000cafefdf4e438e386... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [114] feff1f992c8aec5554689070cf5ce5de7d8dc16dcf8ac1cd9cec47baf3b3ab85... handshake new: [132] feff1f992c8aec5554689070cf5ce5de7d8dc16dcf8ac1cd9cec47baf3b3ab85... record old: [126] 010000720000000000000072feff1f992c8aec5554689070cf5ce5de7d8dc16d... record new: [144] 010000840000000000000084feff1f992c8aec5554689070cf5ce5de7d8dc16d... client: Filtered packet: [157] 16feff00000000000000000090010000840000000000000084feff1f992c8aec... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [181] fefd2d7b838064eb3135f834471322418186083b1c7fac6514df85d9719fcb3e... handshake new: [187] fefd2d7b838064eb3135f834471322418186083b1c7fac6514df85d9719fcb3e... record old: [193] 010000b500000000000000b5fefd2d7b838064eb3135f834471322418186083b... record new: [199] 010000bb00000000000000bbfefd2d7b838064eb3135f834471322418186083b... client: Filtered packet: [212] 16feff000000000000000000c7010000bb00000000000000bbfefd2d7b838064... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [184] fefd8b65bd1bd9a7c875b99c6d5035102b4316ca230d171a28e4338113c80424... handshake new: [190] fefd8b65bd1bd9a7c875b99c6d5035102b4316ca230d171a28e4338113c80424... record old: [196] 010000b800000000000000b8fefd8b65bd1bd9a7c875b99c6d5035102b4316ca... record new: [202] 010000be00000000000000befefd8b65bd1bd9a7c875b99c6d5035102b4316ca... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefd8b65bd1bd9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [114] feff58c0ddb7b37d3a2385f2f2174a1b044d5b0510df6ad5bc0d4201332ba82f... handshake new: [120] feff58c0ddb7b37d3a2385f2f2174a1b044d5b0510df6ad5bc0d4201332ba82f... record old: [126] 010000720000000000000072feff58c0ddb7b37d3a2385f2f2174a1b044d5b05... record new: [132] 010000780000000000000078feff58c0ddb7b37d3a2385f2f2174a1b044d5b05... client: Filtered packet: [145] 16feff00000000000000000084010000780000000000000078feff58c0ddb7b3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [181] fefdca89ea4eafab8412f5ccb3c1c4c63b6f089d07cdf1834563fd2f3c351f66... handshake new: [172] fefdca89ea4eafab8412f5ccb3c1c4c63b6f089d07cdf1834563fd2f3c351f66... record old: [193] 010000b500000000000000b5fefdca89ea4eafab8412f5ccb3c1c4c63b6f089d... record new: [184] 010000ac00000000000000acfefdca89ea4eafab8412f5ccb3c1c4c63b6f089d... client: Filtered packet: [197] 16feff000000000000000000b8010000ac00000000000000acfefdca89ea4eaf... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [184] fefdfb7a0eb7a089966e9df861e0afa26ea67c2cbfe37189de4a56b118fa2ae0... handshake new: [175] fefdfb7a0eb7a089966e9df861e0afa26ea67c2cbfe37189de4a56b118fa2ae0... record old: [196] 010000b800000000000000b8fefdfb7a0eb7a089966e9df861e0afa26ea67c2c... record new: [187] 010000af00000000000000affefdfb7a0eb7a089966e9df861e0afa26ea67c2c... client: Filtered packet: [200] 16feff000000000000000000bb010000af00000000000000affefdfb7a0eb7a0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [114] feffa35dfb8a6741aaa6ff00ca718b8af683ddf8103369e46ea4f328965c2adf... handshake new: [105] feffa35dfb8a6741aaa6ff00ca718b8af683ddf8103369e46ea4f328965c2adf... record old: [126] 010000720000000000000072feffa35dfb8a6741aaa6ff00ca718b8af683ddf8... record new: [117] 010000690000000000000069feffa35dfb8a6741aaa6ff00ca718b8af683ddf8... client: Filtered packet: [130] 16feff00000000000000000075010000690000000000000069feffa35dfb8a67... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [191] fefd038bde6c293cd6ca2edd99411a77156734678295b5b7c241990099a7f2c1... handshake new: [185] fefd038bde6c293cd6ca2edd99411a77156734678295b5b7c241990099a7f2c1... record old: [203] 010000bf00000000000000bffefd038bde6c293cd6ca2edd99411a7715673467... record new: [197] 010000b900000000000000b9fefd038bde6c293cd6ca2edd99411a7715673467... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefd038bde6c29... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [194] fefda646e740c3c1ed4739718c27b703f1524e745641b172f084fc29bab99b13... handshake new: [188] fefda646e740c3c1ed4739718c27b703f1524e745641b172f084fc29bab99b13... record old: [206] 010000c200000000000000c2fefda646e740c3c1ed4739718c27b703f1524e74... record new: [200] 010000bc00000000000000bcfefda646e740c3c1ed4739718c27b703f1524e74... client: Filtered packet: [213] 16feff000000000000000000c8010000bc00000000000000bcfefda646e740c3... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [124] feff17399f636399c75884782b48b5bc727642b86b44f83e36721df2ad7e7785... handshake new: [118] feff17399f636399c75884782b48b5bc727642b86b44f83e36721df2ad7e7785... record old: [136] 0100007c000000000000007cfeff17399f636399c75884782b48b5bc727642b8... record new: [130] 010000760000000000000076feff17399f636399c75884782b48b5bc727642b8... client: Filtered packet: [143] 16feff00000000000000000082010000760000000000000076feff17399f6363... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [191] fefd48fb535bf961e5d2161ba4cb319ae28d5838b5fd154f89a0adbc11b5d30b... handshake new: [187] fefd48fb535bf961e5d2161ba4cb319ae28d5838b5fd154f89a0adbc11b5d30b... record old: [203] 010000bf00000000000000bffefd48fb535bf961e5d2161ba4cb319ae28d5838... record new: [199] 010000bb00000000000000bbfefd48fb535bf961e5d2161ba4cb319ae28d5838... client: Filtered packet: [212] 16feff000000000000000000c7010000bb00000000000000bbfefd48fb535bf9... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [194] fefdd8ec245c5b9bf88c64206f7569d7600fedbe41b0ef81139f6f41000c7c55... handshake new: [190] fefdd8ec245c5b9bf88c64206f7569d7600fedbe41b0ef81139f6f41000c7c55... record old: [206] 010000c200000000000000c2fefdd8ec245c5b9bf88c64206f7569d7600fedbe... record new: [202] 010000be00000000000000befefdd8ec245c5b9bf88c64206f7569d7600fedbe... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefdd8ec245c5b... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [124] feff3c5d039d9431bb58f3ce6788504c4c57b71dc013878fa09734cbbfb5dfc6... handshake new: [120] feff3c5d039d9431bb58f3ce6788504c4c57b71dc013878fa09734cbbfb5dfc6... record old: [136] 0100007c000000000000007cfeff3c5d039d9431bb58f3ce6788504c4c57b71d... record new: [132] 010000780000000000000078feff3c5d039d9431bb58f3ce6788504c4c57b71d... client: Filtered packet: [145] 16feff00000000000000000084010000780000000000000078feff3c5d039d94... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [191] fefd01665dca9dd86549291b41522fd97fe3e480c058806f4532705f4e013239... handshake new: [186] fefd01665dca9dd86549291b41522fd97fe3e480c058806f4532705f4e013239... record old: [203] 010000bf00000000000000bffefd01665dca9dd86549291b41522fd97fe3e480... record new: [198] 010000ba00000000000000bafefd01665dca9dd86549291b41522fd97fe3e480... client: Filtered packet: [211] 16feff000000000000000000c6010000ba00000000000000bafefd01665dca9d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [194] fefd597bffa980b6a9b0ccc16ce653d2f9a4d7324d99afa856e3cec6fee441ca... handshake new: [189] fefd597bffa980b6a9b0ccc16ce653d2f9a4d7324d99afa856e3cec6fee441ca... record old: [206] 010000c200000000000000c2fefd597bffa980b6a9b0ccc16ce653d2f9a4d732... record new: [201] 010000bd00000000000000bdfefd597bffa980b6a9b0ccc16ce653d2f9a4d732... client: Filtered packet: [214] 16feff000000000000000000c9010000bd00000000000000bdfefd597bffa980... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [124] feff3ba4138a3c11055830959a8bf4bb63fd6a6f4931204da516cc3c2586ecf2... handshake new: [119] feff3ba4138a3c11055830959a8bf4bb63fd6a6f4931204da516cc3c2586ecf2... record old: [136] 0100007c000000000000007cfeff3ba4138a3c11055830959a8bf4bb63fd6a6f... record new: [131] 010000770000000000000077feff3ba4138a3c11055830959a8bf4bb63fd6a6f... client: Filtered packet: [144] 16feff00000000000000000083010000770000000000000077feff3ba4138a3c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [191] fefdfd0b102d068e9dec2704970368cfe4d27f61f66f0174982dcf585a29b15e... handshake new: [190] fefdfd0b102d068e9dec2704970368cfe4d27f61f66f0174982dcf585a29b15e... record old: [203] 010000bf00000000000000bffefdfd0b102d068e9dec2704970368cfe4d27f61... record new: [202] 010000be00000000000000befefdfd0b102d068e9dec2704970368cfe4d27f61... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefdfd0b102d06... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [194] fefd966bd19acb308261e7797761b7b177341df7f3f49167954faf881ead0474... handshake new: [193] fefd966bd19acb308261e7797761b7b177341df7f3f49167954faf881ead0474... record old: [206] 010000c200000000000000c2fefd966bd19acb308261e7797761b7b177341df7... record new: [205] 010000c100000000000000c1fefd966bd19acb308261e7797761b7b177341df7... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefd966bd19acb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [124] feff03d2b7d4758654594950c853fadd02f9232df13a9ab064d2d62207bedc9b... handshake new: [123] feff03d2b7d4758654594950c853fadd02f9232df13a9ab064d2d62207bedc9b... record old: [136] 0100007c000000000000007cfeff03d2b7d4758654594950c853fadd02f9232d... record new: [135] 0100007b000000000000007bfeff03d2b7d4758654594950c853fadd02f9232d... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeff03d2b7d475... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [191] fefdb59076c56577c46dc90648f315b44c594cbe6cb8aca144b18a05c26800e5... handshake new: [190] fefdb59076c56577c46dc90648f315b44c594cbe6cb8aca144b18a05c26800e5... record old: [203] 010000bf00000000000000bffefdb59076c56577c46dc90648f315b44c594cbe... record new: [202] 010000be00000000000000befefdb59076c56577c46dc90648f315b44c594cbe... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefdb59076c565... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [194] fefd498ad0506afc27902547ce2cfbe8872f229868fdcc9159a0641cec4b4410... handshake new: [193] fefd498ad0506afc27902547ce2cfbe8872f229868fdcc9159a0641cec4b4410... record old: [206] 010000c200000000000000c2fefd498ad0506afc27902547ce2cfbe8872f2298... record new: [205] 010000c100000000000000c1fefd498ad0506afc27902547ce2cfbe8872f2298... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefd498ad0506a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [124] feff26052ac6e949760be78f78c4761e099abf62b8e036dfa5581168b4a79aab... handshake new: [123] feff26052ac6e949760be78f78c4761e099abf62b8e036dfa5581168b4a79aab... record old: [136] 0100007c000000000000007cfeff26052ac6e949760be78f78c4761e099abf62... record new: [135] 0100007b000000000000007bfeff26052ac6e949760be78f78c4761e099abf62... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeff26052ac6e9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [191] fefdb3e957e5fc4c1f6b2eac67c78ac0924ebe4c0effb7389a90f3035af26b4a... handshake new: [190] fefdb3e957e5fc4c1f6b2eac67c78ac0924ebe4c0effb7389a90f3035af26b4a... record old: [203] 010000bf00000000000000bffefdb3e957e5fc4c1f6b2eac67c78ac0924ebe4c... record new: [202] 010000be00000000000000befefdb3e957e5fc4c1f6b2eac67c78ac0924ebe4c... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefdb3e957e5fc... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [194] fefd1edc466c69b8ad2ce485afe5d7f356cbae9210c7ed40fc31a78f506e158e... handshake new: [193] fefd1edc466c69b8ad2ce485afe5d7f356cbae9210c7ed40fc31a78f506e158e... record old: [206] 010000c200000000000000c2fefd1edc466c69b8ad2ce485afe5d7f356cbae92... record new: [205] 010000c100000000000000c1fefd1edc466c69b8ad2ce485afe5d7f356cbae92... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefd1edc466c69... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [124] feff791865845989200a98129b4974860ffa45fe9d95a85378efe14f47074c11... handshake new: [123] feff791865845989200a98129b4974860ffa45fe9d95a85378efe14f47074c11... record old: [136] 0100007c000000000000007cfeff791865845989200a98129b4974860ffa45fe... record new: [135] 0100007b000000000000007bfeff791865845989200a98129b4974860ffa45fe... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeff7918658459... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [20] 0012001d00170018001901000101010201030104 handshake old: [181] fefdfefcfc33884c269ba25c87ec08f2ea177292728a04dc950a7c24d5d09bf9... handshake new: [157] fefdfefcfc33884c269ba25c87ec08f2ea177292728a04dc950a7c24d5d09bf9... record old: [193] 010000b500000000000000b5fefdfefcfc33884c269ba25c87ec08f2ea177292... record new: [169] 0100009d000000000000009dfefdfefcfc33884c269ba25c87ec08f2ea177292... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefdfefcfc3388... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [184] fefd81c3d8793016e0e6e95527d3a670fe8161708559b824ca6c9b806a69e24c... handshake new: [170] fefd81c3d8793016e0e6e95527d3a670fe8161708559b824ca6c9b806a69e24c... record old: [196] 010000b800000000000000b8fefd81c3d8793016e0e6e95527d3a670fe816170... record new: [182] 010000aa00000000000000aafefd81c3d8793016e0e6e95527d3a670fe816170... client: Filtered packet: [195] 16feff000000000000000000b6010000aa00000000000000aafefd81c3d87930... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/1 (6 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [114] fefff05c10df05e7f46f4b95d0ff4f73b7ff5c0c3ef97c8e209fea2403b1d898... handshake new: [100] fefff05c10df05e7f46f4b95d0ff4f73b7ff5c0c3ef97c8e209fea2403b1d898... record old: [126] 010000720000000000000072fefff05c10df05e7f46f4b95d0ff4f73b7ff5c0c... record new: [112] 010000640000000000000064fefff05c10df05e7f46f4b95d0ff4f73b7ff5c0c... client: Filtered packet: [125] 16feff00000000000000000070010000640000000000000064fefff05c10df05... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/2 (7 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [3] 000100 handshake old: [181] fefda273537e23f812173c5d3116099c6ce91c33681f61f5ec40f67a0b21a59f... handshake new: [164] fefda273537e23f812173c5d3116099c6ce91c33681f61f5ec40f67a0b21a59f... record old: [193] 010000b500000000000000b5fefda273537e23f812173c5d3116099c6ce91c33... record new: [176] 010000a400000000000000a4fefda273537e23f812173c5d3116099c6ce91c33... client: Filtered packet: [189] 16feff000000000000000000b0010000a400000000000000a4fefda273537e23... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [184] fefd282a03d06292c509ff0a32551f773715f4ae19d0063a4c74946a8b305b58... handshake new: [177] fefd282a03d06292c509ff0a32551f773715f4ae19d0063a4c74946a8b305b58... record old: [196] 010000b800000000000000b8fefd282a03d06292c509ff0a32551f773715f4ae... record new: [189] 010000b100000000000000b1fefd282a03d06292c509ff0a32551f773715f4ae... client: Filtered packet: [202] 16feff000000000000000000bd010000b100000000000000b1fefd282a03d062... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [114] feffb7d2522678783c0035c8fca9bc5d6d30b2b862456730e6693f9045c563b2... handshake new: [107] feffb7d2522678783c0035c8fca9bc5d6d30b2b862456730e6693f9045c563b2... record old: [126] 010000720000000000000072feffb7d2522678783c0035c8fca9bc5d6d30b2b8... record new: [119] 0100006b000000000000006bfeffb7d2522678783c0035c8fca9bc5d6d30b2b8... client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeffb7d2522678... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [4] 09990000 handshake old: [181] fefd4eed6ada9ba68facf4ed4d991e997bd2bde085f28b6d5825d94f55f46311... handshake new: [165] fefd4eed6ada9ba68facf4ed4d991e997bd2bde085f28b6d5825d94f55f46311... record old: [193] 010000b500000000000000b5fefd4eed6ada9ba68facf4ed4d991e997bd2bde0... record new: [177] 010000a500000000000000a5fefd4eed6ada9ba68facf4ed4d991e997bd2bde0... client: Filtered packet: [190] 16feff000000000000000000b1010000a500000000000000a5fefd4eed6ada9b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [184] fefdcb633515fde6e52328965d181c4c2d5eb833f65e010adb88faafb9fcf749... handshake new: [178] fefdcb633515fde6e52328965d181c4c2d5eb833f65e010adb88faafb9fcf749... record old: [196] 010000b800000000000000b8fefdcb633515fde6e52328965d181c4c2d5eb833... record new: [190] 010000b200000000000000b2fefdcb633515fde6e52328965d181c4c2d5eb833... client: Filtered packet: [203] 16feff000000000000000000be010000b200000000000000b2fefdcb633515fd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [114] feff1a5f14aa9ce7a09399f3d15af5bf434aca151830858c42f8ab403129b2bc... handshake new: [108] feff1a5f14aa9ce7a09399f3d15af5bf434aca151830858c42f8ab403129b2bc... record old: [126] 010000720000000000000072feff1a5f14aa9ce7a09399f3d15af5bf434aca15... record new: [120] 0100006c000000000000006cfeff1a5f14aa9ce7a09399f3d15af5bf434aca15... client: Filtered packet: [133] 16feff000000000000000000780100006c000000000000006cfeff1a5f14aa9c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [20] 0012001d00170018001901000101010201030104 extension new: [5] 0002000000 handshake old: [181] fefd1c3748ca089243809506e2eb73e6197c150e5e08366e7e5062d30188914f... handshake new: [166] fefd1c3748ca089243809506e2eb73e6197c150e5e08366e7e5062d30188914f... record old: [193] 010000b500000000000000b5fefd1c3748ca089243809506e2eb73e6197c150e... record new: [178] 010000a600000000000000a6fefd1c3748ca089243809506e2eb73e6197c150e... client: Filtered packet: [191] 16feff000000000000000000b2010000a600000000000000a6fefd1c3748ca08... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [184] fefd4d6a5399c85c05dba01da7a90f57c973243281767f1727c8e27266a6de37... handshake new: [179] fefd4d6a5399c85c05dba01da7a90f57c973243281767f1727c8e27266a6de37... record old: [196] 010000b800000000000000b8fefd4d6a5399c85c05dba01da7a90f57c9732432... record new: [191] 010000b300000000000000b3fefd4d6a5399c85c05dba01da7a90f57c9732432... client: Filtered packet: [204] 16feff000000000000000000bf010000b300000000000000b3fefd4d6a5399c8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [114] feffeed61d047621083f653c07350b7aafd65c61d81fbc3d34db1011ae485be6... handshake new: [109] feffeed61d047621083f653c07350b7aafd65c61d81fbc3d34db1011ae485be6... record old: [126] 010000720000000000000072feffeed61d047621083f653c07350b7aafd65c61... record new: [121] 0100006d000000000000006dfeffeed61d047621083f653c07350b7aafd65c61... client: Filtered packet: [134] 16feff000000000000000000790100006d000000000000006dfeffeed61d0476... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (2 ms) [----------] 51 tests from ExtensionDatagram/TlsExtensionTestGeneric (134 ms total) [----------] 39 tests from ExtensionPre13Stream/TlsExtensionTestPre13 [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0301f426307a9ffc536fef122c3250db39312c09bef3f38fd18a2c4df781ece2... handshake new: [99] 0301f426307a9ffc536fef122c3250db39312c09bef3f38fd18a2c4df781ece2... record old: [721] 020000650301f426307a9ffc536fef122c3250db39312c09bef3f38fd18a2c4d... record new: [719] 020000630301f426307a9ffc536fef122c3250db39312c09bef3f38fd18a2c4d... server: Filtered packet: [724] 16030102cf020000630301f426307a9ffc536fef122c3250db39312c09bef3f3... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0302c29e1abe1d00c34230ab00463a9be78aa0b11078a44b24f03af9ef867038... handshake new: [99] 0302c29e1abe1d00c34230ab00463a9be78aa0b11078a44b24f03af9ef867038... record old: [721] 020000650302c29e1abe1d00c34230ab00463a9be78aa0b11078a44b24f03af9... record new: [719] 020000630302c29e1abe1d00c34230ab00463a9be78aa0b11078a44b24f03af9... server: Filtered packet: [724] 16030202cf020000630302c29e1abe1d00c34230ab00463a9be78aa0b11078a4... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 03039f82d67731c882bc889bbb54a54be4fba0e039316d612d57db51ed78507a... handshake new: [99] 03039f82d67731c882bc889bbb54a54be4fba0e039316d612d57db51ed78507a... record old: [723] 0200006503039f82d67731c882bc889bbb54a54be4fba0e039316d612d57db51... record new: [721] 0200006303039f82d67731c882bc889bbb54a54be4fba0e039316d612d57db51... server: Filtered packet: [726] 16030302d10200006303039f82d67731c882bc889bbb54a54be4fba0e039316d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 03015e845edb975cd443b32284205b130dcc7fa8c16adf1e65a9c871bef9f17e... handshake new: [100] 03015e845edb975cd443b32284205b130dcc7fa8c16adf1e65a9c871bef9f17e... record old: [721] 0200006503015e845edb975cd443b32284205b130dcc7fa8c16adf1e65a9c871... record new: [720] 0200006403015e845edb975cd443b32284205b130dcc7fa8c16adf1e65a9c871... server: Filtered packet: [725] 16030102d00200006403015e845edb975cd443b32284205b130dcc7fa8c16adf... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 0302de7de18cbfff708d9b3b92ad1a49fd77f77510406d497f230f318925091d... handshake new: [100] 0302de7de18cbfff708d9b3b92ad1a49fd77f77510406d497f230f318925091d... record old: [721] 020000650302de7de18cbfff708d9b3b92ad1a49fd77f77510406d497f230f31... record new: [720] 020000640302de7de18cbfff708d9b3b92ad1a49fd77f77510406d497f230f31... server: Filtered packet: [725] 16030202d0020000640302de7de18cbfff708d9b3b92ad1a49fd77f77510406d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 03030942792faf251e5c0f66608f889a54d5ac2a5f4be134f62e0fc3c2765848... handshake new: [100] 03030942792faf251e5c0f66608f889a54d5ac2a5f4be134f62e0fc3c2765848... record old: [723] 0200006503030942792faf251e5c0f66608f889a54d5ac2a5f4be134f62e0fc3... record new: [722] 0200006403030942792faf251e5c0f66608f889a54d5ac2a5f4be134f62e0fc3... server: Filtered packet: [727] 16030302d20200006403030942792faf251e5c0f66608f889a54d5ac2a5f4be1... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 03012e0d0e977f28c914604d47354b6cb221c78de13f9551a4b86b024463cc4b... handshake new: [102] 03012e0d0e977f28c914604d47354b6cb221c78de13f9551a4b86b024463cc4b... record old: [721] 0200006503012e0d0e977f28c914604d47354b6cb221c78de13f9551a4b86b02... record new: [722] 0200006603012e0d0e977f28c914604d47354b6cb221c78de13f9551a4b86b02... server: Filtered packet: [727] 16030102d20200006603012e0d0e977f28c914604d47354b6cb221c78de13f95... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 0302c7142df6972416d947d220314190ca8be47382d5f206df70bb5b9c378247... handshake new: [102] 0302c7142df6972416d947d220314190ca8be47382d5f206df70bb5b9c378247... record old: [721] 020000650302c7142df6972416d947d220314190ca8be47382d5f206df70bb5b... record new: [722] 020000660302c7142df6972416d947d220314190ca8be47382d5f206df70bb5b... server: Filtered packet: [727] 16030202d2020000660302c7142df6972416d947d220314190ca8be47382d5f2... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 03036825d820ec8ed8d4d4cbc54f12d40870bd825cac2c610c70d41bc64174e8... handshake new: [102] 03036825d820ec8ed8d4d4cbc54f12d40870bd825cac2c610c70d41bc64174e8... record old: [723] 0200006503036825d820ec8ed8d4d4cbc54f12d40870bd825cac2c610c70d41b... record new: [724] 0200006603036825d820ec8ed8d4d4cbc54f12d40870bd825cac2c610c70d41b... server: Filtered packet: [729] 16030302d40200006603036825d820ec8ed8d4d4cbc54f12d40870bd825cac2c... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 03013a6c21f03eddb5a20e05ff1d9b0510bd0b86b85726dd54437576f689608a... handshake new: [103] 03013a6c21f03eddb5a20e05ff1d9b0510bd0b86b85726dd54437576f689608a... record old: [721] 0200006503013a6c21f03eddb5a20e05ff1d9b0510bd0b86b85726dd54437576... record new: [723] 0200006703013a6c21f03eddb5a20e05ff1d9b0510bd0b86b85726dd54437576... server: Filtered packet: [728] 16030102d30200006703013a6c21f03eddb5a20e05ff1d9b0510bd0b86b85726... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 0302fbcdc3d0405aee426f8f6d056662a1c689300ee4000a4c59ca68f4ecd15a... handshake new: [103] 0302fbcdc3d0405aee426f8f6d056662a1c689300ee4000a4c59ca68f4ecd15a... record old: [721] 020000650302fbcdc3d0405aee426f8f6d056662a1c689300ee4000a4c59ca68... record new: [723] 020000670302fbcdc3d0405aee426f8f6d056662a1c689300ee4000a4c59ca68... server: Filtered packet: [728] 16030202d3020000670302fbcdc3d0405aee426f8f6d056662a1c689300ee400... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 03038dee734a7bd98f2f349b80850b48593cbe061a7a6a2c22bf525a42f6d783... handshake new: [103] 03038dee734a7bd98f2f349b80850b48593cbe061a7a6a2c22bf525a42f6d783... record old: [723] 0200006503038dee734a7bd98f2f349b80850b48593cbe061a7a6a2c22bf525a... record new: [725] 0200006703038dee734a7bd98f2f349b80850b48593cbe061a7a6a2c22bf525a... server: Filtered packet: [730] 16030302d50200006703038dee734a7bd98f2f349b80850b48593cbe061a7a6a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0301fcf3ec4ed17409928aa557bb0a524a616fc93a280cfd8a7e87705fac1b65... handshake new: [102] 0301fcf3ec4ed17409928aa557bb0a524a616fc93a280cfd8a7e87705fac1b65... record old: [721] 020000650301fcf3ec4ed17409928aa557bb0a524a616fc93a280cfd8a7e8770... record new: [722] 020000660301fcf3ec4ed17409928aa557bb0a524a616fc93a280cfd8a7e8770... server: Filtered packet: [727] 16030102d2020000660301fcf3ec4ed17409928aa557bb0a524a616fc93a280c... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 03027f870f12cf66acea8093348ea57769f3d55df523d8204abe58ef8c5bcfc5... handshake new: [102] 03027f870f12cf66acea8093348ea57769f3d55df523d8204abe58ef8c5bcfc5... record old: [721] 0200006503027f870f12cf66acea8093348ea57769f3d55df523d8204abe58ef... record new: [722] 0200006603027f870f12cf66acea8093348ea57769f3d55df523d8204abe58ef... server: Filtered packet: [727] 16030202d20200006603027f870f12cf66acea8093348ea57769f3d55df523d8... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0303ee7e8550fe7c9ee2afa103ab6c1c6a71af26893bae214563acb08872ff91... handshake new: [102] 0303ee7e8550fe7c9ee2afa103ab6c1c6a71af26893bae214563acb08872ff91... record old: [723] 020000650303ee7e8550fe7c9ee2afa103ab6c1c6a71af26893bae214563acb0... record new: [724] 020000660303ee7e8550fe7c9ee2afa103ab6c1c6a71af26893bae214563acb0... server: Filtered packet: [729] 16030302d4020000660303ee7e8550fe7c9ee2afa103ab6c1c6a71af26893bae... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0301e24f7c1278aff4864c585fcb33f3aef8aa0cba6896c2083e7c6e9f88eac5... handshake new: [101] 0301e24f7c1278aff4864c585fcb33f3aef8aa0cba6896c2083e7c6e9f88eac5... record old: [721] 020000650301e24f7c1278aff4864c585fcb33f3aef8aa0cba6896c2083e7c6e... record new: [721] 020000650301e24f7c1278aff4864c585fcb33f3aef8aa0cba6896c2083e7c6e... server: Filtered packet: [726] 16030102d1020000650301e24f7c1278aff4864c585fcb33f3aef8aa0cba6896... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 03023fccea6394a1bf6566e8f44c5d6c1a627b50ee5c6a8a55959e607ed5c324... handshake new: [101] 03023fccea6394a1bf6566e8f44c5d6c1a627b50ee5c6a8a55959e607ed5c324... record old: [721] 0200006503023fccea6394a1bf6566e8f44c5d6c1a627b50ee5c6a8a55959e60... record new: [721] 0200006503023fccea6394a1bf6566e8f44c5d6c1a627b50ee5c6a8a55959e60... server: Filtered packet: [726] 16030202d10200006503023fccea6394a1bf6566e8f44c5d6c1a627b50ee5c6a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0303b77b9cb09eb8a8480eb5db81ad96c98d570f309b328c10ac40b071d13edf... handshake new: [101] 0303b77b9cb09eb8a8480eb5db81ad96c98d570f309b328c10ac40b071d13edf... record old: [723] 020000650303b77b9cb09eb8a8480eb5db81ad96c98d570f309b328c10ac40b0... record new: [723] 020000650303b77b9cb09eb8a8480eb5db81ad96c98d570f309b328c10ac40b0... server: Filtered packet: [728] 16030302d3020000650303b77b9cb09eb8a8480eb5db81ad96c98d570f309b32... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 0301c5bc8a805e0645991473f20c223e7cb92e3f06a93e63f78e4db5e39135ab... handshake new: [101] 0301c5bc8a805e0645991473f20c223e7cb92e3f06a93e63f78e4db5e39135ab... record old: [721] 020000650301c5bc8a805e0645991473f20c223e7cb92e3f06a93e63f78e4db5... record new: [721] 020000650301c5bc8a805e0645991473f20c223e7cb92e3f06a93e63f78e4db5... server: Filtered packet: [726] 16030102d1020000650301c5bc8a805e0645991473f20c223e7cb92e3f06a93e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 0302d3c58c96011ad2fcab910cf3f52eb30c24ed4c3dd59f55b338940962a846... handshake new: [101] 0302d3c58c96011ad2fcab910cf3f52eb30c24ed4c3dd59f55b338940962a846... record old: [721] 020000650302d3c58c96011ad2fcab910cf3f52eb30c24ed4c3dd59f55b33894... record new: [721] 020000650302d3c58c96011ad2fcab910cf3f52eb30c24ed4c3dd59f55b33894... server: Filtered packet: [726] 16030202d1020000650302d3c58c96011ad2fcab910cf3f52eb30c24ed4c3dd5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 0303339e5e6f7c4d70f66afde863dcd38cc868d2e99f6953c6a47a9c325aa517... handshake new: [101] 0303339e5e6f7c4d70f66afde863dcd38cc868d2e99f6953c6a47a9c325aa517... record old: [723] 020000650303339e5e6f7c4d70f66afde863dcd38cc868d2e99f6953c6a47a9c... record new: [723] 020000650303339e5e6f7c4d70f66afde863dcd38cc868d2e99f6953c6a47a9c... server: Filtered packet: [728] 16030302d3020000650303339e5e6f7c4d70f66afde863dcd38cc868d2e99f69... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 0301e40d2c5ea12d5a8cb916a68b71c01d7440537efc2c16c715a4e0d18e0379... handshake new: [116] 0301e40d2c5ea12d5a8cb916a68b71c01d7440537efc2c16c715a4e0d18e0379... record old: [121] 010000750301e40d2c5ea12d5a8cb916a68b71c01d7440537efc2c16c715a4e0... record new: [120] 010000740301e40d2c5ea12d5a8cb916a68b71c01d7440537efc2c16c715a4e0... client: Filtered packet: [125] 1603010078010000740301e40d2c5ea12d5a8cb916a68b71c01d7440537efc2c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 03021ab4141df82f0da6d3fc7dae3a27485825699523a5b819a5eb3270370e3f... handshake new: [116] 03021ab4141df82f0da6d3fc7dae3a27485825699523a5b819a5eb3270370e3f... record old: [121] 0100007503021ab4141df82f0da6d3fc7dae3a27485825699523a5b819a5eb32... record new: [120] 0100007403021ab4141df82f0da6d3fc7dae3a27485825699523a5b819a5eb32... client: Filtered packet: [125] 16030100780100007403021ab4141df82f0da6d3fc7dae3a27485825699523a5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [187] 0303238b4bbc9312213d157fd0169ef5e00f3970bc0fcb12a00d47601b7d8a4d... handshake new: [186] 0303238b4bbc9312213d157fd0169ef5e00f3970bc0fcb12a00d47601b7d8a4d... record old: [191] 010000bb0303238b4bbc9312213d157fd0169ef5e00f3970bc0fcb12a00d4760... record new: [190] 010000ba0303238b4bbc9312213d157fd0169ef5e00f3970bc0fcb12a00d4760... client: Filtered packet: [195] 16030100be010000ba0303238b4bbc9312213d157fd0169ef5e00f3970bc0fcb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 0301e31cd8f948765f88414db7b8daedbb83a78e8250bf07c6613878742c1f5a... handshake new: [118] 0301e31cd8f948765f88414db7b8daedbb83a78e8250bf07c6613878742c1f5a... record old: [121] 010000750301e31cd8f948765f88414db7b8daedbb83a78e8250bf07c6613878... record new: [122] 010000760301e31cd8f948765f88414db7b8daedbb83a78e8250bf07c6613878... client: Filtered packet: [127] 160301007a010000760301e31cd8f948765f88414db7b8daedbb83a78e8250bf... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 030266a72f8dc86a354bb117f4230ba98206605d755132755c2d5ce50ae142dd... handshake new: [118] 030266a72f8dc86a354bb117f4230ba98206605d755132755c2d5ce50ae142dd... record old: [121] 01000075030266a72f8dc86a354bb117f4230ba98206605d755132755c2d5ce5... record new: [122] 01000076030266a72f8dc86a354bb117f4230ba98206605d755132755c2d5ce5... client: Filtered packet: [127] 160301007a01000076030266a72f8dc86a354bb117f4230ba98206605d755132... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [187] 0303b6d4bf12615b2a1fb403e2e019799da73566ec6567cb7b831136bf96ed64... handshake new: [188] 0303b6d4bf12615b2a1fb403e2e019799da73566ec6567cb7b831136bf96ed64... record old: [191] 010000bb0303b6d4bf12615b2a1fb403e2e019799da73566ec6567cb7b831136... record new: [192] 010000bc0303b6d4bf12615b2a1fb403e2e019799da73566ec6567cb7b831136... client: Filtered packet: [197] 16030100c0010000bc0303b6d4bf12615b2a1fb403e2e019799da73566ec6567... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 0301dc07357efdeff88cef42216fc2cad5de67730716881ed87d80c3dbebc9df... handshake new: [118] 0301dc07357efdeff88cef42216fc2cad5de67730716881ed87d80c3dbebc9df... record old: [121] 010000750301dc07357efdeff88cef42216fc2cad5de67730716881ed87d80c3... record new: [122] 010000760301dc07357efdeff88cef42216fc2cad5de67730716881ed87d80c3... client: Filtered packet: [127] 160301007a010000760301dc07357efdeff88cef42216fc2cad5de6773071688... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 0302aae51f1a20c4d49fdaa225cce208a0866be4bd17885437aeaa8edc6d228d... handshake new: [118] 0302aae51f1a20c4d49fdaa225cce208a0866be4bd17885437aeaa8edc6d228d... record old: [121] 010000750302aae51f1a20c4d49fdaa225cce208a0866be4bd17885437aeaa8e... record new: [122] 010000760302aae51f1a20c4d49fdaa225cce208a0866be4bd17885437aeaa8e... client: Filtered packet: [127] 160301007a010000760302aae51f1a20c4d49fdaa225cce208a0866be4bd1788... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [187] 030339c1ec0a29a07ed7ee3808e085e3544aa7ce926e5aea268b3d0f98554bfc... handshake new: [188] 030339c1ec0a29a07ed7ee3808e085e3544aa7ce926e5aea268b3d0f98554bfc... record old: [191] 010000bb030339c1ec0a29a07ed7ee3808e085e3544aa7ce926e5aea268b3d0f... record new: [192] 010000bc030339c1ec0a29a07ed7ee3808e085e3544aa7ce926e5aea268b3d0f... client: Filtered packet: [197] 16030100c0010000bc030339c1ec0a29a07ed7ee3808e085e3544aa7ce926e5a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 0301bcb79b48386eec5c4dce8473c5c506f1cd3de9b00eedec62789b0199f956... handshake new: [117] 0301bcb79b48386eec5c4dce8473c5c506f1cd3de9b00eedec62789b0199f956... record old: [121] 010000750301bcb79b48386eec5c4dce8473c5c506f1cd3de9b00eedec62789b... record new: [121] 010000750301bcb79b48386eec5c4dce8473c5c506f1cd3de9b00eedec62789b... client: Filtered packet: [126] 1603010079010000750301bcb79b48386eec5c4dce8473c5c506f1cd3de9b00e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 0302e3378c2129469a8629eea6c2209b0ce61f182b3e00997889bc4ae9d415b6... handshake new: [117] 0302e3378c2129469a8629eea6c2209b0ce61f182b3e00997889bc4ae9d415b6... record old: [121] 010000750302e3378c2129469a8629eea6c2209b0ce61f182b3e00997889bc4a... record new: [121] 010000750302e3378c2129469a8629eea6c2209b0ce61f182b3e00997889bc4a... client: Filtered packet: [126] 1603010079010000750302e3378c2129469a8629eea6c2209b0ce61f182b3e00... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [187] 03031d272bf8c7f7abe76e3ffb33ca9f1174e6640f62495bf66a9c2bcc9fbd78... handshake new: [187] 03031d272bf8c7f7abe76e3ffb33ca9f1174e6640f62495bf66a9c2bcc9fbd78... record old: [191] 010000bb03031d272bf8c7f7abe76e3ffb33ca9f1174e6640f62495bf66a9c2b... record new: [191] 010000bb03031d272bf8c7f7abe76e3ffb33ca9f1174e6640f62495bf66a9c2b... client: Filtered packet: [196] 16030100bf010000bb03031d272bf8c7f7abe76e3ffb33ca9f1174e6640f6249... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 0301b8a272f9eeb8817b6f40310b292166934ec6f64227d08494285a829e9a51... handshake new: [118] 0301b8a272f9eeb8817b6f40310b292166934ec6f64227d08494285a829e9a51... record old: [121] 010000750301b8a272f9eeb8817b6f40310b292166934ec6f64227d08494285a... record new: [122] 010000760301b8a272f9eeb8817b6f40310b292166934ec6f64227d08494285a... client: Filtered packet: [127] 160301007a010000760301b8a272f9eeb8817b6f40310b292166934ec6f64227... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 0302fc930bbe42e8605a5b7054821018f08b24dc1ed44d9c971f4eec130975a4... handshake new: [118] 0302fc930bbe42e8605a5b7054821018f08b24dc1ed44d9c971f4eec130975a4... record old: [121] 010000750302fc930bbe42e8605a5b7054821018f08b24dc1ed44d9c971f4eec... record new: [122] 010000760302fc930bbe42e8605a5b7054821018f08b24dc1ed44d9c971f4eec... client: Filtered packet: [127] 160301007a010000760302fc930bbe42e8605a5b7054821018f08b24dc1ed44d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [187] 03030b58c5276036434cdd0782ca41543e4ccb311ab44432c72534438085a46d... handshake new: [188] 03030b58c5276036434cdd0782ca41543e4ccb311ab44432c72534438085a46d... record old: [191] 010000bb03030b58c5276036434cdd0782ca41543e4ccb311ab44432c7253443... record new: [192] 010000bc03030b58c5276036434cdd0782ca41543e4ccb311ab44432c7253443... client: Filtered packet: [197] 16030100c0010000bc03030b58c5276036434cdd0782ca41543e4ccb311ab444... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (3 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 03015174e937e8fe80d47c222f921db52cbfc8a22d55a8d06a8f1889fec4ad34... handshake new: [116] 03015174e937e8fe80d47c222f921db52cbfc8a22d55a8d06a8f1889fec4ad34... record old: [121] 0100007503015174e937e8fe80d47c222f921db52cbfc8a22d55a8d06a8f1889... record new: [120] 0100007403015174e937e8fe80d47c222f921db52cbfc8a22d55a8d06a8f1889... client: Filtered packet: [125] 16030100780100007403015174e937e8fe80d47c222f921db52cbfc8a22d55a8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 03029e8a4ef42127a48113461475714d078cfc99ec0459407f0d41cfcb6ed8f5... handshake new: [116] 03029e8a4ef42127a48113461475714d078cfc99ec0459407f0d41cfcb6ed8f5... record old: [121] 0100007503029e8a4ef42127a48113461475714d078cfc99ec0459407f0d41cf... record new: [120] 0100007403029e8a4ef42127a48113461475714d078cfc99ec0459407f0d41cf... client: Filtered packet: [125] 16030100780100007403029e8a4ef42127a48113461475714d078cfc99ec0459... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [187] 0303f44301bdf747153b02a66ce552fb1337b068e42376bb69e8108983253445... handshake new: [186] 0303f44301bdf747153b02a66ce552fb1337b068e42376bb69e8108983253445... record old: [191] 010000bb0303f44301bdf747153b02a66ce552fb1337b068e42376bb69e81089... record new: [190] 010000ba0303f44301bdf747153b02a66ce552fb1337b068e42376bb69e81089... client: Filtered packet: [195] 16030100be010000ba0303f44301bdf747153b02a66ce552fb1337b068e42376... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (3 ms) [----------] 39 tests from ExtensionPre13Stream/TlsExtensionTestPre13 (106 ms total) [----------] 52 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0302688e981cd211e638bc82800b76f62ba787b6fc01c6a76907280e11a71322... handshake new: [99] 0302688e981cd211e638bc82800b76f62ba787b6fc01c6a76907280e11a71322... record old: [721] 020000650302688e981cd211e638bc82800b76f62ba787b6fc01c6a76907280e... record new: [719] 020000630302688e981cd211e638bc82800b76f62ba787b6fc01c6a76907280e... server: Filtered packet: [724] 16030202cf020000630302688e981cd211e638bc82800b76f62ba787b6fc01c6... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0303cf6231283380046e600addb81202c8897430579ee3640501ad35a03f7f12... handshake new: [99] 0303cf6231283380046e600addb81202c8897430579ee3640501ad35a03f7f12... record old: [723] 020000650303cf6231283380046e600addb81202c8897430579ee3640501ad35... record new: [721] 020000630303cf6231283380046e600addb81202c8897430579ee3640501ad35... server: Filtered packet: [726] 16030302d1020000630303cf6231283380046e600addb81202c8897430579ee3... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] feff30c1ea6ceae73c1bd5ce7d1861b6c47bf46cde15f5f8ba4d3bc9b7a93622... handshake new: [99] feff30c1ea6ceae73c1bd5ce7d1861b6c47bf46cde15f5f8ba4d3bc9b7a93622... record old: [113] 020000650000000000000065feff30c1ea6ceae73c1bd5ce7d1861b6c47bf46c... record new: [111] 020000630000000000000063feff30c1ea6ceae73c1bd5ce7d1861b6c47bf46c... server: Filtered packet: [803] 16feff0000000000000000006f020000630000000000000063feff30c1ea6cea... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] fefde712435b776b123264c28ab24d444f96a111b28b242107b9390b8511ad44... handshake new: [99] fefde712435b776b123264c28ab24d444f96a111b28b242107b9390b8511ad44... record old: [113] 020000650000000000000065fefde712435b776b123264c28ab24d444f96a111... record new: [111] 020000630000000000000063fefde712435b776b123264c28ab24d444f96a111... server: Filtered packet: [805] 16fefd0000000000000000006f020000630000000000000063fefde712435b77... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 0302c31362be5e3629bdffac04852cf00a5fc28d78bd823fdc8fffa4090e5006... handshake new: [100] 0302c31362be5e3629bdffac04852cf00a5fc28d78bd823fdc8fffa4090e5006... record old: [721] 020000650302c31362be5e3629bdffac04852cf00a5fc28d78bd823fdc8fffa4... record new: [720] 020000640302c31362be5e3629bdffac04852cf00a5fc28d78bd823fdc8fffa4... server: Filtered packet: [725] 16030202d0020000640302c31362be5e3629bdffac04852cf00a5fc28d78bd82... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 03031de91d7feb7f365858448965658b951e013575052d89397a5bc2e1ddbdde... handshake new: [100] 03031de91d7feb7f365858448965658b951e013575052d89397a5bc2e1ddbdde... record old: [723] 0200006503031de91d7feb7f365858448965658b951e013575052d89397a5bc2... record new: [722] 0200006403031de91d7feb7f365858448965658b951e013575052d89397a5bc2... server: Filtered packet: [727] 16030302d20200006403031de91d7feb7f365858448965658b951e013575052d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] feff392cbde8beb0032760e2feba956a9c845e6df027226e9df7b56f26bb1fa3... handshake new: [100] feff392cbde8beb0032760e2feba956a9c845e6df027226e9df7b56f26bb1fa3... record old: [113] 020000650000000000000065feff392cbde8beb0032760e2feba956a9c845e6d... record new: [112] 020000640000000000000064feff392cbde8beb0032760e2feba956a9c845e6d... server: Filtered packet: [804] 16feff00000000000000000070020000640000000000000064feff392cbde8be... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] fefd7e6e174cb384a870b9583f570d32fb532870a9770a5ddc3a24280131d3e3... handshake new: [100] fefd7e6e174cb384a870b9583f570d32fb532870a9770a5ddc3a24280131d3e3... record old: [113] 020000650000000000000065fefd7e6e174cb384a870b9583f570d32fb532870... record new: [112] 020000640000000000000064fefd7e6e174cb384a870b9583f570d32fb532870... server: Filtered packet: [806] 16fefd00000000000000000070020000640000000000000064fefd7e6e174cb3... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 0302c22a6df185ff27ebe3230a0ca5effff92917ce8a5691ee0bbf3616e54445... handshake new: [102] 0302c22a6df185ff27ebe3230a0ca5effff92917ce8a5691ee0bbf3616e54445... record old: [721] 020000650302c22a6df185ff27ebe3230a0ca5effff92917ce8a5691ee0bbf36... record new: [722] 020000660302c22a6df185ff27ebe3230a0ca5effff92917ce8a5691ee0bbf36... server: Filtered packet: [727] 16030202d2020000660302c22a6df185ff27ebe3230a0ca5effff92917ce8a56... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 030332b8332658035ca7d4c944c6807935a14924e7bd92105e509413c4d97051... handshake new: [102] 030332b8332658035ca7d4c944c6807935a14924e7bd92105e509413c4d97051... record old: [723] 02000065030332b8332658035ca7d4c944c6807935a14924e7bd92105e509413... record new: [724] 02000066030332b8332658035ca7d4c944c6807935a14924e7bd92105e509413... server: Filtered packet: [729] 16030302d402000066030332b8332658035ca7d4c944c6807935a14924e7bd92... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] feff6d8cd6e88a77797dec08c5712e4165f3d4f24a6304991df09170648f1b71... handshake new: [102] feff6d8cd6e88a77797dec08c5712e4165f3d4f24a6304991df09170648f1b71... record old: [113] 020000650000000000000065feff6d8cd6e88a77797dec08c5712e4165f3d4f2... record new: [114] 020000660000000000000066feff6d8cd6e88a77797dec08c5712e4165f3d4f2... server: Filtered packet: [806] 16feff00000000000000000072020000660000000000000066feff6d8cd6e88a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] fefdfe2a897a36dedc96ab1df65da0d5ebfe309c50ccca4144c65c32b158f9bb... handshake new: [102] fefdfe2a897a36dedc96ab1df65da0d5ebfe309c50ccca4144c65c32b158f9bb... record old: [113] 020000650000000000000065fefdfe2a897a36dedc96ab1df65da0d5ebfe309c... record new: [114] 020000660000000000000066fefdfe2a897a36dedc96ab1df65da0d5ebfe309c... server: Filtered packet: [808] 16fefd00000000000000000072020000660000000000000066fefdfe2a897a36... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 0302d09d3a169904678b67f6bb38c004b88c5df7e197f4de759a922bab25eb87... handshake new: [103] 0302d09d3a169904678b67f6bb38c004b88c5df7e197f4de759a922bab25eb87... record old: [721] 020000650302d09d3a169904678b67f6bb38c004b88c5df7e197f4de759a922b... record new: [723] 020000670302d09d3a169904678b67f6bb38c004b88c5df7e197f4de759a922b... server: Filtered packet: [728] 16030202d3020000670302d09d3a169904678b67f6bb38c004b88c5df7e197f4... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 0303da262e339d7ea4cbe99bfa66c6b5bcc6ddcdeb4f5baa58a67b5ccf13acf5... handshake new: [103] 0303da262e339d7ea4cbe99bfa66c6b5bcc6ddcdeb4f5baa58a67b5ccf13acf5... record old: [723] 020000650303da262e339d7ea4cbe99bfa66c6b5bcc6ddcdeb4f5baa58a67b5c... record new: [725] 020000670303da262e339d7ea4cbe99bfa66c6b5bcc6ddcdeb4f5baa58a67b5c... server: Filtered packet: [730] 16030302d5020000670303da262e339d7ea4cbe99bfa66c6b5bcc6ddcdeb4f5b... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] feff748ad91abe23a139761030cefcbbeec7b06ba65db84b449d2355d692e02b... handshake new: [103] feff748ad91abe23a139761030cefcbbeec7b06ba65db84b449d2355d692e02b... record old: [113] 020000650000000000000065feff748ad91abe23a139761030cefcbbeec7b06b... record new: [115] 020000670000000000000067feff748ad91abe23a139761030cefcbbeec7b06b... server: Filtered packet: [807] 16feff00000000000000000073020000670000000000000067feff748ad91abe... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] fefdb0d26d9a357deb919597dcf9d83ffe118ea01b0dfeed8afefa5d58317210... handshake new: [103] fefdb0d26d9a357deb919597dcf9d83ffe118ea01b0dfeed8afefa5d58317210... record old: [113] 020000650000000000000065fefdb0d26d9a357deb919597dcf9d83ffe118ea0... record new: [115] 020000670000000000000067fefdb0d26d9a357deb919597dcf9d83ffe118ea0... server: Filtered packet: [809] 16fefd00000000000000000073020000670000000000000067fefdb0d26d9a35... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0302717c03c0d03a51221fe550d9f2c75ded1f9519c8aa83c1d968eabc18f1c8... handshake new: [102] 0302717c03c0d03a51221fe550d9f2c75ded1f9519c8aa83c1d968eabc18f1c8... record old: [721] 020000650302717c03c0d03a51221fe550d9f2c75ded1f9519c8aa83c1d968ea... record new: [722] 020000660302717c03c0d03a51221fe550d9f2c75ded1f9519c8aa83c1d968ea... server: Filtered packet: [727] 16030202d2020000660302717c03c0d03a51221fe550d9f2c75ded1f9519c8aa... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 03031bdc5bc92b38d3afc31ebe721a9a45d4a77ffc46a663aac5c0568c2ec861... handshake new: [102] 03031bdc5bc92b38d3afc31ebe721a9a45d4a77ffc46a663aac5c0568c2ec861... record old: [723] 0200006503031bdc5bc92b38d3afc31ebe721a9a45d4a77ffc46a663aac5c056... record new: [724] 0200006603031bdc5bc92b38d3afc31ebe721a9a45d4a77ffc46a663aac5c056... server: Filtered packet: [729] 16030302d40200006603031bdc5bc92b38d3afc31ebe721a9a45d4a77ffc46a6... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] feff075b908282f5e1248c814aab4315bd748caee5f0b4eb3c3323bdf461d901... handshake new: [102] feff075b908282f5e1248c814aab4315bd748caee5f0b4eb3c3323bdf461d901... record old: [113] 020000650000000000000065feff075b908282f5e1248c814aab4315bd748cae... record new: [114] 020000660000000000000066feff075b908282f5e1248c814aab4315bd748cae... server: Filtered packet: [806] 16feff00000000000000000072020000660000000000000066feff075b908282... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] fefdd9470c91453737a6e1430585f24fcef528d82a6e6a4285082d3a277a7060... handshake new: [102] fefdd9470c91453737a6e1430585f24fcef528d82a6e6a4285082d3a277a7060... record old: [113] 020000650000000000000065fefdd9470c91453737a6e1430585f24fcef528d8... record new: [114] 020000660000000000000066fefdd9470c91453737a6e1430585f24fcef528d8... server: Filtered packet: [808] 16fefd00000000000000000072020000660000000000000066fefdd9470c9145... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0302afba4353efcb58c448d442143fc8e08346527a2a1718e96a627103f54092... handshake new: [101] 0302afba4353efcb58c448d442143fc8e08346527a2a1718e96a627103f54092... record old: [721] 020000650302afba4353efcb58c448d442143fc8e08346527a2a1718e96a6271... record new: [721] 020000650302afba4353efcb58c448d442143fc8e08346527a2a1718e96a6271... server: Filtered packet: [726] 16030202d1020000650302afba4353efcb58c448d442143fc8e08346527a2a17... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0303c768fc7cf7b9239d1ccc77526b2e2e2372b964a09fa90dd431e4fa841252... handshake new: [101] 0303c768fc7cf7b9239d1ccc77526b2e2e2372b964a09fa90dd431e4fa841252... record old: [723] 020000650303c768fc7cf7b9239d1ccc77526b2e2e2372b964a09fa90dd431e4... record new: [723] 020000650303c768fc7cf7b9239d1ccc77526b2e2e2372b964a09fa90dd431e4... server: Filtered packet: [728] 16030302d3020000650303c768fc7cf7b9239d1ccc77526b2e2e2372b964a09f... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] feffe4dadffdd305ce505a9a6c639b4d71b0d7e283343511d1486e2107b37b8c... handshake new: [101] feffe4dadffdd305ce505a9a6c639b4d71b0d7e283343511d1486e2107b37b8c... record old: [113] 020000650000000000000065feffe4dadffdd305ce505a9a6c639b4d71b0d7e2... record new: [113] 020000650000000000000065feffe4dadffdd305ce505a9a6c639b4d71b0d7e2... server: Filtered packet: [805] 16feff00000000000000000071020000650000000000000065feffe4dadffdd3... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] fefdede12bea7a815f35686a584480a93a7bac3c8231cad497882411f77ac2ce... handshake new: [101] fefdede12bea7a815f35686a584480a93a7bac3c8231cad497882411f77ac2ce... record old: [113] 020000650000000000000065fefdede12bea7a815f35686a584480a93a7bac3c... record new: [113] 020000650000000000000065fefdede12bea7a815f35686a584480a93a7bac3c... server: Filtered packet: [807] 16fefd00000000000000000071020000650000000000000065fefdede12bea7a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 0302bfbed29db2c8e4d937bc090f78709b2f9c97cf6ebed97994912ef5314ef9... handshake new: [101] 0302bfbed29db2c8e4d937bc090f78709b2f9c97cf6ebed97994912ef5314ef9... record old: [721] 020000650302bfbed29db2c8e4d937bc090f78709b2f9c97cf6ebed97994912e... record new: [721] 020000650302bfbed29db2c8e4d937bc090f78709b2f9c97cf6ebed97994912e... server: Filtered packet: [726] 16030202d1020000650302bfbed29db2c8e4d937bc090f78709b2f9c97cf6ebe... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 0303b9054d749d3ad35b5006abef61bd3d92fa33d9bf27d45d33c4916777dcc1... handshake new: [101] 0303b9054d749d3ad35b5006abef61bd3d92fa33d9bf27d45d33c4916777dcc1... record old: [723] 020000650303b9054d749d3ad35b5006abef61bd3d92fa33d9bf27d45d33c491... record new: [723] 020000650303b9054d749d3ad35b5006abef61bd3d92fa33d9bf27d45d33c491... server: Filtered packet: [728] 16030302d3020000650303b9054d749d3ad35b5006abef61bd3d92fa33d9bf27... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] feffe423c811a3b3235d2769810c0b021885761459fed517587217f1cdad8829... handshake new: [101] feffe423c811a3b3235d2769810c0b021885761459fed517587217f1cdad8829... record old: [113] 020000650000000000000065feffe423c811a3b3235d2769810c0b0218857614... record new: [113] 020000650000000000000065feffe423c811a3b3235d2769810c0b0218857614... server: Filtered packet: [805] 16feff00000000000000000071020000650000000000000065feffe423c811a3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] fefd3b1d1f1384df6a0cb1f5dd0d204acd920d4560406ae27cf9f0c312be7ce5... handshake new: [101] fefd3b1d1f1384df6a0cb1f5dd0d204acd920d4560406ae27cf9f0c312be7ce5... record old: [113] 020000650000000000000065fefd3b1d1f1384df6a0cb1f5dd0d204acd920d45... record new: [113] 020000650000000000000065fefd3b1d1f1384df6a0cb1f5dd0d204acd920d45... server: Filtered packet: [807] 16fefd00000000000000000071020000650000000000000065fefd3b1d1f1384... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 03020a458bc26f352712801b62e59b6e93c45e759d05247ac4a45e9184258c45... handshake new: [116] 03020a458bc26f352712801b62e59b6e93c45e759d05247ac4a45e9184258c45... record old: [121] 0100007503020a458bc26f352712801b62e59b6e93c45e759d05247ac4a45e91... record new: [120] 0100007403020a458bc26f352712801b62e59b6e93c45e759d05247ac4a45e91... client: Filtered packet: [125] 16030100780100007403020a458bc26f352712801b62e59b6e93c45e759d0524... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [187] 03037c455269881975f2bf6a58093a95f56c8f0b5fbaedd916329044e0e94f58... handshake new: [186] 03037c455269881975f2bf6a58093a95f56c8f0b5fbaedd916329044e0e94f58... record old: [191] 010000bb03037c455269881975f2bf6a58093a95f56c8f0b5fbaedd916329044... record new: [190] 010000ba03037c455269881975f2bf6a58093a95f56c8f0b5fbaedd916329044... client: Filtered packet: [195] 16030100be010000ba03037c455269881975f2bf6a58093a95f56c8f0b5fbaed... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [114] feff621f9f025c789346cfbd47219ae64be51e170f9afb618b5c3597d7c5e11b... handshake new: [113] feff621f9f025c789346cfbd47219ae64be51e170f9afb618b5c3597d7c5e11b... record old: [126] 010000720000000000000072feff621f9f025c789346cfbd47219ae64be51e17... record new: [125] 010000710000000000000071feff621f9f025c789346cfbd47219ae64be51e17... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feff621f9f025c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [184] fefda6a38d81f3814d6fed1d0de36e7836d0e9fc96480880ea79e964c378d8db... handshake new: [183] fefda6a38d81f3814d6fed1d0de36e7836d0e9fc96480880ea79e964c378d8db... record old: [196] 010000b800000000000000b8fefda6a38d81f3814d6fed1d0de36e7836d0e9fc... record new: [195] 010000b700000000000000b7fefda6a38d81f3814d6fed1d0de36e7836d0e9fc... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefda6a38d81f3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 03028dcfad1fdb3be9cf2912b65c3af3cbbf091f7bcb4efd692fcc89d376c604... handshake new: [118] 03028dcfad1fdb3be9cf2912b65c3af3cbbf091f7bcb4efd692fcc89d376c604... record old: [121] 0100007503028dcfad1fdb3be9cf2912b65c3af3cbbf091f7bcb4efd692fcc89... record new: [122] 0100007603028dcfad1fdb3be9cf2912b65c3af3cbbf091f7bcb4efd692fcc89... client: Filtered packet: [127] 160301007a0100007603028dcfad1fdb3be9cf2912b65c3af3cbbf091f7bcb4e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [187] 03035831a206c02456e55992dde1ee57c05e63ae6a4595f819730f70cc13af1b... handshake new: [188] 03035831a206c02456e55992dde1ee57c05e63ae6a4595f819730f70cc13af1b... record old: [191] 010000bb03035831a206c02456e55992dde1ee57c05e63ae6a4595f819730f70... record new: [192] 010000bc03035831a206c02456e55992dde1ee57c05e63ae6a4595f819730f70... client: Filtered packet: [197] 16030100c0010000bc03035831a206c02456e55992dde1ee57c05e63ae6a4595... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [114] feff97cbb8959dbdbf84e37839231b8a144ee02f4b5f4595fd16a95210433e0c... handshake new: [115] feff97cbb8959dbdbf84e37839231b8a144ee02f4b5f4595fd16a95210433e0c... record old: [126] 010000720000000000000072feff97cbb8959dbdbf84e37839231b8a144ee02f... record new: [127] 010000730000000000000073feff97cbb8959dbdbf84e37839231b8a144ee02f... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feff97cbb8959d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [184] fefdd090211195089abf3c511b80e4e642decd8a97b2574d0d69fa3829f95168... handshake new: [185] fefdd090211195089abf3c511b80e4e642decd8a97b2574d0d69fa3829f95168... record old: [196] 010000b800000000000000b8fefdd090211195089abf3c511b80e4e642decd8a... record new: [197] 010000b900000000000000b9fefdd090211195089abf3c511b80e4e642decd8a... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefdd090211195... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 03024c4ae22520cb1e3b89048a353e11e62b82ec2fbe82dfd4b9d438d4bbc07e... handshake new: [118] 03024c4ae22520cb1e3b89048a353e11e62b82ec2fbe82dfd4b9d438d4bbc07e... record old: [121] 0100007503024c4ae22520cb1e3b89048a353e11e62b82ec2fbe82dfd4b9d438... record new: [122] 0100007603024c4ae22520cb1e3b89048a353e11e62b82ec2fbe82dfd4b9d438... client: Filtered packet: [127] 160301007a0100007603024c4ae22520cb1e3b89048a353e11e62b82ec2fbe82... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [187] 03032d4f420a1f0f737197c9449f06941fc358d8d4a2df5a1b22306a298de598... handshake new: [188] 03032d4f420a1f0f737197c9449f06941fc358d8d4a2df5a1b22306a298de598... record old: [191] 010000bb03032d4f420a1f0f737197c9449f06941fc358d8d4a2df5a1b22306a... record new: [192] 010000bc03032d4f420a1f0f737197c9449f06941fc358d8d4a2df5a1b22306a... client: Filtered packet: [197] 16030100c0010000bc03032d4f420a1f0f737197c9449f06941fc358d8d4a2df... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [114] feffd4b6d77546acc88f655e780072b4b1967068f00ce2282f9876d4b2e76a32... handshake new: [115] feffd4b6d77546acc88f655e780072b4b1967068f00ce2282f9876d4b2e76a32... record old: [126] 010000720000000000000072feffd4b6d77546acc88f655e780072b4b1967068... record new: [127] 010000730000000000000073feffd4b6d77546acc88f655e780072b4b1967068... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feffd4b6d77546... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [184] fefdeeccef891d21c5015d3e5d4898f9f1e4152b269029789b3d140a8bcfd6aa... handshake new: [185] fefdeeccef891d21c5015d3e5d4898f9f1e4152b269029789b3d140a8bcfd6aa... record old: [196] 010000b800000000000000b8fefdeeccef891d21c5015d3e5d4898f9f1e4152b... record new: [197] 010000b900000000000000b9fefdeeccef891d21c5015d3e5d4898f9f1e4152b... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefdeeccef891d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 03029eeeae6fd11e8308010e9fc35343c60027ffddc2cd0130cf9acc41650bdd... handshake new: [117] 03029eeeae6fd11e8308010e9fc35343c60027ffddc2cd0130cf9acc41650bdd... record old: [121] 0100007503029eeeae6fd11e8308010e9fc35343c60027ffddc2cd0130cf9acc... record new: [121] 0100007503029eeeae6fd11e8308010e9fc35343c60027ffddc2cd0130cf9acc... client: Filtered packet: [126] 16030100790100007503029eeeae6fd11e8308010e9fc35343c60027ffddc2cd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [187] 0303d5c6443612465423820585fe77068a58ab5e3acdca5ce5771312cd0bfbdd... handshake new: [187] 0303d5c6443612465423820585fe77068a58ab5e3acdca5ce5771312cd0bfbdd... record old: [191] 010000bb0303d5c6443612465423820585fe77068a58ab5e3acdca5ce5771312... record new: [191] 010000bb0303d5c6443612465423820585fe77068a58ab5e3acdca5ce5771312... client: Filtered packet: [196] 16030100bf010000bb0303d5c6443612465423820585fe77068a58ab5e3acdca... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [114] feff607030998569bd5341fe7143a86f902cf6bea7ed1bcb544a9f2074160673... handshake new: [114] feff607030998569bd5341fe7143a86f902cf6bea7ed1bcb544a9f2074160673... record old: [126] 010000720000000000000072feff607030998569bd5341fe7143a86f902cf6be... record new: [126] 010000720000000000000072feff607030998569bd5341fe7143a86f902cf6be... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff6070309985... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [184] fefdf3c0a123d364859b2b2452d88799fbc531867ecdc17d28c9c490906e890e... handshake new: [184] fefdf3c0a123d364859b2b2452d88799fbc531867ecdc17d28c9c490906e890e... record old: [196] 010000b800000000000000b8fefdf3c0a123d364859b2b2452d88799fbc53186... record new: [196] 010000b800000000000000b8fefdf3c0a123d364859b2b2452d88799fbc53186... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefdf3c0a123d3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 030242b8b8d8714f82d70b4f3cc16c2379f38ffd5efd9d31adadfb46d606f454... handshake new: [118] 030242b8b8d8714f82d70b4f3cc16c2379f38ffd5efd9d31adadfb46d606f454... record old: [121] 01000075030242b8b8d8714f82d70b4f3cc16c2379f38ffd5efd9d31adadfb46... record new: [122] 01000076030242b8b8d8714f82d70b4f3cc16c2379f38ffd5efd9d31adadfb46... client: Filtered packet: [127] 160301007a01000076030242b8b8d8714f82d70b4f3cc16c2379f38ffd5efd9d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [187] 03036c7fc6ca1b75e07dab852e1dc35b55fa91a708417445dc4de1efbea73421... handshake new: [188] 03036c7fc6ca1b75e07dab852e1dc35b55fa91a708417445dc4de1efbea73421... record old: [191] 010000bb03036c7fc6ca1b75e07dab852e1dc35b55fa91a708417445dc4de1ef... record new: [192] 010000bc03036c7fc6ca1b75e07dab852e1dc35b55fa91a708417445dc4de1ef... client: Filtered packet: [197] 16030100c0010000bc03036c7fc6ca1b75e07dab852e1dc35b55fa91a7084174... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [114] feffb559d01384a54ba04057aa8705a5b9f243215d8c7f92e47fbe257aceffaf... handshake new: [115] feffb559d01384a54ba04057aa8705a5b9f243215d8c7f92e47fbe257aceffaf... record old: [126] 010000720000000000000072feffb559d01384a54ba04057aa8705a5b9f24321... record new: [127] 010000730000000000000073feffb559d01384a54ba04057aa8705a5b9f24321... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feffb559d01384... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [184] fefdb28bbcce9ababe32e0f911c7182f195a3df07f08cc075155536d750d6c0c... handshake new: [185] fefdb28bbcce9ababe32e0f911c7182f195a3df07f08cc075155536d750d6c0c... record old: [196] 010000b800000000000000b8fefdb28bbcce9ababe32e0f911c7182f195a3df0... record new: [197] 010000b900000000000000b9fefdb28bbcce9ababe32e0f911c7182f195a3df0... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefdb28bbcce9a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 0302fae6358bba0d1a79c6617fdbdf75e0c57ac51d4914fd860e8bc8d1c461d2... handshake new: [116] 0302fae6358bba0d1a79c6617fdbdf75e0c57ac51d4914fd860e8bc8d1c461d2... record old: [121] 010000750302fae6358bba0d1a79c6617fdbdf75e0c57ac51d4914fd860e8bc8... record new: [120] 010000740302fae6358bba0d1a79c6617fdbdf75e0c57ac51d4914fd860e8bc8... client: Filtered packet: [125] 1603010078010000740302fae6358bba0d1a79c6617fdbdf75e0c57ac51d4914... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (3 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [187] 03032d6e0b70fb21291ee923cd7f9655cbc64cbc666e7997d24f59bf6681b443... handshake new: [186] 03032d6e0b70fb21291ee923cd7f9655cbc64cbc666e7997d24f59bf6681b443... record old: [191] 010000bb03032d6e0b70fb21291ee923cd7f9655cbc64cbc666e7997d24f59bf... record new: [190] 010000ba03032d6e0b70fb21291ee923cd7f9655cbc64cbc666e7997d24f59bf... client: Filtered packet: [195] 16030100be010000ba03032d6e0b70fb21291ee923cd7f9655cbc64cbc666e79... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [114] feffd8be1057ddd45893044d83c6417da82540adcb5d32ea2d9bb81b50a8a142... handshake new: [113] feffd8be1057ddd45893044d83c6417da82540adcb5d32ea2d9bb81b50a8a142... record old: [126] 010000720000000000000072feffd8be1057ddd45893044d83c6417da82540ad... record new: [125] 010000710000000000000071feffd8be1057ddd45893044d83c6417da82540ad... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feffd8be1057dd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [184] fefd7af943ed65c19e0c39d324e30380876b0d5dfb0f0d3e90e377de6d9463aa... handshake new: [183] fefd7af943ed65c19e0c39d324e30380876b0d5dfb0f0d3e90e377de6d9463aa... record old: [196] 010000b800000000000000b8fefd7af943ed65c19e0c39d324e30380876b0d5d... record new: [195] 010000b700000000000000b7fefd7af943ed65c19e0c39d324e30380876b0d5d... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd7af943ed65... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 (3 ms) [----------] 52 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 (140 ms total) [----------] 6 tests from ExtensionDatagramOnly/TlsExtensionTestDtls [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [192] fefd5dc90a983e6138ce289a035d1998abd37833a6388c88b9939491db0cd238... handshake new: [188] fefd5dc90a983e6138ce289a035d1998abd37833a6388c88b9939491db0cd238... record old: [204] 010000c000000000000000c0fefd5dc90a983e6138ce289a035d1998abd37833... record new: [200] 010000bc00000000000000bcfefd5dc90a983e6138ce289a035d1998abd37833... client: Filtered packet: [213] 16feff000000000000000000c8010000bc00000000000000bcfefd5dc90a983e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [195] fefd6d293964d9323d4368155088cb938e0c2bc95fbbdfc7d5a0eb1609f3e682... handshake new: [191] fefd6d293964d9323d4368155088cb938e0c2bc95fbbdfc7d5a0eb1609f3e682... record old: [207] 010000c300000000000000c3fefd6d293964d9323d4368155088cb938e0c2bc9... record new: [203] 010000bf00000000000000bffefd6d293964d9323d4368155088cb938e0c2bc9... client: Filtered packet: [216] 16feff000000000000000000cb010000bf00000000000000bffefd6d293964d9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 (3 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [125] feff824eccf9d3988ab08ba8010a02c36ab4589a166c6aba5fffded1df7dcdb8... handshake new: [121] feff824eccf9d3988ab08ba8010a02c36ab4589a166c6aba5fffded1df7dcdb8... record old: [137] 0100007d000000000000007dfeff824eccf9d3988ab08ba8010a02c36ab4589a... record new: [133] 010000790000000000000079feff824eccf9d3988ab08ba8010a02c36ab4589a... client: Filtered packet: [146] 16feff00000000000000000085010000790000000000000079feff824eccf9d3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/2 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [192] fefd0aa6d09a3d9265ef1dee663543bf762b354cb3741be172e7896ca71ab99f... handshake new: [189] fefd0aa6d09a3d9265ef1dee663543bf762b354cb3741be172e7896ca71ab99f... record old: [204] 010000c000000000000000c0fefd0aa6d09a3d9265ef1dee663543bf762b354c... record new: [201] 010000bd00000000000000bdfefd0aa6d09a3d9265ef1dee663543bf762b354c... client: Filtered packet: [214] 16feff000000000000000000c9010000bd00000000000000bdfefd0aa6d09a3d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 (3 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [195] fefd70256a9f63784d911695c24238f8553307b263078e537a4328546f27bdb6... handshake new: [192] fefd70256a9f63784d911695c24238f8553307b263078e537a4328546f27bdb6... record old: [207] 010000c300000000000000c3fefd70256a9f63784d911695c24238f8553307b2... record new: [204] 010000c000000000000000c0fefd70256a9f63784d911695c24238f8553307b2... client: Filtered packet: [217] 16feff000000000000000000cc010000c000000000000000c0fefd70256a9f63... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [125] feff635e763e7725c48effb4819833f8417e5eb2e70adf9d31da822b5764413f... handshake new: [122] feff635e763e7725c48effb4819833f8417e5eb2e70adf9d31da822b5764413f... record old: [137] 0100007d000000000000007dfeff635e763e7725c48effb4819833f8417e5eb2... record new: [134] 0100007a000000000000007afeff635e763e7725c48effb4819833f8417e5eb2... client: Filtered packet: [147] 16feff000000000000000000860100007a000000000000007afeff635e763e77... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/2 (3 ms) [----------] 6 tests from ExtensionDatagramOnly/TlsExtensionTestDtls (15 ms total) [----------] 20 tests from ExtensionTls12Plus/TlsExtensionTest12Plus [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [1] 00 handshake old: [180] 0303d4ab6222b0f8ef76a9593c257b12d91d3d9de9efffd4be059893fe7e6add... handshake new: [157] 0303d4ab6222b0f8ef76a9593c257b12d91d3d9de9efffd4be059893fe7e6add... record old: [184] 010000b40303d4ab6222b0f8ef76a9593c257b12d91d3d9de9efffd4be059893... record new: [161] 0100009d0303d4ab6222b0f8ef76a9593c257b12d91d3d9de9efffd4be059893... client: Filtered packet: [166] 16030100a10100009d0303d4ab6222b0f8ef76a9593c257b12d91d3d9de9efff... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [1] 00 handshake old: [187] 030351fbe02d2d03d89fcf11943f99d361ae8914554a99ceb9e6c0539549f992... handshake new: [156] 030351fbe02d2d03d89fcf11943f99d361ae8914554a99ceb9e6c0539549f992... record old: [191] 010000bb030351fbe02d2d03d89fcf11943f99d361ae8914554a99ceb9e6c053... record new: [160] 0100009c030351fbe02d2d03d89fcf11943f99d361ae8914554a99ceb9e6c053... client: Filtered packet: [165] 16030100a00100009c030351fbe02d2d03d89fcf11943f99d361ae8914554a99... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [1] 00 handshake old: [181] fefdaa5832477bb8e38f491822f70bfc8cbbe4fdd2912296e7b25a3cc5115922... handshake new: [158] fefdaa5832477bb8e38f491822f70bfc8cbbe4fdd2912296e7b25a3cc5115922... record old: [193] 010000b500000000000000b5fefdaa5832477bb8e38f491822f70bfc8cbbe4fd... record new: [170] 0100009e000000000000009efefdaa5832477bb8e38f491822f70bfc8cbbe4fd... client: Filtered packet: [183] 16feff000000000000000000aa0100009e000000000000009efefdaa5832477b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [1] 00 handshake old: [184] fefdbff990753f21d08f63eaa4a53025b15059714755eaa03f02b1459840d736... handshake new: [153] fefdbff990753f21d08f63eaa4a53025b15059714755eaa03f02b1459840d736... record old: [196] 010000b800000000000000b8fefdbff990753f21d08f63eaa4a53025b1505971... record new: [165] 010000990000000000000099fefdbff990753f21d08f63eaa4a53025b1505971... client: Filtered packet: [178] 16feff000000000000000000a5010000990000000000000099fefdbff990753f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/3 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [5] 0002040100 handshake old: [180] 03030f24dccbacb07555a45d21a1a308660e4268c4f9fb1e74b675c33720853d... handshake new: [161] 03030f24dccbacb07555a45d21a1a308660e4268c4f9fb1e74b675c33720853d... record old: [184] 010000b403030f24dccbacb07555a45d21a1a308660e4268c4f9fb1e74b675c3... record new: [165] 010000a103030f24dccbacb07555a45d21a1a308660e4268c4f9fb1e74b675c3... client: Filtered packet: [170] 16030100a5010000a103030f24dccbacb07555a45d21a1a308660e4268c4f9fb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [5] 0002040100 handshake old: [187] 030356b2dc1d86b93f8152d319d2bfaccf55573afe069af47b2f8d0b4dc5d36d... handshake new: [160] 030356b2dc1d86b93f8152d319d2bfaccf55573afe069af47b2f8d0b4dc5d36d... record old: [191] 010000bb030356b2dc1d86b93f8152d319d2bfaccf55573afe069af47b2f8d0b... record new: [164] 010000a0030356b2dc1d86b93f8152d319d2bfaccf55573afe069af47b2f8d0b... client: Filtered packet: [169] 16030100a4010000a0030356b2dc1d86b93f8152d319d2bfaccf55573afe069a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [5] 0002040100 handshake old: [181] fefd03a430bdb3cd831024d90a571ab1381f2a7178a67a32b3635e70d7a8ef6b... handshake new: [162] fefd03a430bdb3cd831024d90a571ab1381f2a7178a67a32b3635e70d7a8ef6b... record old: [193] 010000b500000000000000b5fefd03a430bdb3cd831024d90a571ab1381f2a71... record new: [174] 010000a200000000000000a2fefd03a430bdb3cd831024d90a571ab1381f2a71... client: Filtered packet: [187] 16feff000000000000000000ae010000a200000000000000a2fefd03a430bdb3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [5] 0002040100 handshake old: [184] fefd8c713063ae5faf975b4c6baf45f0ddce65a40191d7c94e8f5d21d9381be9... handshake new: [157] fefd8c713063ae5faf975b4c6baf45f0ddce65a40191d7c94e8f5d21d9381be9... record old: [196] 010000b800000000000000b8fefd8c713063ae5faf975b4c6baf45f0ddce65a4... record new: [169] 0100009d000000000000009dfefd8c713063ae5faf975b4c6baf45f0ddce65a4... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefd8c713063ae... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/3 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [2] 0000 handshake old: [180] 0303d17c5386f2e729109fe8d47879261333464e5b3db58fd4f6fbdeb7d3cfea... handshake new: [158] 0303d17c5386f2e729109fe8d47879261333464e5b3db58fd4f6fbdeb7d3cfea... record old: [184] 010000b40303d17c5386f2e729109fe8d47879261333464e5b3db58fd4f6fbde... record new: [162] 0100009e0303d17c5386f2e729109fe8d47879261333464e5b3db58fd4f6fbde... client: Filtered packet: [167] 16030100a20100009e0303d17c5386f2e729109fe8d47879261333464e5b3db5... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [2] 0000 handshake old: [187] 030397195594aaa0c4055f2478f45358da69912e7534435af70d3cfb286bb62a... handshake new: [157] 030397195594aaa0c4055f2478f45358da69912e7534435af70d3cfb286bb62a... record old: [191] 010000bb030397195594aaa0c4055f2478f45358da69912e7534435af70d3cfb... record new: [161] 0100009d030397195594aaa0c4055f2478f45358da69912e7534435af70d3cfb... client: Filtered packet: [166] 16030100a10100009d030397195594aaa0c4055f2478f45358da69912e753443... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [2] 0000 handshake old: [181] fefdfb83f6c8356814c689d1ae4f98e668526911450423a5ab2bee74ed1afb9e... handshake new: [159] fefdfb83f6c8356814c689d1ae4f98e668526911450423a5ab2bee74ed1afb9e... record old: [193] 010000b500000000000000b5fefdfb83f6c8356814c689d1ae4f98e668526911... record new: [171] 0100009f000000000000009ffefdfb83f6c8356814c689d1ae4f98e668526911... client: Filtered packet: [184] 16feff000000000000000000ab0100009f000000000000009ffefdfb83f6c835... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [2] 0000 handshake old: [184] fefd7d07d9905c7a9e6dc31a21d42b8db736d7940795bf05c89acbda72bd5b29... handshake new: [154] fefd7d07d9905c7a9e6dc31a21d42b8db736d7940795bf05c89acbda72bd5b29... record old: [196] 010000b800000000000000b8fefd7d07d9905c7a9e6dc31a21d42b8db736d794... record new: [166] 0100009a000000000000009afefd7d07d9905c7a9e6dc31a21d42b8db736d794... client: Filtered packet: [179] 16feff000000000000000000a60100009a000000000000009afefd7d07d9905c... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/3 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 0002ffff handshake old: [180] 03030304bc2803bc4f42902682e85f317ed37e4df86027a27c115c0758bab28a... handshake new: [160] 03030304bc2803bc4f42902682e85f317ed37e4df86027a27c115c0758bab28a... record old: [184] 010000b403030304bc2803bc4f42902682e85f317ed37e4df86027a27c115c07... record new: [164] 010000a003030304bc2803bc4f42902682e85f317ed37e4df86027a27c115c07... client: Filtered packet: [169] 16030100a4010000a003030304bc2803bc4f42902682e85f317ed37e4df86027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/0 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [4] 0002ffff handshake old: [187] 03034274fa09b0384b5575039a99a27ef6e46234681b5caaeccdee2997e8a426... handshake new: [159] 03034274fa09b0384b5575039a99a27ef6e46234681b5caaeccdee2997e8a426... record old: [191] 010000bb03034274fa09b0384b5575039a99a27ef6e46234681b5caaeccdee29... record new: [163] 0100009f03034274fa09b0384b5575039a99a27ef6e46234681b5caaeccdee29... client: Filtered packet: [168] 16030100a30100009f03034274fa09b0384b5575039a99a27ef6e46234681b5c... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/1 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 0002ffff handshake old: [181] fefd79454b4b08ba629e3e05cef427448d671fae037f5313d6bf9be461e0b35a... handshake new: [161] fefd79454b4b08ba629e3e05cef427448d671fae037f5313d6bf9be461e0b35a... record old: [193] 010000b500000000000000b5fefd79454b4b08ba629e3e05cef427448d671fae... record new: [173] 010000a100000000000000a1fefd79454b4b08ba629e3e05cef427448d671fae... client: Filtered packet: [186] 16feff000000000000000000ad010000a100000000000000a1fefd79454b4b08... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/2 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [4] 0002ffff handshake old: [184] fefd1edfa1531dd47fbb8c1ad0d8913ef5f8493384018f2be627ce69a516f77b... handshake new: [156] fefd1edfa1531dd47fbb8c1ad0d8913ef5f8493384018f2be627ce69a516f77b... record old: [196] 010000b800000000000000b8fefd1edfa1531dd47fbb8c1ad0d8913ef5f84933... record new: [168] 0100009c000000000000009cfefd1edfa1531dd47fbb8c1ad0d8913ef5f84933... client: Filtered packet: [181] 16feff000000000000000000a80100009c000000000000009cfefd1edfa1531d... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/3 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [3] 000104 handshake old: [180] 03032b53ce1d0e8c25c124f545963f774a099be5c41e65bb71bb7c128186305f... handshake new: [159] 03032b53ce1d0e8c25c124f545963f774a099be5c41e65bb71bb7c128186305f... record old: [184] 010000b403032b53ce1d0e8c25c124f545963f774a099be5c41e65bb71bb7c12... record new: [163] 0100009f03032b53ce1d0e8c25c124f545963f774a099be5c41e65bb71bb7c12... client: Filtered packet: [168] 16030100a30100009f03032b53ce1d0e8c25c124f545963f774a099be5c41e65... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [3] 000104 handshake old: [187] 03035e430ffa161d654f419b7191cc8cf845029c7f899a4241cbf3b76aba0258... handshake new: [158] 03035e430ffa161d654f419b7191cc8cf845029c7f899a4241cbf3b76aba0258... record old: [191] 010000bb03035e430ffa161d654f419b7191cc8cf845029c7f899a4241cbf3b7... record new: [162] 0100009e03035e430ffa161d654f419b7191cc8cf845029c7f899a4241cbf3b7... client: Filtered packet: [167] 16030100a20100009e03035e430ffa161d654f419b7191cc8cf845029c7f899a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [3] 000104 handshake old: [181] fefd98696f82064b6ca78f68aade5753bcd756bc2f2d5a70d6fd8232bbbe3bf0... handshake new: [160] fefd98696f82064b6ca78f68aade5753bcd756bc2f2d5a70d6fd8232bbbe3bf0... record old: [193] 010000b500000000000000b5fefd98696f82064b6ca78f68aade5753bcd756bc... record new: [172] 010000a000000000000000a0fefd98696f82064b6ca78f68aade5753bcd756bc... client: Filtered packet: [185] 16feff000000000000000000ac010000a000000000000000a0fefd98696f8206... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [3] 000104 handshake old: [184] fefd2454fb1cc093d78b878748ccd7f16fdf2950f4ef7b6fa698bff4bfec75e9... handshake new: [155] fefd2454fb1cc093d78b878748ccd7f16fdf2950f4ef7b6fa698bff4bfec75e9... record old: [196] 010000b800000000000000b8fefd2454fb1cc093d78b878748ccd7f16fdf2950... record new: [167] 0100009b000000000000009bfefd2454fb1cc093d78b878748ccd7f16fdf2950... client: Filtered packet: [180] 16feff000000000000000000a70100009b000000000000009bfefd2454fb1cc0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/3 (2 ms) [----------] 20 tests from ExtensionTls12Plus/TlsExtensionTest12Plus (50 ms total) [----------] 6 tests from ExtensionTls12/TlsExtensionTest12 [ RUN ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/0 (10 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/1 (10 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/0 (3 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/1 (3 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/0 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/0 (11 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/1 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/1 (10 ms) [----------] 6 tests from ExtensionTls12/TlsExtensionTest12 (47 ms total) [----------] 20 tests from ExtensionTls13/TlsExtensionTest13 [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [38] 0024001d0020b0134f0dd48f28efce7412e5820f7d865ba4a9adb57206f99949... extension new: [2] 0024 handshake old: [180] 03031e86c9897bd7122a08f6e9d12038a7bf1fb57a670fa3753f51f91b350eb4... handshake new: [144] 03031e86c9897bd7122a08f6e9d12038a7bf1fb57a670fa3753f51f91b350eb4... record old: [184] 010000b403031e86c9897bd7122a08f6e9d12038a7bf1fb57a670fa3753f51f9... record new: [148] 0100009003031e86c9897bd7122a08f6e9d12038a7bf1fb57a670fa3753f51f9... client: Filtered packet: [153] 16030100940100009003031e86c9897bd7122a08f6e9d12038a7bf1fb57a670f... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/0 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [38] 0024001d0020d802b417ff755cb8ddda526f2147c0b75b0f2aec773e54a1d494... extension new: [2] 0024 handshake old: [181] fefd156864670f8160531b08042e7396ef2a732c81dda8bcc9a17623298525ea... handshake new: [145] fefd156864670f8160531b08042e7396ef2a732c81dda8bcc9a17623298525ea... record old: [193] 010000b500000000000000b5fefd156864670f8160531b08042e7396ef2a732c... record new: [157] 010000910000000000000091fefd156864670f8160531b08042e7396ef2a732c... client: Filtered packet: [170] 16feff0000000000000000009d010000910000000000000091fefd156864670f... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/0 (4 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/1 (4 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 020303 handshake old: [180] 0303087e95531137085a2f0d337abda3e2ab6c9c7ad64d5b5c10a794244aabe6... handshake new: [180] 0303087e95531137085a2f0d337abda3e2ab6c9c7ad64d5b5c10a794244aabe6... record old: [184] 010000b40303087e95531137085a2f0d337abda3e2ab6c9c7ad64d5b5c10a794... record new: [184] 010000b40303087e95531137085a2f0d337abda3e2ab6c9c7ad64d5b5c10a794... client: Filtered packet: [189] 16030100b8010000b40303087e95531137085a2f0d337abda3e2ab6c9c7ad64d... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [3] 02fefd handshake old: [181] fefde6982cc1b15f6ec4d7ea5849a651fcc12dcfacc72dd2932bbc5a85cf2930... handshake new: [181] fefde6982cc1b15f6ec4d7ea5849a651fcc12dcfacc72dd2932bbc5a85cf2930... record old: [193] 010000b500000000000000b5fefde6982cc1b15f6ec4d7ea5849a651fcc12dcf... record new: [193] 010000b500000000000000b5fefde6982cc1b15f6ec4d7ea5849a651fcc12dcf... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefde6982cc1b1... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/1 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 020303 handshake old: [180] 0303c2d0c27acd2ff5318771d22f2f5389840691a84da029e007981894784c87... handshake new: [180] 0303c2d0c27acd2ff5318771d22f2f5389840691a84da029e007981894784c87... record old: [184] 010000b40303c2d0c27acd2ff5318771d22f2f5389840691a84da029e0079818... record new: [184] 010000b40303c2d0c27acd2ff5318771d22f2f5389840691a84da029e0079818... client: Filtered packet: [189] 16030100b8010000b40303c2d0c27acd2ff5318771d22f2f5389840691a84da0... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [3] 02fefd handshake old: [181] fefd83e65b61003bb3fd85d1093bc925251695c90d5f89d87319e0aea8337261... handshake new: [181] fefd83e65b61003bb3fd85d1093bc925251695c90d5f89d87319e0aea8337261... record old: [193] 010000b500000000000000b5fefd83e65b61003bb3fd85d1093bc925251695c9... record new: [193] 010000b500000000000000b5fefd83e65b61003bb3fd85d1093bc925251695c9... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefd83e65b6100... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/1 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020303 handshake old: [508] 0303f02de049818847591267cb26a506290b8ca60361b100ac6c685aa47f8c9d... handshake new: [506] 0303f02de049818847591267cb26a506290b8ca60361b100ac6c685aa47f8c9d... record old: [512] 010001fc0303f02de049818847591267cb26a506290b8ca60361b100ac6c685a... record new: [510] 010001fa0303f02de049818847591267cb26a506290b8ca60361b100ac6c685a... client: Filtered packet: [515] 16030101fe010001fa0303f02de049818847591267cb26a506290b8ca60361b1... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 047f26fefd extension new: [3] 02fefd handshake old: [257] fefd4f153538792cc9343657727a3d0645bf22ead5328c5646c06665c8565666... handshake new: [255] fefd4f153538792cc9343657727a3d0645bf22ead5328c5646c06665c8565666... record old: [269] 010001010000000000000101fefd4f153538792cc9343657727a3d0645bf22ea... record new: [267] 010000ff00000000000000fffefd4f153538792cc9343657727a3d0645bf22ea... client: Filtered packet: [280] 16feff0000000000000000010b010000ff00000000000000fffefd4f15353879... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [508] 030378e87ce14203243f07ecee70c5525ae987b4e02e21c1906b47d7ee932deb... handshake new: [480] 030378e87ce14203243f07ecee70c5525ae987b4e02e21c1906b47d7ee932deb... record old: [512] 010001fc030378e87ce14203243f07ecee70c5525ae987b4e02e21c1906b47d7... record new: [484] 010001e0030378e87ce14203243f07ecee70c5525ae987b4e02e21c1906b47d7... client: Filtered packet: [489] 16030301e4010001e0030378e87ce14203243f07ecee70c5525ae987b4e02e21... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/0 (7 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefdc0e8b682c98722f8a81d07db2022b3363e9004f117a11454a3a374ec59e5... handshake new: [259] fefdc0e8b682c98722f8a81d07db2022b3363e9004f117a11454a3a374ec59e5... record old: [299] 0100011f000100000000011ffefdc0e8b682c98722f8a81d07db2022b3363e90... record new: [271] 010001030001000000000103fefdc0e8b682c98722f8a81d07db2022b3363e90... client: Filtered packet: [284] 16fefd0000000000000000010f010001030001000000000103fefdc0e8b682c9... extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefdc0e8b682c98722f8a81d07db2022b3363e9004f117a11454a3a374ec59e5... handshake new: [259] fefdc0e8b682c98722f8a81d07db2022b3363e9004f117a11454a3a374ec59e5... record old: [299] 0100011f000100000000011ffefdc0e8b682c98722f8a81d07db2022b3363e90... record new: [271] 010001030001000000000103fefdc0e8b682c98722f8a81d07db2022b3363e90... client: Filtered packet: [284] 16fefd0000000000000002010f010001030001000000000103fefdc0e8b682c9... extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefdc0e8b682c98722f8a81d07db2022b3363e9004f117a11454a3a374ec59e5... handshake new: [259] fefdc0e8b682c98722f8a81d07db2022b3363e9004f117a11454a3a374ec59e5... record old: [299] 0100011f000100000000011ffefdc0e8b682c98722f8a81d07db2022b3363e90... record new: [271] 010001030001000000000103fefdc0e8b682c98722f8a81d07db2022b3363e90... client: Filtered packet: [284] 16fefd0000000000000003010f010001030001000000000103fefdc0e8b682c9... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/1 (161 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [38] 0024001d0020223a6c005a4ebfd955d83140f54cba1e6fc345b136d42bd828cc... handshake old: [508] 030381be5df65a9552e501bbc1ab4b435ab265cdb813361fa0f525265bcfc0df... handshake new: [466] 030381be5df65a9552e501bbc1ab4b435ab265cdb813361fa0f525265bcfc0df... record old: [512] 010001fc030381be5df65a9552e501bbc1ab4b435ab265cdb813361fa0f52526... record new: [470] 010001d2030381be5df65a9552e501bbc1ab4b435ab265cdb813361fa0f52526... client: Filtered packet: [475] 16030301d6010001d2030381be5df65a9552e501bbc1ab4b435ab265cdb81336... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/0 (7 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [38] 0024001d00206a0dbb7c48e7cf73c7b63379de8eae3d7140ac14e07442a9c0de... handshake old: [287] fefdf60fa0a9cf50090a3d491f178bc8877b860cb9e984adf67a8a30087aca85... handshake new: [245] fefdf60fa0a9cf50090a3d491f178bc8877b860cb9e984adf67a8a30087aca85... record old: [299] 0100011f000100000000011ffefdf60fa0a9cf50090a3d491f178bc8877b860c... record new: [257] 010000f500010000000000f5fefdf60fa0a9cf50090a3d491f178bc8877b860c... client: Filtered packet: [270] 16fefd00000000000000000101010000f500010000000000f5fefdf60fa0a9cf... extension drop: [38] 0024001d00206a0dbb7c48e7cf73c7b63379de8eae3d7140ac14e07442a9c0de... handshake old: [287] fefdf60fa0a9cf50090a3d491f178bc8877b860cb9e984adf67a8a30087aca85... handshake new: [245] fefdf60fa0a9cf50090a3d491f178bc8877b860cb9e984adf67a8a30087aca85... record old: [299] 0100011f000100000000011ffefdf60fa0a9cf50090a3d491f178bc8877b860c... record new: [257] 010000f500010000000000f5fefdf60fa0a9cf50090a3d491f178bc8877b860c... client: Filtered packet: [270] 16fefd00000000000000020101010000f500010000000000f5fefdf60fa0a9cf... extension drop: [38] 0024001d00206a0dbb7c48e7cf73c7b63379de8eae3d7140ac14e07442a9c0de... handshake old: [287] fefdf60fa0a9cf50090a3d491f178bc8877b860cb9e984adf67a8a30087aca85... handshake new: [245] fefdf60fa0a9cf50090a3d491f178bc8877b860cb9e984adf67a8a30087aca85... record old: [299] 0100011f000100000000011ffefdf60fa0a9cf50090a3d491f178bc8877b860c... record new: [257] 010000f500010000000000f5fefdf60fa0a9cf50090a3d491f178bc8877b860c... client: Filtered packet: [270] 16fefd00000000000000030101010000f500010000000000f5fefdf60fa0a9cf... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/1 (160 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [6] 00040018001d handshake old: [508] 0303ff92e5ec7d924e5d75151e0b624e58acea553012d80565ea0f28075b0723... handshake new: [498] 0303ff92e5ec7d924e5d75151e0b624e58acea553012d80565ea0f28075b0723... record old: [512] 010001fc0303ff92e5ec7d924e5d75151e0b624e58acea553012d80565ea0f28... record new: [502] 010001f20303ff92e5ec7d924e5d75151e0b624e58acea553012d80565ea0f28... client: Filtered packet: [507] 16030301f6010001f20303ff92e5ec7d924e5d75151e0b624e58acea553012d8... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/0 (7 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [6] 00040018001d handshake old: [287] fefd10dc6130aadfebe5addc3d4c7749bd49a6a8bcc71a3fb97431b66b708c9e... handshake new: [277] fefd10dc6130aadfebe5addc3d4c7749bd49a6a8bcc71a3fb97431b66b708c9e... record old: [299] 0100011f000100000000011ffefd10dc6130aadfebe5addc3d4c7749bd49a6a8... record new: [289] 010001150001000000000115fefd10dc6130aadfebe5addc3d4c7749bd49a6a8... client: Filtered packet: [302] 16fefd00000000000000000121010001150001000000000115fefd10dc6130aa... extension drop: [6] 00040018001d handshake old: [287] fefd10dc6130aadfebe5addc3d4c7749bd49a6a8bcc71a3fb97431b66b708c9e... handshake new: [277] fefd10dc6130aadfebe5addc3d4c7749bd49a6a8bcc71a3fb97431b66b708c9e... record old: [299] 0100011f000100000000011ffefd10dc6130aadfebe5addc3d4c7749bd49a6a8... record new: [289] 010001150001000000000115fefd10dc6130aadfebe5addc3d4c7749bd49a6a8... client: Filtered packet: [302] 16fefd00000000000000020121010001150001000000000115fefd10dc6130aa... extension drop: [6] 00040018001d handshake old: [287] fefd10dc6130aadfebe5addc3d4c7749bd49a6a8bcc71a3fb97431b66b708c9e... handshake new: [277] fefd10dc6130aadfebe5addc3d4c7749bd49a6a8bcc71a3fb97431b66b708c9e... record old: [299] 0100011f000100000000011ffefd10dc6130aadfebe5addc3d4c7749bd49a6a8... record new: [289] 010001150001000000000115fefd10dc6130aadfebe5addc3d4c7749bd49a6a8... client: Filtered packet: [302] 16fefd00000000000000030121010001150001000000000115fefd10dc6130aa... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/1 (159 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [2] 0000 handshake old: [180] 03038284a82574a30980222c34242e58ad35928025dd1257d0554dfefa79148e... handshake new: [179] 03038284a82574a30980222c34242e58ad35928025dd1257d0554dfefa79148e... record old: [184] 010000b403038284a82574a30980222c34242e58ad35928025dd1257d0554dfe... record new: [183] 010000b303038284a82574a30980222c34242e58ad35928025dd1257d0554dfe... client: Filtered packet: [188] 16030100b7010000b303038284a82574a30980222c34242e58ad35928025dd12... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [2] 0000 handshake old: [181] fefd516ae3a655b1b4947c98486924e2115c607b4f1da5b0873e31d48cbe1a5c... handshake new: [180] fefd516ae3a655b1b4947c98486924e2115c607b4f1da5b0873e31d48cbe1a5c... record old: [193] 010000b500000000000000b5fefd516ae3a655b1b4947c98486924e2115c607b... record new: [192] 010000b400000000000000b4fefd516ae3a655b1b4947c98486924e2115c607b... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefd516ae3a655... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/1 (2 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.OddVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 000100 handshake old: [180] 0303ce98b4843526e80d769be62f7d0335b10b40c904105c86f62215ee5fb18e... handshake new: [180] 0303ce98b4843526e80d769be62f7d0335b10b40c904105c86f62215ee5fb18e... record old: [184] 010000b40303ce98b4843526e80d769be62f7d0335b10b40c904105c86f62215... record new: [184] 010000b40303ce98b4843526e80d769be62f7d0335b10b40c904105c86f62215... client: Filtered packet: [189] 16030100b8010000b40303ce98b4843526e80d769be62f7d0335b10b40c90410... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.OddVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.OddVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 027f26 extension new: [3] 000100 handshake old: [181] fefd8901cf6ca19618d2fda6d7eb16d2dfe15876bd47a255695c7d07bc11d1a0... handshake new: [181] fefd8901cf6ca19618d2fda6d7eb16d2dfe15876bd47a255695c7d07bc11d1a0... record old: [193] 010000b500000000000000b5fefd8901cf6ca19618d2fda6d7eb16d2dfe15876... record new: [193] 010000b500000000000000b5fefd8901cf6ca19618d2fda6d7eb16d2dfe15876... client: Filtered packet: [206] 16feff000000000000000000c1010000b500000000000000b5fefd8901cf6ca1... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.OddVersionList/1 (2 ms) [----------] 20 tests from ExtensionTls13/TlsExtensionTest13 (541 ms total) [----------] 3 tests from BogusExtensionStream/TlsBogusExtensionTestPre13 [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 030178c9d675b491d868b6a002338f933c95ec699f10f8ee39a58eabfb107311... handshake new: [97] 030178c9d675b491d868b6a002338f933c95ec699f10f8ee39a58eabfb107311... record old: [713] 0200005d030178c9d675b491d868b6a002338f933c95ec699f10f8ee39a58eab... record new: [717] 02000061030178c9d675b491d868b6a002338f933c95ec699f10f8ee39a58eab... server: Filtered packet: [722] 16030102cd02000061030178c9d675b491d868b6a002338f933c95ec699f10f8... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 (3 ms) [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 030286c62e3fc22be2a6a96a6df43c2c66f267a7c24b285a5696cce70dd031ac... handshake new: [97] 030286c62e3fc22be2a6a96a6df43c2c66f267a7c24b285a5696cce70dd031ac... record old: [713] 0200005d030286c62e3fc22be2a6a96a6df43c2c66f267a7c24b285a5696cce7... record new: [717] 02000061030286c62e3fc22be2a6a96a6df43c2c66f267a7c24b285a5696cce7... server: Filtered packet: [722] 16030202cd02000061030286c62e3fc22be2a6a96a6df43c2c66f267a7c24b28... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 (3 ms) [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0303c79c29511ab0ba57b4ce78a85ca2294a5c76277066898c38f8859180ca68... handshake new: [97] 0303c79c29511ab0ba57b4ce78a85ca2294a5c76277066898c38f8859180ca68... record old: [715] 0200005d0303c79c29511ab0ba57b4ce78a85ca2294a5c76277066898c38f885... record new: [719] 020000610303c79c29511ab0ba57b4ce78a85ca2294a5c76277066898c38f885... server: Filtered packet: [724] 16030302cf020000610303c79c29511ab0ba57b4ce78a85ca2294a5c76277066... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/2 (3 ms) [----------] 3 tests from BogusExtensionStream/TlsBogusExtensionTestPre13 (9 ms total) [----------] 2 tests from BogusExtensionDatagram/TlsBogusExtensionTestPre13 [ RUN ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] feff789e542c86857720df0f793f69f41c3cd0afef9c821e85428596641f4553... handshake new: [97] feff789e542c86857720df0f793f69f41c3cd0afef9c821e85428596641f4553... record old: [105] 0200005d000000000000005dfeff789e542c86857720df0f793f69f41c3cd0af... record new: [109] 020000610000000000000061feff789e542c86857720df0f793f69f41c3cd0af... server: Filtered packet: [801] 16feff0000000000000000006d020000610000000000000061feff789e542c86... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 (3 ms) [ RUN ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] fefd0a7c5baa60b05b5fb0643acca8acfb11e9a5eefc45aaf138f03041a5d831... handshake new: [97] fefd0a7c5baa60b05b5fb0643acca8acfb11e9a5eefc45aaf138f03041a5d831... record old: [105] 0200005d000000000000005dfefd0a7c5baa60b05b5fb0643acca8acfb11e9a5... record new: [109] 020000610000000000000061fefd0a7c5baa60b05b5fb0643acca8acfb11e9a5... server: Filtered packet: [803] 16fefd0000000000000000006d020000610000000000000061fefd0a7c5baa60... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 (3 ms) [----------] 2 tests from BogusExtensionDatagram/TlsBogusExtensionTestPre13 (6 ms total) [----------] 18 tests from BogusExtension13/TlsBogusExtensionTest13 [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 030323ba9ea5178de05ef28e1d689c7b561cc0592e91df36b59face68887aece... handshake new: [90] 030323ba9ea5178de05ef28e1d689c7b561cc0592e91df36b59face68887aece... record old: [90] 02000056030323ba9ea5178de05ef28e1d689c7b561cc0592e91df36b59face6... record new: [94] 0200005a030323ba9ea5178de05ef28e1d689c7b561cc0592e91df36b59face6... server: Filtered packet: [778] 160303005e0200005a030323ba9ea5178de05ef28e1d689c7b561cc0592e91df... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] fefd2f7666cbdb0588ca465e4422ac146248bac70af2e092a81bd3437aeee9f4... handshake new: [90] fefd2f7666cbdb0588ca465e4422ac146248bac70af2e092a81bd3437aeee9f4... record old: [98] 020000560000000000000056fefd2f7666cbdb0588ca465e4422ac146248bac7... record new: [102] 0200005a000000000000005afefd2f7666cbdb0588ca465e4422ac146248bac7... server: Filtered packet: [892] 16fefd000000000000000000660200005a000000000000005afefd2f7666cbdb... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000280026000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a020000560303fdb7e2aa29003da61ac3715c65baa3208823d592dd... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [52] 0800002800010000000000280026000a00140012001d00170018001901000101... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefd190fbffd63... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a020000560303125b341d54ad2e353b7de225d5c0f7cea5348cdf0e... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [457] 0b0001bd00020000000001bd000001b90001b0308201ac30820115a003020102... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefdf29ed8b550... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [692] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [696] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [813] 160303005a020000560303eb2fa3b6d9c86d6e55e82bb31f516c01a1f15172a4... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [43] 0d00001f000200000000001f00001c000d001800160403050306030203080408... record new: [47] 0d0000230002000000000023000020000d001800160403050306030203080408... server: Filtered packet: [957] 16fefd00000000000000000062020000560000000000000056fefde9c7ff4b47... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [172] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... handshake new: [176] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [176] 020000ac0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... record new: [180] 020000b00303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [185] 16030300b4020000b00303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/0 (7 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [172] fefdcf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... handshake new: [176] fefdcf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [184] 020000ac00000000000000acfefdcf21ad74e59a6111be1d8c021e65b891c2a2... record new: [188] 020000b000000000000000b0fefdcf21ad74e59a6111be1d8c021e65b891c2a2... server: Filtered packet: [201] 16fefd000000000000000000bc020000b000000000000000b0fefdcf21ad74e5... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/1 (7 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000280026000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a02000056030326c084d9a05ed1dea8ed0e0e61900ac2187c0f8ed8... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [36] 0022000a00140012001d00170018001901000101010201030104001c00024001... handshake new: [40] 0026000a00140012001d00170018001901000101010201030104001c00024001... record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [52] 0800002800010000000000280026000a00140012001d00170018001901000101... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefd8d80b481cb... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionEncryptedExtensions/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [661] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [778] 160303005a020000560303e14c680f2664e84665679fc70e5b1fd55ccfe60b28... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [457] 0b0001bd00020000000001bd000001b90001b0308201ac30820115a003020102... server: Filtered packet: [892] 16fefd00000000000000000062020000560000000000000056fefdf95260b152... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificate/1 (3 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [692] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [696] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [813] 160303005a0200005603037e73be6d1f040c7e5d11e075361f63aaa66c5e954d... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/0 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [43] 0d00001f000200000000001f00001c000d001800160403050306030203080408... record new: [47] 0d0000230002000000000023000020000d001800160403050306030203080408... server: Filtered packet: [957] 16fefd00000000000000000062020000560000000000000056fefd97589484ad... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddVersionExtensionCertificateRequest/1 (4 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED handshake old: [193] 0002a3005e8882f502000000b222f45446e1425493170384e9000000006aa594... handshake new: [197] 0002a3005e8882f502000000b222f45446e1425493170384e9000000006aa594... record old: [197] 040000c10002a3005e8882f502000000b222f45446e1425493170384e9000000... record new: [201] 040000c50002a3005e8882f502000000b222f45446e1425493170384e9000000... server: Filtered packet: [223] 17030300da5945c5efef8cc55074876b4c621b20b9f82a20159392ce1cf11813... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/0 (9 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED handshake old: [193] 0002a300366d3f2302000000b256a0b37889222d9eb4451ad6000000001569c7... handshake new: [197] 0002a300366d3f2302000000b256a0b37889222d9eb4451ad6000000001569c7... record old: [205] 040000c100050000000000c10002a300366d3f2302000000b256a0b37889222d... record new: [209] 040000c500050000000000c50002a300366d3f2302000000b256a0b37889222d... server: Filtered packet: [231] 2fdc3e00e230120b36d25b4577c724edd5510384aea7ae2bf65d810dd16e46bc... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/1 (9 ms) [----------] 18 tests from BogusExtension13/TlsBogusExtensionTest13 (87 ms total) [----------] 52 tests from StreamOnly/TlsConnectStream [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/0 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/1 Version: TLS 1.2 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/2 Version: TLS 1.1 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/2 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/3 Version: TLS 1.0 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/3 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ShortRead/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [27] e255ed8cb590718236b78aaf8d8903ce55031dfe77c38737e14308 record new: [27] e255ed8cb590718236b78aaf8d8903ce55031dfe77c38737e14309 client: Filtered packet: [32] 170303001be255ed8cb590718236b78aaf8d8903ce55031dfe77c38737e14309 server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [34] 000000000000000143b193b65c8727cb862bd07ece5f9e198408746a3dd68ebf... record new: [34] 000000000000000143b193b65c8727cb862bd07ece5f9e198408746a3dd68ebf... client: Filtered packet: [39] 1703030022000000000000000143b193b65c8727cb862bd07ece5f9e19840874... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [48] 84a7d2984e061b23561b7b90001b871b748e40043c2bf6376f12d14c8e152647... record new: [48] 84a7d2984e061b23561b7b90001b871b748e40043c2bf6376f12d14c8e152647... client: Filtered packet: [53] 170302003084a7d2984e061b23561b7b90001b871b748e40043c2bf6376f12d1... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [32] f692fed4eb42e24bbcab5ee32b27e864c60369bc5726e888c57f1f8e703dde85 record new: [32] f692fed4eb42e24bbcab5ee32b27e864c60369bc5726e888c57f1f8e703dde86 client: Filtered packet: [37] 1703010020f692fed4eb42e24bbcab5ee32b27e864c60369bc5726e888c57f1f... record old: [32] 88f17b109c8680bfaaedc1fa5de0bbd24cc0a4368c298e1d3fe78bd57ea9b31d record new: [32] 88f17b109c8680bfaaedc1fa5de0bbd24cc0a4368c298e1d3fe78bd57ea9b31e client: Filtered packet: [37] 170301002088f17b109c8680bfaaedc1fa5de0bbd24cc0a4368c298e1d3fe78b... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/3 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/3 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/3 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/3 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 0303d518f12c047ec3c3913f30f8d7240eda505c6ef6d907914b7bfa2b571b67... handshake new: [92] 0303d518f12c047ec3c3913f30f8d7240eda505c6ef6d907914b7bfa2b571b67... record old: [96] 0200005c0303d518f12c047ec3c3913f30f8d7240eda505c6ef6d907914b7bfa... record new: [96] 0200005c0303d518f12c047ec3c3913f30f8d7240eda505c6ef6d907914b7bfa... server: Filtered packet: [199] 16030300600200005c0303d518f12c047ec3c3913f30f8d7240eda505c6ef6d9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/0 (8 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03031751deb302685dbffca118c714f388deac7d9ea391d69b1aba21711de5de... handshake new: [89] 03031751deb302685dbffca118c714f388deac7d9ea391d69b1aba21711de5de... record old: [93] 0200005903031751deb302685dbffca118c714f388deac7d9ea391d69b1aba21... record new: [93] 0200005903031751deb302685dbffca118c714f388deac7d9ea391d69b1aba21... server: Filtered packet: [173] 160303005d0200005903031751deb302685dbffca118c714f388deac7d9ea391... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/1 (7 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 0302f9eca0c42b42aba5ace8d28e91d041c5d22959d5291ab05fa3eed12ec939... handshake new: [89] 0302f9eca0c42b42aba5ace8d28e91d041c5d22959d5291ab05fa3eed12ec939... record old: [93] 020000590302f9eca0c42b42aba5ace8d28e91d041c5d22959d5291ab05fa3ee... record new: [93] 020000590302f9eca0c42b42aba5ace8d28e91d041c5d22959d5291ab05fa3ee... server: Filtered packet: [173] 160302005d020000590302f9eca0c42b42aba5ace8d28e91d041c5d22959d529... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/2 (7 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03013a7a1bd6a237d064c298064e918f5fb81147974034f05628a703bbccfa70... handshake new: [89] 03013a7a1bd6a237d064c298064e918f5fb81147974034f05628a703bbccfa70... record old: [93] 0200005903013a7a1bd6a237d064c298064e918f5fb81147974034f05628a703... record new: [93] 0200005903013a7a1bd6a237d064c298064e918f5fb81147974034f05628a703... server: Filtered packet: [157] 160301005d0200005903013a7a1bd6a237d064c298064e918f5fb81147974034... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/3 (7 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RENEGOTIATION_NOT_ALLOWED: Renegotiation is not allowed on this SSL socket. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 (1 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RENEGOTIATION_NOT_ALLOWED: Renegotiation is not allowed on this SSL socket. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 (1 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/1 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/2 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/0 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 Version: TLS 1.0 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 (1 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 (4 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/3 (4 ms) [----------] 52 tests from StreamOnly/TlsConnectStream (178 ms total) [----------] 6 tests from HelloRetryRequestKeyExchangeTests/TlsKeyExchange13 [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/0 (8 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/1 (9 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/0 (8 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/1 (8 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/0 (10 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/1 (10 ms) [----------] 6 tests from HelloRetryRequestKeyExchangeTests/TlsKeyExchange13 (53 ms total) [----------] 6 tests from HelloRetryRequestAgentTests/HelloRetryRequestAgentTest [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_RETRY_REQUEST: SSL received an unexpected Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/0 (5 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [77] 16030400000000000000000040020000340000000000000034fefdcf21ad74e5... Process message: [77] 16030400000000000000010040020000340001000000000034fefdcf21ad74e5... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_RETRY_REQUEST: SSL received an unexpected Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/1 (5 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/0 (0 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [77] 16030400000000000000000040020000340000000000000034fefdcf21ad74e5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/1 (0 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [55] 16030400320200002e0303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/0 (1 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [71] 1603040000000000000000003a0200002e000000000000002efefdcf21ad74e5... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/1 (0 ms) [----------] 6 tests from HelloRetryRequestAgentTests/HelloRetryRequestAgentTest (11 ms total) [----------] 6 tests from DatagramHolddown/TlsHolddownTest [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Expiring holddown timer server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/0 (4 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Expiring holddown timer client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/1 (4 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Expiring holddown timer client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/2 (3 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/0 (9 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/1 (7 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/2 (7 ms) [----------] 6 tests from DatagramHolddown/TlsHolddownTest (34 ms total) [----------] 136 tests from GenericStream/TlsConnectGenericResumption [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/7 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/6 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/7 (6 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/3 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/5 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/6 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/7 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/0 (14 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/2 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/3 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/4 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/5 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/6 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/0 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/1 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/2 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/4 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/6 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/6 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/7 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/7 (7 ms) [----------] 136 tests from GenericStream/TlsConnectGenericResumption (1161 ms total) [----------] 102 tests from GenericDatagram/TlsConnectGenericResumption [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 (6 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/3 (7 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/5 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/0 (14 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/3 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/4 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/5 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/2 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/4 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 (8 ms) [----------] 102 tests from GenericDatagram/TlsConnectGenericResumption (894 ms total) [----------] 20 tests from GenericStream/TlsConnectGenericResumptionToken [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 (7 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/3 (9 ms) [----------] 20 tests from GenericStream/TlsConnectGenericResumptionToken (172 ms total) [----------] 15 tests from GenericDatagram/TlsConnectGenericResumptionToken [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 (9 ms) [----------] 15 tests from GenericDatagram/TlsConnectGenericResumptionToken (132 ms total) [----------] 2 tests from GenericDatagram/TlsConnectTls13ResumptionToken [ RUN ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/1 (10 ms) [----------] 2 tests from GenericDatagram/TlsConnectTls13ResumptionToken (19 ms total) [----------] 60 tests from GenericMasking/VariantSuiteTest [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/0 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/1 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/2 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/3 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/4 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/5 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/0 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/1 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/2 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/3 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/4 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/5 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/0 (1 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/5 (0 ms) [----------] 60 tests from GenericMasking/VariantSuiteTest (2 ms total) [----------] 3 tests from GenericMasking/SuiteTest [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/0 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/0 (0 ms) [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/1 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/1 (0 ms) [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/2 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/2 (0 ms) [----------] 3 tests from GenericMasking/SuiteTest (0 ms total) [----------] 2 tests from GenericMasking/VariantTest [ RUN ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/0 [ OK ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/0 (0 ms) [ RUN ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/1 [ OK ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/1 (0 ms) [----------] 2 tests from GenericMasking/VariantTest (0 ms total) [----------] 88 tests from TlsPadding/TlsPaddingTest [ RUN ] TlsPadding/TlsPaddingTest.Correct/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.Correct/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.Correct/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.Correct/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.Correct/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.Correct/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.Correct/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.Correct/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410101 [ OK ] TlsPadding/TlsPaddingTest.Correct/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.Correct/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414100 [ OK ] TlsPadding/TlsPaddingTest.Correct/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/19 Content length=287 padding length=0 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/0 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/2 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/4 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/6 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/8 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/8 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/12 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/14 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/15 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/16 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/17 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/18 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/19 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/21 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fffefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410f0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fdfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410d0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fcfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410c0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f2f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0f0e [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0d0c [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0c0b [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 (0 ms) [----------] 88 tests from TlsPadding/TlsPaddingTest (2 ms total) [----------] 8 tests from SkipTls10/TlsSkipTest [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 020000570301adf56bdd8fd41d792ccae7f6cf320d0065c2f0b0fe5817dd511f... record new: [95] 020000570301adf56bdd8fd41d792ccae7f6cf320d0065c2f0b0fe5817dd511f... server: Filtered packet: [100] 160301005f020000570301adf56bdd8fd41d792ccae7f6cf320d0065c2f0b0fe... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (2 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d0301102b1b4179c30f21a8e5852b9a5c44800d8a1d3fe87f26e57baf... record new: [271] 0200005d0301102b1b4179c30f21a8e5852b9a5c44800d8a1d3fe87f26e57baf... server: Filtered packet: [276] 160301010f0200005d0301102b1b4179c30f21a8e5852b9a5c44800d8a1d3fe8... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d030156f0e9a9367e0af8fd2082418ac716a2ada9ef14a13b64d8ff26... record new: [271] 0200005d030156f0e9a9367e0af8fd2082418ac716a2ada9ef14a13b64d8ff26... server: Filtered packet: [276] 160301010f0200005d030156f0e9a9367e0af8fd2082418ac716a2ada9ef14a1... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [532] 0200005d03016a2c8b00efbf229072076dd96f79c69a7478125c7edcb3ea16fb... record new: [215] 0200005d03016a2c8b00efbf229072076dd96f79c69a7478125c7edcb3ea16fb... server: Filtered packet: [220] 16030100d70200005d03016a2c8b00efbf229072076dd96f79c69a7478125c7e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (4 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [713] 0200005d0301514563844e330920a3eae4fcc82673bdac30dd7b25f8883f36d7... record new: [543] 0200005d0301514563844e330920a3eae4fcc82673bdac30dd7b25f8883f36d7... server: Filtered packet: [548] 160301021f0200005d0301514563844e330920a3eae4fcc82673bdac30dd7b25... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [532] 0200005d030160ca147981c3f37627e3e0d6b7f187c31e23342ad980788559bd... record new: [418] 0200005d030160ca147981c3f37627e3e0d6b7f187c31e23342ad980788559bd... server: Filtered packet: [423] 16030101a20200005d030160ca147981c3f37627e3e0d6b7f187c31e23342ad9... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (4 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03015983d3ab7185bdcab2421565cc411b9cf56e7dda37ae3b5f89f5... record new: [271] 0200005d03015983d3ab7185bdcab2421565cc411b9cf56e7dda37ae3b5f89f5... Dropping handshake: 12 record old: [271] 0200005d03015983d3ab7185bdcab2421565cc411b9cf56e7dda37ae3b5f89f5... record new: [101] 0200005d03015983d3ab7185bdcab2421565cc411b9cf56e7dda37ae3b5f89f5... server: Filtered packet: [106] 16030100650200005d03015983d3ab7185bdcab2421565cc411b9cf56e7dda37... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (3 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 0200005d03012741f8bbdc3c4743f6027c15bd63d2d63c8dc8dbeecac90c4d63... record new: [214] 0200005d03012741f8bbdc3c4743f6027c15bd63d2d63c8dc8dbeecac90c4d63... Dropping handshake: 12 record old: [214] 0200005d03012741f8bbdc3c4743f6027c15bd63d2d63c8dc8dbeecac90c4d63... record new: [101] 0200005d03012741f8bbdc3c4743f6027c15bd63d2d63c8dc8dbeecac90c4d63... server: Filtered packet: [106] 16030100650200005d03012741f8bbdc3c4743f6027c15bd63d2d63c8dc8dbee... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (4 ms) [----------] 8 tests from SkipTls10/TlsSkipTest (26 ms total) [----------] 32 tests from SkipVariants/TlsSkipTest [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 020000570302cc685c008557b7cd9d8f7dc408f60adc39890261e97faabd68ef... record new: [95] 020000570302cc685c008557b7cd9d8f7dc408f60adc39890261e97faabd68ef... server: Filtered packet: [100] 160302005f020000570302cc685c008557b7cd9d8f7dc408f60adc39890261e9... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 020000570303979e56704b0d92b3a802dedd5ec022678e52568e2f69ba702e21... record new: [95] 020000570303979e56704b0d92b3a802dedd5ec022678e52568e2f69ba702e21... server: Filtered packet: [100] 160303005f020000570303979e56704b0d92b3a802dedd5ec022678e52568e2f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [150] 16feff00000000000000000063020000570000000000000057feffe44d8d4af7... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [150] 16fefd00000000000000000063020000570000000000000057fefdc47aef8550... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03022b5c4817a2510bf8a116e16715b7845499b0de78cd776003cda3... record new: [271] 0200005d03022b5c4817a2510bf8a116e16715b7845499b0de78cd776003cda3... server: Filtered packet: [276] 160302010f0200005d03022b5c4817a2510bf8a116e16715b7845499b0de78cd... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d03033915ccbbe5fa04177fbf85be3bcfa619bbc6e6d68cea7f279347... record new: [273] 0200005d03033915ccbbe5fa04177fbf85be3bcfa619bbc6e6d68cea7f279347... server: Filtered packet: [278] 16030301110200005d03033915ccbbe5fa04177fbf85be3bcfa619bbc6e6d68c... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [178] 0c0000a600010000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [347] 16feff000000000000000000690200005d000000000000005dfeff3c3f98acb5... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [180] 0c0000a800010000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [349] 16fefd000000000000000000690200005d000000000000005dfefde242cd4000... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d030293474b5f57563a767fe30684edbd2d7ce42c93cb3e4ca649fbc4... record new: [271] 0200005d030293474b5f57563a767fe30684edbd2d7ce42c93cb3e4ca649fbc4... server: Filtered packet: [276] 160302010f0200005d030293474b5f57563a767fe30684edbd2d7ce42c93cb3e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d0303a293badf8e3e9dc9d54a0d36047fc952a823f2080313c396e9bd... record new: [273] 0200005d0303a293badf8e3e9dc9d54a0d36047fc952a823f2080313c396e9bd... server: Filtered packet: [278] 16030301110200005d0303a293badf8e3e9dc9d54a0d36047fc952a823f20803... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [178] 0c0000a600010000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [347] 16feff000000000000000000690200005d000000000000005dfeffe7594059a8... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [180] 0c0000a800010000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [349] 16fefd000000000000000000690200005d000000000000005dfefd27c7f71aa3... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 0200005d03027ac0fcedef36c21924ba243a73b95fc6cca40cd98554b6500e90... record new: [214] 0200005d03027ac0fcedef36c21924ba243a73b95fc6cca40cd98554b6500e90... server: Filtered packet: [219] 16030200d60200005d03027ac0fcedef36c21924ba243a73b95fc6cca40cd985... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [532] 0200005d03037cd3f41ea4d54eface8b08641039e0d21c1dd55001829b4a743d... record new: [215] 0200005d03037cd3f41ea4d54eface8b08641039e0d21c1dd55001829b4a743d... server: Filtered packet: [220] 16030300d70200005d03037cd3f41ea4d54eface8b08641039e0d21c1dd55001... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [121] 0c00006d000200000000006d03001d20026e0bc3402310e4ffda21554fce1b02... record new: [121] 0c00006d000100000000006d03001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [290] 16feff000000000000000000690200005d000000000000005dfeff04f6fe6575... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [123] 0c00006f000200000000006f03001d20026e0bc3402310e4ffda21554fce1b02... record new: [123] 0c00006f000100000000006f03001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [292] 16fefd000000000000000000690200005d000000000000005dfefdb8df1cd9c1... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [713] 0200005d03026ac13719c58cfd842c96dc66950b42891ea430efe4408f9681e6... record new: [543] 0200005d03026ac13719c58cfd842c96dc66950b42891ea430efe4408f9681e6... server: Filtered packet: [548] 160302021f0200005d03026ac13719c58cfd842c96dc66950b42891ea430efe4... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [715] 0200005d030365ef781c796886a90a4b0e428d13e5df9e943f1ff7a8d93b32af... record new: [543] 0200005d030365ef781c796886a90a4b0e428d13e5df9e943f1ff7a8d93b32af... server: Filtered packet: [548] 160303021f0200005d030365ef781c796886a90a4b0e428d13e5df9e943f1ff7... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [619] 16feff000000000000000000690200005d000000000000005dfeffbacc2d0269... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [619] 16fefd000000000000000000690200005d000000000000005dfefd96d9154ee8... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [530] 0200005d0302a26dd4535f67ec8e0ef55c09217b94d4258064b52de36d848562... record new: [418] 0200005d0302a26dd4535f67ec8e0ef55c09217b94d4258064b52de36d848562... server: Filtered packet: [423] 16030201a20200005d0302a26dd4535f67ec8e0ef55c09217b94d4258064b52d... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [533] 0200005d030368f89911fd71344edab42ebbbe409ba57ae2ba60a18b0cbff70c... record new: [418] 0200005d030368f89911fd71344edab42ebbbe409ba57ae2ba60a18b0cbff70c... server: Filtered packet: [423] 16030301a20200005d030368f89911fd71344edab42ebbbe409ba57ae2ba60a1... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [121] 0c00006d000200000000006d03001d20026e0bc3402310e4ffda21554fce1b02... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [494] 16feff000000000000000000690200005d000000000000005dfeff8502852de0... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [123] 0c00006f000200000000006f03001d20026e0bc3402310e4ffda21554fce1b02... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [494] 16fefd000000000000000000690200005d000000000000005dfefd4f763abfbd... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d030232b557ac2187f0abdc40323d19386b5353736124a848dd4deb43... record new: [271] 0200005d030232b557ac2187f0abdc40323d19386b5353736124a848dd4deb43... Dropping handshake: 12 record old: [271] 0200005d030232b557ac2187f0abdc40323d19386b5353736124a848dd4deb43... record new: [101] 0200005d030232b557ac2187f0abdc40323d19386b5353736124a848dd4deb43... server: Filtered packet: [106] 16030200650200005d030232b557ac2187f0abdc40323d19386b5353736124a8... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d03039939eb9ebe7b7b6428a7ecb3ae0a39564858e4b6833990480afd... record new: [273] 0200005d03039939eb9ebe7b7b6428a7ecb3ae0a39564858e4b6833990480afd... Dropping handshake: 12 record old: [273] 0200005d03039939eb9ebe7b7b6428a7ecb3ae0a39564858e4b6833990480afd... record new: [101] 0200005d03039939eb9ebe7b7b6428a7ecb3ae0a39564858e4b6833990480afd... server: Filtered packet: [106] 16030300650200005d03039939eb9ebe7b7b6428a7ecb3ae0a39564858e4b683... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [178] 0c0000a600010000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [178] 0c0000a600010000000000a603001d20026e0bc3402310e4ffda21554fce1b02... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16feff000000000000000000690200005d000000000000005dfeff4461264c91... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [180] 0c0000a800010000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [180] 0c0000a800010000000000a803001d20026e0bc3402310e4ffda21554fce1b02... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16fefd000000000000000000690200005d000000000000005dfefd6c32959909... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (3 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 0200005d0302bb002588cca48e1f6f0427b45a6f4481555ab0c5cfa2bacff031... record new: [214] 0200005d0302bb002588cca48e1f6f0427b45a6f4481555ab0c5cfa2bacff031... Dropping handshake: 12 record old: [214] 0200005d0302bb002588cca48e1f6f0427b45a6f4481555ab0c5cfa2bacff031... record new: [101] 0200005d0302bb002588cca48e1f6f0427b45a6f4481555ab0c5cfa2bacff031... server: Filtered packet: [106] 16030200650200005d0302bb002588cca48e1f6f0427b45a6f4481555ab0c5cf... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [533] 0200005d0303feff6044354dcc6896497218b2b1b07d23991181b606485c2139... record new: [216] 0200005d0303feff6044354dcc6896497218b2b1b07d23991181b606485c2139... Dropping handshake: 12 record old: [216] 0200005d0303feff6044354dcc6896497218b2b1b07d23991181b606485c2139... record new: [101] 0200005d0303feff6044354dcc6896497218b2b1b07d23991181b606485c2139... server: Filtered packet: [106] 16030300650200005d0303feff6044354dcc6896497218b2b1b07d23991181b6... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [121] 0c00006d000200000000006d03001d20026e0bc3402310e4ffda21554fce1b02... record new: [121] 0c00006d000100000000006d03001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [121] 0c00006d000100000000006d03001d20026e0bc3402310e4ffda21554fce1b02... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16feff000000000000000000690200005d000000000000005dfeffdda1941680... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [122] 0c00006e000200000000006e03001d20026e0bc3402310e4ffda21554fce1b02... record new: [122] 0c00006e000100000000006e03001d20026e0bc3402310e4ffda21554fce1b02... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [122] 0c00006e000100000000006e03001d20026e0bc3402310e4ffda21554fce1b02... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16fefd000000000000000000690200005d000000000000005dfefdb398a7afd4... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (4 ms) [----------] 32 tests from SkipVariants/TlsSkipTest (108 ms total) [----------] 10 tests from Skip13Variants/Tls13SkipTest [ RUN ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 8 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [617] 0b0001b9000001b50001b0308201ac30820115a003020102020102300d06092a... server: Filtered packet: [734] 160303005a020000560303ca802d964359db102fbb1715bafb3b8ef3113298a7... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERTIFICATE: SSL received an unexpected Certificate handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/0 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 8 record old: [48] 0800002400010000000000240022000a00140012001d00170018001901000101... record new: [0] record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [453] 0b0001b900010000000001b9000001b50001b0308201ac30820115a003020102... record old: [144] 0f0000840003000000000084080400807a4259225e9a15efcfc487ddf6431d9b... record new: [144] 0f0000840002000000000084080400807a4259225e9a15efcfc487ddf6431d9b... record old: [44] 14000020000400000000002042692a7920bccf0e2c857736485df6ad29b5e9d8... record new: [44] 14000020000300000000002042692a7920bccf0e2c857736485df6ad29b5e9d8... server: Filtered packet: [840] 16fefd00000000000000000062020000560000000000000056fefdde437a8e38... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERTIFICATE: SSL received an unexpected Certificate handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/1 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [212] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [329] 160303005a020000560303c7e6acdad591d9ee94f4c3c8d5d5da4ec1f482518b... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/0 (3 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [0] record old: [144] 0f00008400030000000000840804008082c6885420ac4f6ebb7de075ef9ef104... record new: [144] 0f00008400020000000000840804008082c6885420ac4f6ebb7de075ef9ef104... record old: [44] 140000200004000000000020f19c048e53e241b74284fc42fa68c5ff4b34a757... record new: [44] 140000200003000000000020f19c048e53e241b74284fc42fa68c5ff4b34a757... server: Filtered packet: [435] 16fefd00000000000000000062020000560000000000000056fefd189b9760c5... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/1 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [657] 080000240022000a00140012001d00170018001901000101010201030104001c... record new: [521] 080000240022000a00140012001d00170018001901000101010201030104001c... server: Filtered packet: [638] 160303005a02000056030346612d93df88dadd800319e16f52f6a17ed0e33bcc... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/0 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [144] 0f000084000300000000008408040080a23462fb96ee52c54ce8baaaa39f0e2d... record new: [0] record old: [44] 14000020000400000000002055de949ebce2bf33d54974f48dea4a54f3bb32ce... record new: [44] 14000020000300000000002055de949ebce2bf33d54974f48dea4a54f3bb32ce... server: Filtered packet: [744] 16fefd00000000000000000062020000560000000000000056fefda09539a734... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/1 (4 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [172] 0f000084080400802292c2c0db54eef8f60846c9c780b7bd9f67d7742fe5410b... client: Filtered packet: [194] 17030300bdfb5339be29bc6fb113064890d19d9860ff084560af844a414917cb... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/0 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [459] 0b0001bf00010000000001bf000001bb0001b6308201b23082011ba003020102... record new: [0] record old: [144] 0f000084000200000000008408040080438dd3d7a05b325cbe1063e368d1ab87... record new: [144] 0f000084000100000000008408040080438dd3d7a05b325cbe1063e368d1ab87... record old: [44] 14000020000300000000002072ba73eec5316e7fa0a33ac21ffbee9156e01444... record new: [44] 14000020000200000000002072ba73eec5316e7fa0a33ac21ffbee9156e01444... client: Filtered packet: [254] 2e6f0c00115b574ae1621a38d992643ed3db42f3cd4f2e431300a14b6c774bc9... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/1 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [487] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... client: Filtered packet: [509] 17030301f8691d52f3cf1e1e72053d27a86e0be0d4c4f4859708c286778d09b7... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/0 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [144] 0f000084000200000000008408040080357c328b16dd96f2a92a1cd345738f5d... record new: [0] record old: [44] 140000200003000000000020dfa5fa78aaf2a9000fb71dced1237bd65685a404... record new: [44] 140000200002000000000020dfa5fa78aaf2a9000fb71dced1237bd65685a404... client: Filtered packet: [569] 2e14a701dcaae2cd146935a17969f46d864e81cfb7ed4aa5ee0344f0b724bfd2... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/1 (5 ms) [----------] 10 tests from Skip13Variants/Tls13SkipTest (46 ms total) [----------] 14 tests from VersionsStream10Pre13/SSLv2ClientHelloTest [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103010003000000100000336ec61817fd9fdef2e70aae8f927ea421 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 (8 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectDisabled/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103010003000000100000330c276ecb5ddb78df63cb7feb606a004a client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectDisabled/0 (3 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 Version: TLS 1.0 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff010301000300000010000033c13b741b40a0814db7a37bd98ea29ee100... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030100030000001000c0131395cee5177b9f6acdcb1aee72f60268 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (7 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff010301000300000010000033944b1c276567c1742bbf401ed17d7b1300... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 (7 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff010301000300000010000033e5839cf1a26d6fd726382912214e501f00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002104010301000300000010000033987292e24930810235b586cf1c269a0600... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (3 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 0021060103010003000000100000330643d800a32f891cfafcdd644f379a6100... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030100030000000f000033fea6055f45ef1889a077c6d30377ab server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c010301000300000020000033fd0cdefe51e1c96088fc3899f137dc87c44a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 (8 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d010301000300000021000033764be1b622d69e49e468ce05d60b6f35819a... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010301000300000010000033c20ec97889b3d91d3dcd059f58d25bda server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (3 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103010006000000100000330000ffafc045996de9e11128ffea741c0839... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (7 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.CheckServerRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010301000300000010000033929e688c37b6ca5d9b2ea8c6b178b8ea server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.CheckServerRandom/0 (12 ms) [----------] 14 tests from VersionsStream10Pre13/SSLv2ClientHelloTest (68 ms total) [----------] 28 tests from VersionsStreamPre13/SSLv2ClientHelloTest [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103020003000000100000339967be16262b100c1de3c90ea4ad610e server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030300030000001000003366d4f29300c51a710af4a7290fc21824 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010302000300000010000033bcc0c61042383acba68be3a0aa7c972a client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010303000300000010000033e1889210166f2b0edb5ccf54497f3108 client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 Version: TLS 1.1 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff01030200030000001000003317f1643d4f76d3e7dab3c27bddeced2200... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1 Version: TLS 1.2 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff01030300030000001000003361e9714949de5806ed1ece3411ad358700... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030200030000001000c0132a005c7eb439ef1268edada0dc770e5b server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030300030000001000c013bddb6de03cca76c2dce206597598f1a3 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 (6 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff010302000300000010000033f1bd9fef8f4fefec6669940161dc6e6d00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff0103030003000000100000335bcc06f93855e66f3124d44a0bcdf90700... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff010302000300000010000033664002dc88a1cb608fa0a03ab497d69b00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff0103030003000000100000338ca8fbeb70d0e540e104a063307792cd00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 0021040103020003000000100000333b535e72fa7ea186f7a3dd6b9a776a2a00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002104010303000300000010000033eee27f5e4021870c33d804a02eaf926500... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002106010302000300000010000033e78a03c0690a765cf626ad0f7a3be47600... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 00210601030300030000001000003322fe02be7f0b1fbd4dc653d113ca844e00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030200030000000f0000339a69b11029439f46ed7f4af8ade1ac server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030300030000000f00003301ff7480ca2cf9c1948bcf0b73d46d server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c01030200030000002000003378f6236640f795d9b4233a999c258ef38bbd... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c01030300030000002000003371f620b1e2817805a4d39e4bc196c6729115... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d0103020003000000210000339cb50ca4bb99e9f857b9d242b3ce39fe4797... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d0103030003000000210000334cdf1e48198a45230a320b170ee1c6fbace8... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030200030000001000003318db296ace5ee1aad58c8b70fc135ad6 server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030300030000001000003364be3c4aa2301611f02d38877a8fedd9 server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 (3 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103020006000000100000330000ff7bd2c34356734a8745c9760b1f2597... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (7 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103030006000000100000330000ff9603241a6634e0f9b2ac27a436c51f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 (8 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103020003000000100000330dddc67e69e50686004edc218bbccf57 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/0 (11 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010303000300000010000033ec197ed9e6cdd016f7829de86602348e server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/1 (11 ms) [----------] 28 tests from VersionsStreamPre13/SSLv2ClientHelloTest (134 ms total) [----------] 8 tests from TlsDowngradeSentinelTest/TlsDowngradeTest [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/0 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 Version: TLS 1.3 [ SKIPPED ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 (0 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/2 (3 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/3 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/4 (3 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/5 (4 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/6 (3 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/7 (4 ms) [----------] 8 tests from TlsDowngradeSentinelTest/TlsDowngradeTest (25 ms total) [----------] 4802 tests from TLSVersionRanges/TestPolicyVersionRange [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/0 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/0 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/5 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/5 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/6 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/6 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/7 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/7 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/8 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/8 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/9 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/9 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/10 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/10 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/11 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/11 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/12 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/12 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/13 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/13 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/14 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/14 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/15 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/15 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/16 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/16 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/17 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/17 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/18 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/18 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/19 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/19 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/20 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/20 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/21 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/21 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/22 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/22 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/23 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/23 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/24 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/24 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/25 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/25 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/26 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/26 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/27 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/27 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/28 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/28 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/29 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/29 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/30 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/30 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/31 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/31 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/32 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/32 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/33 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/33 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/34 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/34 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/35 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/35 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/36 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/36 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/37 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/37 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/38 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/38 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/39 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/39 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/40 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/40 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/41 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/41 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/42 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/42 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/43 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/43 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/44 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/44 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/45 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/45 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/46 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/46 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/47 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/47 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/48 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/48 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/49 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/49 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/50 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/50 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/51 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/51 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/52 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/52 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/53 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/53 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/54 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/54 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/55 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/55 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/56 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/56 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/57 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/57 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/58 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/58 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/59 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/59 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/60 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/60 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/61 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/61 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/62 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/62 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/63 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/63 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/64 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/64 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/65 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/65 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/66 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/66 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/67 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/67 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/68 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/68 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/69 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/69 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/70 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/70 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/71 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/71 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/72 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/72 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/73 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/73 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/74 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/74 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/75 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/75 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/76 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/76 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/77 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/77 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/78 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/78 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/79 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/79 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/80 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/80 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/81 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/81 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/82 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/82 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/83 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/83 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/84 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/84 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/85 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/85 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/86 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/86 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/87 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/87 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/88 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/88 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/89 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/89 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/90 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/90 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/91 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/91 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/92 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/92 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/93 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/93 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/94 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/94 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/95 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/95 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/96 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/96 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/97 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/97 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/98 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/98 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/99 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/99 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/100 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/100 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/101 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/101 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/102 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/102 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/103 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/103 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/104 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/104 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/105 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/105 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/106 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/106 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/107 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/107 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/108 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/108 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/109 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/109 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/110 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/110 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/111 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/111 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/112 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/112 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/113 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/113 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/114 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/114 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/115 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/115 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/116 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/116 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/117 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/117 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/118 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/118 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/119 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/119 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/120 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/120 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/121 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/121 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/122 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/122 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/123 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/123 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/124 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/124 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/125 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/125 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/126 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/126 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/127 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/127 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/128 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/128 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/129 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/129 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/130 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/130 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/131 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/131 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/132 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/132 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/133 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/133 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/134 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/134 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/135 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/135 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/136 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/136 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/137 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/137 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/138 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/138 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/139 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/139 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/140 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/140 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/141 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/141 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/142 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/142 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/143 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/143 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/144 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/144 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/145 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/145 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/146 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/146 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/147 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/147 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/148 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/148 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/149 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/149 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/150 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/150 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/151 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/151 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/152 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/152 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/153 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/153 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/154 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/154 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/155 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/155 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/156 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/156 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/157 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/157 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/158 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/158 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/159 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/159 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/160 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/160 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/161 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/161 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/162 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/162 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/163 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/163 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/164 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/164 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/165 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/165 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/166 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/166 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/167 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/167 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/168 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/168 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/169 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/169 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/170 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/170 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/171 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/171 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/172 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/172 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/173 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/173 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/174 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/174 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/175 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/175 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/176 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/176 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/177 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/177 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/178 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/178 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/179 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/179 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/180 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/180 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/181 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/181 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/182 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/182 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/183 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/183 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/184 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/184 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/185 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/185 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/186 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/186 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/187 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/187 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/188 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/188 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/189 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/189 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/190 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/190 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/191 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/191 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/192 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/192 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/193 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/193 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/194 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/194 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/195 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/195 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/196 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/196 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/197 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/197 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/198 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/198 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/199 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/199 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/200 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/200 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/201 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/201 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/202 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/202 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/203 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/203 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/204 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/204 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/205 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/205 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/206 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/206 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/207 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/207 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/208 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/208 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/209 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/209 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/210 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/210 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/211 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/211 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/212 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/212 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/213 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/213 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/214 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/214 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/215 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/215 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/216 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/216 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/217 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/217 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/218 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/218 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/219 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/219 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/220 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/220 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/221 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/221 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/222 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/222 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/223 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/223 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/224 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/224 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/225 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/225 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/226 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/226 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/227 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/227 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/228 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/228 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/229 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/229 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/230 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/230 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/231 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/231 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/232 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/232 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/233 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/233 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/234 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/235 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/235 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/236 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/236 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/237 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/238 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/239 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/240 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/241 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/242 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/242 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/243 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/243 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/244 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/244 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/245 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/246 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/247 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/248 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/249 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/249 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/250 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/250 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/251 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/251 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/252 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/253 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/253 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/254 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/254 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/255 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/255 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/256 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/256 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/257 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/257 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/258 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/258 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/259 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/259 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/260 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/260 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/261 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/261 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/262 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/262 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/263 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/263 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/264 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/264 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/265 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/266 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/266 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/267 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/268 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/269 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/269 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/270 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/270 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/271 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/271 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/272 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/273 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/274 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/275 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/276 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/276 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/277 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/277 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/278 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/278 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/279 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/280 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/281 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/282 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/283 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/284 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/284 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/285 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/285 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/286 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/287 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/288 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/289 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/290 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/291 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/291 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/292 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/292 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/293 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/293 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/294 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/295 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/296 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/297 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/298 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/298 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/299 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/299 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/300 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/300 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/301 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/302 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/302 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/303 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/303 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/304 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/304 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/305 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/305 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/306 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/306 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/307 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/307 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/308 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/308 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/309 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/309 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/310 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/310 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/311 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/311 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/312 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/312 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/313 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/313 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/314 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/314 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/315 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/315 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/316 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/316 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/317 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/318 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/318 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/319 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/319 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/320 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/320 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/321 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/322 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/323 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/324 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/325 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/325 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/326 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/326 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/327 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/327 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/328 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/329 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/330 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/331 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/332 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/333 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/333 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/334 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/334 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/335 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/335 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/336 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/337 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/338 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/339 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/340 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/340 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/341 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/341 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/342 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/342 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/343 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/344 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/344 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/345 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/345 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/346 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/347 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/348 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/349 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/349 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/350 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/351 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/352 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/352 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/353 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/353 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/354 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/355 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/356 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/356 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/357 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/357 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/358 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/359 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/360 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/360 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/361 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/361 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/362 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/362 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/363 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/363 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/364 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/364 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/365 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/365 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/366 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/366 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/367 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/367 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/368 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/368 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/369 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/369 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/370 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/370 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/371 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/371 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/372 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/373 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/374 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/374 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/375 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/375 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/376 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/377 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/378 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/378 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/379 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/380 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/381 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/381 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/382 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/382 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/383 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/384 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/385 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/385 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/386 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/386 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/387 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/388 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/388 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/389 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/389 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/390 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/391 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/392 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/393 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/394 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/394 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/395 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/396 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/396 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/397 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/398 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/399 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/400 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/400 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/401 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/401 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/402 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/402 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/403 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/403 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/404 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/405 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/405 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/406 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/406 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/407 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/407 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/408 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/408 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/409 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/410 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/411 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/412 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/413 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/413 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/414 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/414 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/415 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/416 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/417 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/418 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/418 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/419 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/420 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/420 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/421 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/421 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/422 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/423 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/424 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/425 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/426 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/427 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/428 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/429 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/430 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/430 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/431 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/431 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/432 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/432 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/433 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/433 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/434 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/434 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/435 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/435 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/436 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/436 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/437 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/437 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/438 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/438 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/439 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/439 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/440 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/440 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/441 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/441 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/442 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/442 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/443 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/443 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/444 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/444 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/445 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/445 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/446 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/446 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/447 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/447 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/448 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/448 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/449 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/449 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/450 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/450 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/451 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/451 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/452 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/452 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/453 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/453 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/454 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/454 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/455 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/455 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/456 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/456 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/457 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/457 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/458 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/458 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/459 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/459 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/460 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/460 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/461 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/461 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/462 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/462 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/463 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/463 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/464 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/464 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/465 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/465 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/466 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/466 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/467 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/467 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/468 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/468 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/469 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/469 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/470 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/470 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/471 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/471 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/472 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/472 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/473 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/473 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/474 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/474 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/475 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/475 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/476 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/476 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/477 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/477 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/478 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/478 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/479 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/479 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/480 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/480 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/481 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/481 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/482 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/482 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/483 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/483 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/484 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/484 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/485 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/485 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/486 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/486 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/487 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/487 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/488 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/488 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/489 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/489 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/490 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/490 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/491 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/491 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/492 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/492 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/493 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/493 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/494 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/494 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/495 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/495 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/496 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/496 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/497 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/497 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/498 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/498 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/499 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/499 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/500 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/500 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/501 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/501 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/502 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/502 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/503 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/503 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/504 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/504 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/505 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/505 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/506 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/506 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/507 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/507 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/508 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/508 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/509 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/509 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/510 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/510 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/511 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/511 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/512 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/512 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/513 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/513 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/514 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/514 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/515 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/515 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/516 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/516 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/517 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/517 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/518 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/518 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/519 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/519 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/520 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/520 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/521 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/521 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/522 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/522 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/523 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/523 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/524 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/524 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/525 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/525 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/526 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/526 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/527 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/527 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/528 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/528 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/529 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/529 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/530 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/530 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/531 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/531 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/532 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/532 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/533 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/533 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/534 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/534 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/535 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/535 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/536 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/536 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/537 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/537 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/538 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/538 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/539 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/539 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/540 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/540 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/541 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/541 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/542 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/542 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/543 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/543 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/544 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/544 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/545 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/545 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/546 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/546 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/547 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/547 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/548 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/548 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/549 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/549 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/550 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/550 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/551 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/551 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/552 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/552 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/553 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/553 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/554 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/554 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/555 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/555 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/556 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/556 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/557 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/557 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/558 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/558 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/559 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/559 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/560 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/560 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/561 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/561 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/562 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/562 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/563 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/563 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/564 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/564 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/565 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/565 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/566 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/566 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/567 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/567 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/568 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/569 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/570 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/571 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/571 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/572 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/572 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/573 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/573 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/574 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/574 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/575 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/576 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/577 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/578 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/579 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/580 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/581 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/582 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/582 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/583 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/584 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/585 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/586 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/587 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/588 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/589 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/590 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/591 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/592 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/593 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/594 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/594 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/595 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/596 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/596 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/597 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/597 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/598 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/598 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/599 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/599 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/600 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/601 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/601 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/602 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/603 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/604 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/604 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/605 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/605 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/606 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/606 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/607 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/607 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/608 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/609 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/610 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/611 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/612 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/612 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/613 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/613 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/614 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/614 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/615 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/616 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/617 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/618 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/619 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/620 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/620 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/621 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/621 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/622 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/623 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/624 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/625 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/626 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/627 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/628 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/628 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/629 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/630 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/631 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/632 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/633 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/634 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/634 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/635 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/636 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/637 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/638 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/639 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/640 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/641 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/642 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/643 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/644 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/645 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/645 (8 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/646 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/646 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/647 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/647 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/648 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/648 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/649 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/650 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/650 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/651 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/652 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/653 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/653 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/654 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/654 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/655 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/655 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/656 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/656 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/657 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/658 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/658 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/659 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/660 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/661 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/661 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/662 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/662 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/663 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/663 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/664 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/665 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/666 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/667 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/668 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/669 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/669 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/670 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/670 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/671 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/671 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/672 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/673 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/674 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/675 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/676 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/677 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/677 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/678 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/679 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/680 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/681 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/682 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/683 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/684 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/685 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/685 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/686 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/686 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/687 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/687 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/688 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/688 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/689 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/689 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/690 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/690 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/691 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/691 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/692 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/692 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/693 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/693 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/694 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/694 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/695 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/695 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/696 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/696 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/697 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/697 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/698 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/698 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/699 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/699 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/700 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/700 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/701 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/701 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/702 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/702 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/703 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/703 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/704 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/704 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/705 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/705 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/706 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/706 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/707 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/707 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/708 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/708 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/709 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/709 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/710 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/710 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/711 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/711 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/712 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/712 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/713 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/713 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/714 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/714 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/715 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/716 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/716 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/717 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/717 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/718 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/719 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/719 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/720 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/720 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/721 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/721 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/722 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/723 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/724 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/724 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/725 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/726 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/727 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/727 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/728 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/728 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/729 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/729 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/730 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/731 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/732 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/732 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/733 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/733 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/734 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/735 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/736 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/736 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/737 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/738 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/739 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/739 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/740 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/740 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/741 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/742 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/743 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/743 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/744 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/744 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/745 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/746 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/747 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/747 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/748 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/748 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/749 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/750 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/751 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/752 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/752 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/753 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/754 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/754 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/755 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/756 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/756 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/757 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/758 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/759 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/760 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/760 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/761 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/762 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/763 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/763 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/764 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/765 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/766 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/767 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/767 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/768 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/769 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/770 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/771 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/771 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/772 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/773 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/774 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/775 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/775 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/776 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/777 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/778 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/779 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/779 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/780 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/781 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/782 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/783 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/783 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/784 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/784 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/785 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/785 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/786 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/786 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/787 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/787 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/788 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/788 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/789 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/789 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/790 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/790 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/791 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/791 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/792 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/792 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/793 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/793 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/794 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/794 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/795 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/795 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/796 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/796 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/797 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/797 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/798 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/798 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/799 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/799 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/800 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/800 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/801 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/801 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/802 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/802 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/803 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/803 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/804 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/804 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/805 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/805 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/806 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/806 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/807 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/807 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/808 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/808 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/809 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/809 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/810 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/810 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/811 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/811 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/812 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/812 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/813 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/813 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/814 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/814 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/815 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/815 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/816 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/816 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/817 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/817 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/818 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/818 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/819 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/819 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/820 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/820 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/821 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/821 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/822 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/822 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/823 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/823 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/824 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/824 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/825 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/825 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/826 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/826 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/827 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/827 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/828 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/828 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/829 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/829 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/830 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/830 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/831 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/831 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/832 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/832 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/833 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/833 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/834 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/834 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/835 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/835 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/836 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/836 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/837 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/837 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/838 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/838 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/839 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/839 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/840 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/840 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/841 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/841 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/842 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/842 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/843 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/843 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/844 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/844 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/845 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/845 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/846 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/846 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/847 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/847 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/848 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/848 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/849 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/849 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/850 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/850 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/851 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/851 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/852 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/852 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/853 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/853 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/854 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/854 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/855 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/855 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/856 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/856 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/857 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/857 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/858 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/858 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/859 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/859 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/860 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/860 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/861 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/861 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/862 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/862 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/863 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/863 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/864 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/864 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/865 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/865 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/866 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/866 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/867 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/867 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/868 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/868 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/869 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/869 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/870 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/870 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/871 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/871 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/872 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/872 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/873 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/873 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/874 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/874 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/875 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/875 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/876 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/876 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/877 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/877 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/878 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/878 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/879 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/879 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/880 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/880 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/881 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/881 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/882 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/882 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/883 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/883 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/884 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/884 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/885 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/885 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/886 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/886 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/887 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/887 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/888 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/888 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/889 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/889 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/890 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/890 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/891 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/891 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/892 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/892 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/893 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/893 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/894 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/894 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/895 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/895 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/896 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/896 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/897 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/897 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/898 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/898 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/899 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/899 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/900 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/900 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/901 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/901 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/902 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/902 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/903 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/903 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/904 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/904 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/905 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/905 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/906 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/906 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/907 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/907 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/908 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/908 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/909 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/909 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/910 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/910 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/911 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/911 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/912 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/912 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/913 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/913 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/914 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/914 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/915 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/915 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/916 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/916 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/917 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/917 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/918 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/918 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/919 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/919 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/920 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/920 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/921 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/921 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/922 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/922 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/923 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/923 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/924 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/924 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/925 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/925 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/926 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/926 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/927 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/927 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/928 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/928 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/929 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/929 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/930 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/930 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/931 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/931 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/932 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/932 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/933 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/933 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/934 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/934 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/935 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/935 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/936 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/936 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/937 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/937 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/938 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/938 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/939 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/939 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/940 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/940 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/941 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/941 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/942 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/942 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/943 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/943 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/944 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/944 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/945 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/945 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/946 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/946 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/947 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/947 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/948 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/948 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/949 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/949 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/950 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/950 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/951 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/951 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/952 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/952 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/953 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/953 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/954 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/954 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/955 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/955 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/956 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/956 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/957 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/957 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/958 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/958 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/959 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/959 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/960 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/961 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/962 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/963 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/963 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/964 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/964 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/965 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/965 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/966 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/966 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/967 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/968 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/968 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/969 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/970 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/971 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/971 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/972 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/973 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/974 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/975 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/976 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/977 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/978 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/979 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/980 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/981 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/982 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/982 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/983 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/984 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/985 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/986 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/987 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/988 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/989 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/989 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/990 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/990 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/991 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/991 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/992 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/993 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/994 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/995 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/996 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/996 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/997 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/997 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/998 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/998 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/999 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/999 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1000 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1001 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1001 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1002 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1003 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1004 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1004 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1005 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1005 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1006 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1006 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1007 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1008 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1009 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1010 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1011 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1012 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1012 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1013 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1013 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1014 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1015 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1015 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1016 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1017 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1018 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1019 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1020 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1020 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1021 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1022 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1023 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1024 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1025 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1026 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1027 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1028 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1029 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1029 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1030 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1030 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1031 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1031 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1032 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1032 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1033 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1033 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1034 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1034 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1035 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1035 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1036 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1036 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1037 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1037 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1038 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1038 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1039 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1039 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1040 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1040 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1041 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1041 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1042 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1042 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1043 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1043 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1044 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1044 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1045 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1045 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1046 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1046 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1047 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1047 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1048 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1048 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1049 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1049 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1050 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1050 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1051 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1051 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1052 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1052 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1053 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1053 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1054 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1054 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1055 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1055 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1056 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1056 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1057 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1057 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1058 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1058 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1059 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1059 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1060 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1060 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1061 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1061 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1062 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1062 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1063 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1063 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1064 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1064 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1065 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1065 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1066 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1066 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1067 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1067 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1068 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1068 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1069 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1069 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1070 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1070 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1071 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1071 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1072 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1072 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1073 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1073 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1074 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1074 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1075 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1075 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1076 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1076 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1077 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1077 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1078 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1078 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1079 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1079 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1080 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1080 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1081 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1081 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1082 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1082 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1083 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1083 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1084 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1084 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1085 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1085 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1086 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1086 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1087 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1087 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1088 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1088 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1089 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1089 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1090 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1091 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1091 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1092 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1093 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1093 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1094 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1095 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1095 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1096 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1096 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1097 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1097 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1098 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1099 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1099 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1100 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1101 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1101 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1102 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1103 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1103 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1104 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1104 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1105 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1106 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1107 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1107 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1108 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1108 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1109 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1110 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1110 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1111 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1112 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1112 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1113 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1114 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1114 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1115 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1115 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1116 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1117 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1118 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1118 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1119 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1120 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1121 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1122 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1122 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1123 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1124 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1125 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1126 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1126 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1127 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1128 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1129 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1130 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1130 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1131 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1132 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1133 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1134 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1134 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1135 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1136 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1137 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1138 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1138 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1139 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1140 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1141 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1141 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1142 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1143 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1144 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1145 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1145 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1146 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1147 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1148 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1149 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1149 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1150 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1151 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1152 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1153 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1153 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1154 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1155 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1156 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1157 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1157 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1158 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1159 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1160 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1161 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1161 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1162 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1163 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1164 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1165 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1165 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1166 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1167 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1168 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1169 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1169 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1170 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1171 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1172 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1173 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1173 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1174 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1175 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1176 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1176 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1177 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1177 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1178 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1178 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1179 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1179 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1180 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1180 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1181 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1181 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1182 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1182 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1183 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1183 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1184 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1184 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1185 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1185 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1186 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1186 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1187 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1187 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1188 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1188 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1189 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1189 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1190 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1190 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1191 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1191 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1192 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1192 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1193 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1193 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1194 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1194 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1195 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1195 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1196 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1196 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1197 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1197 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1198 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1198 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1199 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1199 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1200 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1200 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1201 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1201 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1202 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1202 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1203 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1203 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1204 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1204 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1205 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1205 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1206 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1206 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1207 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1207 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1208 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1208 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1209 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1209 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1210 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1210 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1211 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1211 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1212 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1212 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1213 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1213 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1214 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1214 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1215 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1215 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1216 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1216 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1217 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1217 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1218 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1218 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1219 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1219 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1220 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1220 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1221 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1221 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1222 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1222 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1223 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1223 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1224 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1224 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1225 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1225 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1226 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1226 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1227 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1227 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1228 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1228 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1229 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1229 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1230 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1230 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1231 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1231 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1232 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1232 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1233 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1233 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1234 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1235 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1235 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1236 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1236 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1237 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1238 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1239 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1240 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1241 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1242 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1242 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1243 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1243 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1244 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1244 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1245 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1246 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1247 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1248 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1249 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1249 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1250 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1250 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1251 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1251 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1252 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1253 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1253 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1254 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1254 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1255 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1255 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1256 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1256 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1257 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1257 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1258 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1258 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1259 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1259 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1260 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1260 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1261 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1261 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1262 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1262 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1263 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1263 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1264 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1264 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1265 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1266 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1267 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1268 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1269 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1269 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1270 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1270 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1271 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1271 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1272 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1273 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1274 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1275 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1276 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1276 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1277 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1277 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1278 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1278 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1279 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1280 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1281 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1282 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1283 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1284 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1284 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1285 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1285 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1286 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1287 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1288 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1289 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1290 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1290 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1291 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1291 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1292 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1292 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1293 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1293 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1294 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1294 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1295 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1296 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1297 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1298 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1298 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1299 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1299 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1300 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1300 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1301 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1302 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1302 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1303 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1303 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1304 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1304 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1305 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1305 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1306 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1306 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1307 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1307 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1308 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1308 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1309 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1309 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1310 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1310 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1311 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1311 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1312 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1312 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1313 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1313 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1314 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1314 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1315 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1315 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1316 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1316 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1317 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1318 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1318 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1319 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1319 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1320 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1320 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1321 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1322 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1322 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1323 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1324 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1325 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1325 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1326 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1326 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1327 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1327 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1328 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1329 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1330 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1331 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1332 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1333 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1333 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1334 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1334 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1335 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1335 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1336 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1337 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1338 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1339 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1340 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1340 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1341 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1341 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1342 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1342 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1343 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1343 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1344 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1344 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1345 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1345 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1346 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1346 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1347 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1347 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1348 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1348 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1349 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1349 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1350 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1350 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1351 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1351 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1352 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1352 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1353 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1353 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1354 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1354 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1355 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1355 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1356 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1356 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1357 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1357 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1358 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1358 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1359 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1359 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1360 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1360 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1361 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1362 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1363 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1363 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1364 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1364 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1365 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1365 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1366 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1367 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1367 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1368 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1369 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1369 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1370 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1371 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1372 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1373 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1374 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1374 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1375 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1376 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1377 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1378 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1378 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1379 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1380 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1381 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1381 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1382 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1382 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1383 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1384 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1385 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1385 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1386 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1387 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1388 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1388 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1389 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1389 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1390 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1391 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1392 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1392 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1393 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1393 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1394 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1394 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1395 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1395 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1396 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1396 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1397 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1397 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1398 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1398 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1399 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1399 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1400 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1400 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1401 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1401 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1402 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1402 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1403 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1403 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1404 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1404 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1405 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1405 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1406 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1406 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1407 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1407 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1408 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1408 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1409 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1409 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1410 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1410 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1411 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1411 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1412 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1412 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1413 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1413 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1414 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1414 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1415 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1415 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1416 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1416 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1417 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1417 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1418 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1418 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1419 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1419 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1420 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1420 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1421 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1421 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1422 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1422 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1423 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1423 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1424 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1424 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1425 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1425 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1426 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1426 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1427 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1427 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1428 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1428 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1429 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1429 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1430 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1430 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1431 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1432 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1432 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1433 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1433 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1434 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1434 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1435 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1436 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1436 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1437 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1437 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1438 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1439 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1440 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1440 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1441 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1441 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1442 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1443 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1444 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1444 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1445 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1446 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1447 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1447 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1448 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1448 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1449 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1450 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1451 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1451 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1452 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1452 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1453 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1454 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1455 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1455 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1456 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1456 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1457 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1458 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1459 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1460 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1460 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1461 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1462 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1463 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1463 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1464 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1465 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1466 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1467 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1467 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1468 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1469 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1470 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1471 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1471 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1472 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1473 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1474 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1475 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1475 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1476 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1477 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1478 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1479 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1479 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1480 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1481 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1482 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1483 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1483 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1484 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1485 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1486 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1487 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1487 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1488 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1489 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1490 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1490 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1491 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1492 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1493 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1494 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1494 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1495 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1496 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1497 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1498 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1498 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1499 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1500 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1501 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1502 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1502 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1503 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1504 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1505 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1506 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1506 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1507 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1508 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1509 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1510 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1510 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1511 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1512 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1513 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1514 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1514 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1515 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1516 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1517 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1517 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1518 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1519 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1520 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1521 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1521 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1522 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1523 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1524 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1525 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1525 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1526 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1527 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1528 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1529 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1529 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1530 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1531 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1532 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1533 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1533 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1534 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1535 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1536 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1537 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1537 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1538 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1539 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1540 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1540 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1541 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1542 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1543 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1544 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1544 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1545 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1545 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1546 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1547 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1548 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1548 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1549 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1549 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1550 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1551 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1552 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1552 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1553 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1554 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1555 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1555 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1556 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1556 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1557 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1558 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1559 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1559 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1560 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1561 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1562 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1562 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1563 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1563 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1564 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1565 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1566 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1566 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1567 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1567 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1568 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1569 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1570 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1571 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1571 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1572 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1572 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1573 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1573 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1574 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1574 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1575 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1576 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1576 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1577 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1578 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1579 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1579 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1580 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1581 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1582 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1582 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1583 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1584 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1585 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1586 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1586 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1587 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1587 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1588 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1589 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1590 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1591 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1592 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1593 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1593 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1594 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1594 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1595 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1596 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1597 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1598 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1599 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1600 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1600 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1601 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1601 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1602 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1603 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1604 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1605 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1606 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1607 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1608 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1609 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1610 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1611 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1612 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1612 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1613 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1614 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1615 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1616 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1617 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1618 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1619 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1620 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1621 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1621 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1622 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1623 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1624 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1624 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1625 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1626 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1627 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1628 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1628 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1629 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1630 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1631 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1631 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1632 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1633 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1634 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1635 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1635 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1636 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1636 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1637 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1638 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1639 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1640 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1641 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1641 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1642 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1642 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1643 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1643 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1644 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1645 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1646 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1647 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1648 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1649 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1649 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1650 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1650 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1651 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1652 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1653 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1654 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1655 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1656 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1657 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1657 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1658 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1659 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1660 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1661 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1661 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1662 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1663 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1664 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1665 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1666 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1667 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1668 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1669 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1670 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1670 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1671 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1671 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1672 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1673 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1673 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1674 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1675 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1676 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1677 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1677 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1678 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1679 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1680 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1680 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1681 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1682 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1683 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1684 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1684 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1685 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1685 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1686 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1686 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1687 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1688 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1689 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1689 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1690 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1691 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1691 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1692 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1692 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1693 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1694 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1695 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1696 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1697 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1697 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1698 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1698 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1699 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1699 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1700 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1700 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1701 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1701 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1702 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1703 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1704 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1705 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1706 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1706 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1707 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1707 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1708 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1708 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1709 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1710 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1711 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1712 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1713 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1714 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1715 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1716 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1716 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1717 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1717 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1718 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1719 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1719 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1720 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1720 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1721 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1721 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1722 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1723 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1724 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1724 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1725 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1726 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1727 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1727 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1728 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1729 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1729 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1730 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1731 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1731 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1732 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1733 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1733 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1734 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1735 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1735 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1736 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1736 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1737 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1738 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1739 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1739 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1740 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1740 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1741 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1742 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1742 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1743 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1743 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1744 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1745 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1746 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1746 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1747 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1747 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1748 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1749 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1750 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1750 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1751 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1752 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1753 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1754 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1754 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1755 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1756 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1757 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1757 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1758 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1759 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1760 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1761 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1761 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1762 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1763 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1764 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1765 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1765 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1766 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1767 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1768 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1768 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1769 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1770 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1771 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1772 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1772 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1773 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1774 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1775 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1776 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1776 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1777 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1778 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1779 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1780 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1780 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1781 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1782 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1783 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1784 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1784 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1785 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1786 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1787 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1787 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1788 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1789 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1790 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1791 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1791 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1792 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1793 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1794 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1795 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1795 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1796 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1797 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1798 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1799 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1799 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1800 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1801 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1802 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1803 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1803 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1804 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1805 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1805 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1806 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1806 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1807 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1807 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1808 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1809 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1810 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1810 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1811 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1812 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1813 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1814 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1814 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1815 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1815 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1816 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1817 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1817 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1818 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1818 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1819 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1820 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1821 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1821 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1822 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1822 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1823 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1824 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1825 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1825 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1826 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1827 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1828 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1829 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1829 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1830 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1831 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1832 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1832 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1833 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1834 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1835 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1836 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1836 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1837 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1838 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1839 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1839 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1840 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1840 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1841 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1842 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1843 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1843 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1844 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1845 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1846 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1846 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1847 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1847 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1848 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1849 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1850 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1850 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1851 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1851 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1852 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1853 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1853 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1854 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1854 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1855 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1856 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1856 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1857 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1858 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1858 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1859 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1860 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1860 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1861 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1862 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1862 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1863 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1863 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1864 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1864 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1865 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1866 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1866 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1867 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1867 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1868 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1869 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1869 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1870 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1870 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1871 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1871 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1872 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1873 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1873 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1874 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1875 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1875 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1876 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1877 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1877 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1878 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1879 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1879 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1880 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1881 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1881 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1882 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1883 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1883 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1884 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1884 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1885 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1885 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1886 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1887 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1888 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1888 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1889 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1890 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1890 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1891 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1891 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1892 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1892 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1893 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1893 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1894 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1894 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1895 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1895 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1896 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1896 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1897 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1897 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1898 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1898 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1899 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1899 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1900 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1900 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1901 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1901 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1902 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1902 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1903 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1903 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1904 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1904 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1905 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1905 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1906 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1906 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1907 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1907 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1908 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1908 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1909 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1909 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1910 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1910 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1911 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1911 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1912 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1912 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1913 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1913 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1914 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1914 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1915 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1915 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1916 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1916 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1917 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1917 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1918 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1918 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1919 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1919 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1920 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1920 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1921 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1921 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1922 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1922 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1923 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1923 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1924 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1924 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1925 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1925 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1926 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1926 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1927 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1927 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1928 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1928 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1929 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1929 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1930 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1930 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1931 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1931 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1932 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1932 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1933 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1933 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1934 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1934 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1935 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1935 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1936 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1936 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1937 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1937 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1938 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1938 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1939 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1939 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1940 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1940 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1941 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1941 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1942 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1942 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1943 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1943 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1944 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1944 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1945 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1945 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1946 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1946 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1947 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1947 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1948 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1948 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1949 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1949 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1950 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1950 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1951 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1951 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1952 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1952 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1953 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1953 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1954 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1954 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1955 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1955 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1956 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1956 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1957 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1957 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1958 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1958 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1959 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1959 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1960 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1960 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1961 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1962 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1963 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1963 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1964 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1964 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1965 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1965 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1966 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1966 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1967 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1968 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1969 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1970 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1971 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1971 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1972 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1973 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1974 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1975 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1976 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1977 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1978 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1979 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1979 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1980 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1981 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1982 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1983 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1983 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1984 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1985 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1986 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1986 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1987 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1988 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1989 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1990 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1991 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1992 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1993 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1993 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1994 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1995 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1996 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1997 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1998 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1998 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1999 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2000 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2000 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2001 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2001 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2002 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2003 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2004 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2005 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2006 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2007 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2008 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2009 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2010 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2011 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2012 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2012 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2013 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2013 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2014 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2015 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2016 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2017 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2018 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2019 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2020 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2021 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2022 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2023 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2024 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2024 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2025 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2026 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2027 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2028 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2028 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2029 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2029 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2030 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2031 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2032 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2033 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2034 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2035 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2035 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2036 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2037 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2038 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2039 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2040 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2040 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2041 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2042 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2042 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2043 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2043 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2044 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2044 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2045 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2046 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2047 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2048 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2049 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2049 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2050 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2050 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2051 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2051 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2052 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2053 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2054 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2055 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2055 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2056 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2057 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2058 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2058 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2059 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2059 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2060 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2060 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2061 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2061 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2062 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2062 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2063 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2063 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2064 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2064 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2065 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2065 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2066 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2066 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2067 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2067 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2068 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2068 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2069 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2069 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2070 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2070 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2071 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2071 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2072 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2072 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2073 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2073 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2074 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2074 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2075 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2075 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2076 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2076 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2077 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2077 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2078 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2078 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2079 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2079 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2080 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2080 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2081 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2081 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2082 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2082 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2083 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2083 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2084 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2084 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2085 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2085 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2086 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2086 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2087 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2088 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2088 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2089 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2089 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2090 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2090 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2091 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2091 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2092 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2093 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2093 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2094 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2095 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2096 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2096 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2097 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2097 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2098 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2099 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2099 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2100 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2101 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2101 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2102 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2103 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2103 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2104 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2104 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2105 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2106 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2107 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2107 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2108 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2108 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2109 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2110 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2110 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2111 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2112 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2112 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2113 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2114 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2115 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2115 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2116 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2117 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2118 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2119 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2119 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2120 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2121 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2122 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2123 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2123 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2124 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2125 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2126 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2127 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2127 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2128 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2129 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2130 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2130 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2131 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2132 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2133 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2134 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2134 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2135 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2136 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2137 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2138 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2138 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2139 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2140 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2141 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2141 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2142 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2143 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2144 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2145 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2145 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2146 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2147 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2148 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2149 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2149 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2150 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2151 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2152 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2153 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2153 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2154 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2155 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2156 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2156 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2157 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2158 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2159 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2160 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2160 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2161 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2162 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2163 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2164 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2164 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2165 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2166 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2167 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2167 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2168 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2169 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2170 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2171 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2171 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2172 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2173 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2174 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2175 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2175 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2176 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2177 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2178 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2178 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2179 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2180 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2181 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2182 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2182 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2183 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2184 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2184 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2185 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2186 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2186 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2187 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2188 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2189 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2189 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2190 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2190 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2191 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2192 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2193 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2193 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2194 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2195 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2196 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2197 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2197 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2198 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2199 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2199 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2200 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2201 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2201 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2202 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2203 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2203 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2204 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2204 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2205 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2205 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2206 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2207 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2207 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2208 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2208 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2209 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2210 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2211 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2212 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2212 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2213 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2214 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2215 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2215 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2216 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2216 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2217 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2218 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2219 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2219 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2220 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2220 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2221 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2222 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2223 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2223 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2224 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2225 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2226 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2226 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2227 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2227 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2228 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2229 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2230 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2230 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2231 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2231 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2232 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2233 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2234 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2234 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2235 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2235 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2236 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2236 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2237 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2237 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2238 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2238 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2239 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2239 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2240 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2240 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2241 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2241 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2242 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2242 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2243 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2243 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2244 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2244 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2245 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2245 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2246 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2246 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2247 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2247 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2248 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2248 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2249 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2249 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2250 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2250 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2251 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2251 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2252 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2252 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2253 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2253 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2254 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2254 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2255 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2255 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2256 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2256 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2257 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2257 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2258 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2258 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2259 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2259 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2260 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2260 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2261 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2261 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2262 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2262 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2263 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2263 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2264 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2264 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2265 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2265 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2266 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2266 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2267 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2267 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2268 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2268 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2269 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2269 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2270 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2270 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2271 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2271 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2272 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2272 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2273 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2273 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2274 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2274 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2275 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2275 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2276 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2276 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2277 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2277 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2278 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2278 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2279 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2279 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2280 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2280 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2281 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2281 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2282 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2282 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2283 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2283 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2284 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2284 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2285 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2285 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2286 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2286 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2287 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2287 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2288 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2288 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2289 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2289 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2290 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2290 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2291 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2291 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2292 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2292 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2293 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2293 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2294 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2294 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2295 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2295 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2296 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2296 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2297 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2297 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2298 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2298 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2299 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2299 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2300 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2300 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2301 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2301 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2302 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2302 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2303 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2303 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2304 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2304 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2305 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2305 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2306 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2306 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2307 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2307 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2308 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2308 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2309 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2309 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2310 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2310 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2311 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2311 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2312 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2312 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2313 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2313 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2314 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2314 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2315 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2315 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2316 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2316 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2317 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2317 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2318 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2318 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2319 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2319 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2320 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2320 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2321 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2321 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2322 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2322 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2323 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2323 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2324 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2324 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2325 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2325 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2326 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2326 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2327 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2327 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2328 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2328 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2329 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2329 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2330 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2330 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2331 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2331 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2332 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2332 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2333 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2333 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2334 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2334 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2335 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2335 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2336 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2336 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2337 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2337 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2338 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2338 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2339 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2339 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2340 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2340 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2341 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2341 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2342 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2342 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2343 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2344 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2344 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2345 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2345 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2346 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2347 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2348 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2349 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2349 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2350 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2351 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2352 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2352 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2353 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2353 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2354 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2355 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2356 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2356 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2357 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2357 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2358 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2358 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2359 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2360 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2360 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2361 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2361 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2362 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2362 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2363 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2363 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2364 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2364 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2365 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2365 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2366 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2366 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2367 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2367 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2368 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2368 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2369 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2369 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2370 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2370 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2371 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2371 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2372 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2373 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2373 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2374 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2374 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2375 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2376 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2376 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2377 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2378 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2378 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2379 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2380 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2380 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2381 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2381 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2382 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2382 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2383 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2384 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2384 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2385 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2385 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2386 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2387 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2388 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2388 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2389 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2389 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2390 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2391 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2391 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2392 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2392 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2393 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2393 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2394 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2394 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2395 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2395 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2396 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2396 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2397 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2397 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2398 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2398 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2399 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2399 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2400 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2400 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2401 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2401 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2402 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2402 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2403 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2403 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2404 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2404 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2405 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2405 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2406 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2406 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2407 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2407 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2408 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2408 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2409 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2409 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2410 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2410 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2411 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2411 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2412 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2412 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2413 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2413 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2414 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2414 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2415 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2415 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2416 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2416 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2417 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2417 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2418 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2418 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2419 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2419 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2420 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2420 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2421 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2421 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2422 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2422 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2423 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2423 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2424 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2424 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2425 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2425 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2426 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2426 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2427 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2427 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2428 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2428 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2429 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2429 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2430 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2430 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2431 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2432 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2432 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2433 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2433 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2434 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2434 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2435 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2436 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2436 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2437 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2437 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2438 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2439 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2440 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2440 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2441 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2441 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2442 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2443 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2444 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2444 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2445 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2446 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2447 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2447 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2448 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2448 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2449 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2450 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2451 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2451 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2452 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2452 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2453 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2454 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2455 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2455 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2456 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2456 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2457 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2458 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2459 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2459 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2460 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2461 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2462 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2462 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2463 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2464 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2465 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2466 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2466 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2467 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2468 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2469 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2470 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2470 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2471 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2472 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2473 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2474 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2474 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2475 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2476 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2477 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2478 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2479 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2480 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2481 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2481 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2482 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2483 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2484 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2485 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2485 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2486 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2487 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2488 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2489 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2489 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2490 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2491 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2492 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2492 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2493 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2494 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2495 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2496 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2496 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2497 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2498 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2499 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2500 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2500 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2501 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2502 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2503 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2504 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2504 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2505 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2506 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2507 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2507 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2508 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2509 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2510 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2511 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2511 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2512 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2513 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2514 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2515 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2515 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2516 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2517 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2518 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2519 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2519 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2520 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2521 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2522 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2522 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2523 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2524 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2525 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2526 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2526 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2527 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2528 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2529 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2530 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2530 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2531 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2532 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2533 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2534 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2534 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2535 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2536 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2537 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2537 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2538 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2539 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2540 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2541 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2541 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2542 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2543 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2544 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2545 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2545 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2546 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2547 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2548 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2548 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2549 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2549 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2550 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2550 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2551 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2551 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2552 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2552 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2553 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2553 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2554 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2554 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2555 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2555 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2556 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2556 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2557 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2557 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2558 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2558 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2559 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2559 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2560 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2560 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2561 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2561 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2562 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2562 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2563 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2563 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2564 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2564 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2565 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2565 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2566 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2566 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2567 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2567 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2568 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2569 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2570 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2571 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2571 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2572 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2572 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2573 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2573 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2574 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2574 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2575 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2576 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2577 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2577 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2578 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2579 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2580 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2581 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2582 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2583 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2584 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2585 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2586 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2587 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2588 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2589 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2589 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2590 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2591 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2592 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2593 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2594 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2595 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2596 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2597 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2598 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2599 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2600 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2601 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2601 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2602 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2603 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2604 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2605 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2606 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2607 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2608 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2609 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2610 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2611 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2612 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2613 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2613 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2614 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2615 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2616 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2617 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2618 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2619 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2620 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2621 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2621 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2622 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2622 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2623 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2623 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2624 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2625 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2626 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2627 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2628 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2628 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2629 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2629 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2630 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2630 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2631 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2632 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2633 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2633 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2634 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2635 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2636 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2637 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2638 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2639 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2640 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2641 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2642 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2643 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2644 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2645 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2645 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2646 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2647 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2648 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2649 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2650 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2650 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2651 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2652 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2653 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2654 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2655 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2656 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2657 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2657 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2658 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2659 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2660 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2661 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2662 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2663 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2664 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2665 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2666 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2667 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2668 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2669 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2669 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2670 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2670 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2671 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2671 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2672 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2672 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2673 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2674 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2675 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2676 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2677 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2677 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2678 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2678 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2679 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2679 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2680 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2681 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2682 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2683 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2684 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2685 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2686 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2686 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2687 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2688 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2688 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2689 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2690 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2691 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2691 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2692 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2692 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2693 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2694 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2695 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2696 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2697 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2698 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2698 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2699 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2699 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2700 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2700 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2701 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2701 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2702 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2703 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2704 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2705 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2706 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2706 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2707 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2707 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2708 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2708 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2709 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2710 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2711 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2712 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2712 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2713 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2714 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2715 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2715 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2716 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2716 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2717 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2717 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2718 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2718 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2719 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2719 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2720 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2720 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2721 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2721 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2722 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2722 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2723 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2723 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2724 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2724 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2725 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2725 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2726 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2726 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2727 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2727 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2728 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2728 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2729 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2729 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2730 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2730 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2731 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2731 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2732 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2732 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2733 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2733 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2734 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2734 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2735 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2735 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2736 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2736 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2737 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2737 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2738 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2738 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2739 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2739 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2740 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2740 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2741 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2741 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2742 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2742 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2743 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2743 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2744 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2745 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2746 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2747 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2747 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2748 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2749 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2750 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2751 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2751 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2752 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2753 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2754 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2754 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2755 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2756 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2757 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2758 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2758 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2759 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2760 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2761 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2762 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2763 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2764 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2765 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2765 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2766 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2767 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2768 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2769 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2769 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2770 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2771 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2772 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2773 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2773 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2774 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2775 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2776 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2777 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2778 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2779 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2780 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2780 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2781 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2782 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2783 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2784 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2784 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2785 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2786 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2787 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2788 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2788 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2789 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2790 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2791 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2792 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2793 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2794 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2795 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2795 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2796 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2797 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2798 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2799 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2799 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2800 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2801 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2802 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2803 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2803 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2804 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2805 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2805 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2806 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2806 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2807 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2807 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2808 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2809 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2810 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2810 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2811 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2812 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2813 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2814 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2814 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2815 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2815 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2816 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2817 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2817 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2818 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2818 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2819 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2820 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2821 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2821 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2822 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2822 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2823 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2824 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2824 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2825 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2825 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2826 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2827 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2828 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2828 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2829 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2829 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2830 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2831 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2832 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2832 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2833 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2834 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2835 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2836 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2836 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2837 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2838 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2839 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2839 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2840 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2840 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2841 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2842 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2843 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2843 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2844 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2845 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2846 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2846 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2847 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2847 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2848 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2849 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2850 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2850 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2851 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2851 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2852 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2853 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2853 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2854 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2855 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2855 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2856 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2856 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2857 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2858 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2859 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2859 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2860 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2860 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2861 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2862 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2862 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2863 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2863 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2864 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2864 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2865 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2866 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2866 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2867 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2867 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2868 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2869 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2870 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2870 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2871 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2871 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2872 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2873 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2873 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2874 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2875 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2875 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2876 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2877 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2877 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2878 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2879 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2879 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2880 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2881 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2881 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2882 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2883 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2883 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2884 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2885 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2885 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2886 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2887 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2887 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2888 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2889 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2890 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2890 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2891 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2891 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2892 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2892 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2893 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2893 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2894 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2894 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2895 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2895 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2896 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2896 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2897 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2897 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2898 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2898 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2899 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2899 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2900 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2900 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2901 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2901 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2902 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2902 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2903 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2903 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2904 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2904 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2905 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2905 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2906 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2906 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2907 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2907 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2908 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2908 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2909 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2909 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2910 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2910 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2911 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2911 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2912 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2912 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2913 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2913 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2914 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2914 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2915 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2915 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2916 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2916 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2917 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2917 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2918 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2918 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2919 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2919 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2920 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2920 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2921 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2921 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2922 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2922 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2923 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2923 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2924 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2924 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2925 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2925 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2926 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2926 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2927 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2927 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2928 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2928 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2929 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2929 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2930 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2930 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2931 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2931 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2932 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2932 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2933 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2933 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2934 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2934 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2935 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2935 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2936 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2936 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2937 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2937 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2938 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2938 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2939 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2939 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2940 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2940 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2941 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2941 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2942 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2942 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2943 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2943 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2944 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2944 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2945 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2945 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2946 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2946 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2947 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2947 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2948 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2948 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2949 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2949 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2950 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2950 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2951 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2951 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2952 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2952 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2953 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2953 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2954 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2954 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2955 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2955 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2956 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2956 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2957 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2957 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2958 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2958 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2959 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2959 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2960 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2961 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2962 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2963 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2963 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2964 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2964 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2965 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2965 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2966 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2966 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2967 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2968 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2969 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2970 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2971 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2972 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2972 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2973 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2973 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2974 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2975 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2976 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2977 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2977 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2978 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2979 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2980 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2981 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2982 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2983 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2984 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2985 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2986 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2987 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2988 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2989 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2989 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2990 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2991 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2992 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2993 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2994 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2995 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2996 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2997 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2998 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2999 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3000 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3001 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3001 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3002 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3003 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3004 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3005 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3006 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3007 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3008 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3009 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3010 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3011 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3012 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3013 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3013 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3014 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3014 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3015 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3015 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3016 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3016 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3017 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3018 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3019 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3020 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3021 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3021 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3022 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3022 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3023 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3024 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3024 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3025 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3026 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3027 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3028 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3029 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3029 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3030 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3031 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3032 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3033 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3034 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3035 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3035 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3036 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3036 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3037 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3038 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3039 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3040 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3041 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3042 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3042 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3043 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3043 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3044 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3044 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3045 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3046 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3047 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3048 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3048 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3049 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3049 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3050 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3050 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3051 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3051 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3052 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3053 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3054 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3055 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3056 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3057 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3058 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3058 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3059 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3059 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3060 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3060 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3061 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3061 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3062 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3062 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3063 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3063 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3064 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3064 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3065 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3065 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3066 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3066 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3067 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3067 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3068 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3068 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3069 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3069 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3070 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3070 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3071 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3071 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3072 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3072 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3073 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3073 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3074 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3074 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3075 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3075 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3076 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3076 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3077 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3077 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3078 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3078 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3079 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3079 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3080 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3080 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3081 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3081 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3082 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3082 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3083 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3083 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3084 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3084 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3085 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3085 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3086 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3086 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3087 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3088 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3088 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3089 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3089 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3090 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3091 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3091 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3092 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3093 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3093 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3094 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3095 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3096 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3096 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3097 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3097 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3098 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3099 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3099 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3100 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3101 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3101 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3102 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3103 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3103 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3104 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3104 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3105 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3106 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3107 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3107 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3108 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3108 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3109 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3110 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3110 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3111 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3112 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3112 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3113 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3114 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3115 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3115 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3116 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3117 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3118 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3119 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3119 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3120 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3121 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3122 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3123 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3123 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3124 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3125 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3126 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3127 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3128 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3129 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3130 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3130 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3131 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3132 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3133 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3134 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3134 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3135 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3136 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3137 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3138 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3138 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3139 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3140 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3141 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3142 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3142 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3143 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3144 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3145 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3146 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3146 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3147 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3148 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3149 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3150 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3151 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3152 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3153 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3153 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3154 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3155 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3156 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3157 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3157 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3158 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3159 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3160 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3161 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3161 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3162 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3163 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3164 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3165 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3165 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3166 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3167 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3168 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3169 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3169 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3170 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3171 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3172 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3172 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3173 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3174 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3175 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3176 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3176 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3177 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3178 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3178 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3179 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3180 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3180 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3181 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3182 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3182 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3183 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3184 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3184 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3185 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3186 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3187 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3188 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3188 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3189 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3189 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3190 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3191 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3192 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3192 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3193 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3193 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3194 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3195 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3195 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3196 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3197 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3197 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3198 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3199 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3199 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3200 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3201 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3201 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3202 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3203 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3203 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3204 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3205 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3205 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3206 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3207 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3207 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3208 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3208 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3209 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3210 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3211 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3211 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3212 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3212 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3213 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3214 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3215 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3215 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3216 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3216 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3217 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3218 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3219 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3219 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3220 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3220 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3221 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3222 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3222 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3223 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3223 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3224 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3225 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3226 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3226 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3227 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3227 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3228 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3229 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3230 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3230 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3231 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3231 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3232 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3233 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3234 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3235 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3235 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3236 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3236 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3237 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3238 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3239 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3240 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3241 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3242 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3242 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3243 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3243 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3244 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3244 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3245 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3246 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3247 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3247 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3248 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3249 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3249 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3250 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3250 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3251 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3251 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3252 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3253 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3253 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3254 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3254 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3255 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3255 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3256 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3256 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3257 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3257 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3258 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3258 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3259 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3259 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3260 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3260 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3261 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3261 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3262 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3262 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3263 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3263 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3264 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3264 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3265 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3266 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3267 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3268 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3269 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3269 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3270 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3270 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3271 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3271 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3272 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3273 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3274 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3275 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3276 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3276 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3277 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3277 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3278 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3278 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3279 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3280 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3281 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3282 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3283 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3284 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3284 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3285 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3285 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3286 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3287 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3288 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3288 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3289 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3290 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3291 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3291 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3292 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3292 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3293 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3293 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3294 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3295 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3296 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3297 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3298 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3298 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3299 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3299 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3300 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3300 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3301 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3302 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3302 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3303 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3303 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3304 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3304 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3305 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3305 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3306 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3306 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3307 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3307 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3308 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3308 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3309 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3309 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3310 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3310 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3311 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3311 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3312 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3312 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3313 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3313 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3314 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3314 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3315 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3315 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3316 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3316 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3317 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3318 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3318 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3319 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3319 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3320 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3320 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3321 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3322 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3323 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3323 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3324 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3325 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3325 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3326 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3326 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3327 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3327 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3328 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3329 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3330 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3331 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3332 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3333 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3333 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3334 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3334 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3335 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3335 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3336 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3337 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3338 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3339 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3340 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3340 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3341 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3341 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3342 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3342 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3343 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3343 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3344 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3344 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3345 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3345 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3346 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3346 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3347 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3347 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3348 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3348 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3349 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3349 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3350 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3350 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3351 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3351 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3352 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3352 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3353 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3353 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3354 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3354 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3355 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3355 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3356 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3356 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3357 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3357 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3358 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3358 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3359 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3359 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3360 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3360 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3361 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3361 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3362 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3363 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3363 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3364 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3364 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3365 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3365 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3366 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3367 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3368 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3369 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3369 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3370 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3371 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3372 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3372 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3373 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3373 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3374 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3374 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3375 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3375 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3376 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3376 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3377 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3377 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3378 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3378 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3379 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3379 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3380 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3380 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3381 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3381 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3382 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3382 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3383 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3383 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3384 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3384 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3385 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3385 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3386 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3386 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3387 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3387 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3388 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3388 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3389 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3389 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3390 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3390 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3391 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3391 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3392 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3393 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3394 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3394 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3395 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3396 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3396 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3397 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3398 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3399 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3400 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3400 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3401 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3401 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3402 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3402 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3403 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3403 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3404 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3405 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3405 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3406 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3406 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3407 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3407 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3408 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3408 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3409 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3410 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3411 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3412 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3413 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3413 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3414 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3414 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3415 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3416 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3416 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3417 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3418 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3418 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3419 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3420 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3420 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3421 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3421 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3422 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3423 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3424 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3425 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3426 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3427 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3428 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3428 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3429 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3430 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3430 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3431 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3432 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3432 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3433 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3433 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3434 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3434 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3435 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3436 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3436 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3437 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3437 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3438 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3439 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3440 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3440 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3441 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3441 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3442 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3443 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3444 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3444 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3445 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3445 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3446 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3447 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3447 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3448 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3448 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3449 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3450 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3451 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3451 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3452 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3452 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3453 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3454 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3455 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3455 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3456 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3456 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3457 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3458 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3459 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3460 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3460 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3461 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3462 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3463 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3464 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3464 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3465 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3466 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3467 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3468 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3468 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3469 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3470 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3471 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3472 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3472 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3473 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3474 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3475 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3476 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3476 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3477 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3478 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3479 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3480 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3480 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3481 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3482 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3483 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3484 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3484 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3485 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3486 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3487 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3488 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3488 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3489 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3490 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3491 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3492 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3492 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3493 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3494 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3495 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3496 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3496 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3497 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3498 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3499 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3500 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3500 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3501 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3502 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3503 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3504 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3504 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3505 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3506 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3507 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3508 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3508 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3509 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3510 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3511 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3512 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3512 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3513 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3514 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3515 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3516 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3516 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3517 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3518 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3519 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3520 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3520 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3521 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3522 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3523 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3524 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3524 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3525 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3526 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3527 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3528 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3528 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3529 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3530 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3531 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3532 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3532 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3533 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3534 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3535 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3536 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3536 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3537 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3538 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3539 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3539 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3540 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3541 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3542 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3543 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3543 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3544 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3545 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3545 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3546 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3547 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3547 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3548 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3548 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3549 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3549 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3550 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3550 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3551 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3552 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3552 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3553 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3554 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3554 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3555 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3556 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3556 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3557 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3558 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3558 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3559 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3559 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3560 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3561 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3562 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3562 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3563 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3563 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3564 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3565 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3566 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3566 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3567 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3567 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3568 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3568 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3569 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3569 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3570 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3570 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3571 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3571 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3572 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3572 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3573 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3573 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3574 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3574 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3575 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3575 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3576 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3576 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3577 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3578 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3578 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3579 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3580 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3581 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3582 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3583 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3584 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3585 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3586 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3587 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3588 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3589 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3590 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3590 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3591 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3592 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3593 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3594 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3595 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3596 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3597 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3598 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3599 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3600 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3601 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3601 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3602 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3602 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3603 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3603 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3604 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3605 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3606 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3606 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3607 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3608 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3609 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3610 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3611 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3612 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3613 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3614 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3615 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3616 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3617 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3618 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3618 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3619 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3620 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3621 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3621 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3622 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3623 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3624 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3625 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3626 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3627 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3628 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3628 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3629 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3630 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3630 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3631 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3632 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3633 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3634 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3635 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3636 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3637 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3638 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3639 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3640 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3641 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3642 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3643 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3643 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3644 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3645 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3646 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3647 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3648 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3649 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3650 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3650 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3651 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3651 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3652 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3652 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3653 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3654 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3655 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3656 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3657 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3658 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3658 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3659 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3659 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3660 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3661 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3662 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3663 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3664 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3664 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3665 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3666 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3667 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3668 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3669 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3670 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3670 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3671 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3671 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3672 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3673 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3674 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3675 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3676 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3676 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3677 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3677 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3678 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3679 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3680 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3681 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3682 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3683 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3684 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3685 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3686 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3686 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3687 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3688 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3688 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3689 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3690 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3691 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3691 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3692 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3692 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3693 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3694 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3695 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3696 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3697 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3698 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3698 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3699 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3699 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3700 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3700 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3701 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3701 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3702 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3702 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3703 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3704 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3705 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3706 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3706 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3707 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3707 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3708 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3708 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3709 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3709 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3710 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3711 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3712 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3713 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3714 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3715 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3715 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3716 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3716 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3717 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3717 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3718 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3718 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3719 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3719 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3720 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3720 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3721 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3721 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3722 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3722 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3723 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3723 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3724 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3724 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3725 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3725 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3726 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3726 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3727 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3727 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3728 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3728 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3729 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3729 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3730 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3730 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3731 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3731 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3732 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3732 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3733 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3733 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3734 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3734 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3735 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3735 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3736 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3736 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3737 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3737 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3738 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3738 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3739 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3739 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3740 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3740 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3741 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3741 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3742 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3742 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3743 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3743 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3744 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3744 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3745 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3745 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3746 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3746 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3747 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3747 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3748 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3748 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3749 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3749 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3750 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3750 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3751 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3751 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3752 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3752 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3753 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3753 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3754 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3754 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3755 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3755 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3756 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3756 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3757 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3757 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3758 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3758 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3759 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3759 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3760 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3760 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3761 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3761 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3762 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3762 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3763 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3763 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3764 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3764 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3765 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3765 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3766 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3766 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3767 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3767 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3768 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3768 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3769 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3769 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3770 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3770 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3771 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3771 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3772 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3772 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3773 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3774 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3775 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3775 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3776 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3777 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3778 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3779 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3779 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3780 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3781 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3782 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3782 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3783 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3784 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3784 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3785 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3786 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3786 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3787 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3788 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3789 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3790 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3790 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3791 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3792 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3793 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3794 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3794 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3795 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3796 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3797 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3798 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3798 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3799 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3800 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3801 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3801 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3802 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3803 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3803 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3804 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3805 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3805 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3806 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3806 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3807 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3807 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3808 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3809 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3809 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3810 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3810 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3811 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3812 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3813 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3813 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3814 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3814 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3815 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3815 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3816 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3817 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3817 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3818 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3818 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3819 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3820 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3821 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3821 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3822 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3822 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3823 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3824 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3825 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3825 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3826 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3827 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3828 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3829 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3829 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3830 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3831 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3832 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3832 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3833 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3834 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3835 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3836 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3836 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3837 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3838 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3839 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3839 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3840 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3840 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3841 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3842 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3843 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3843 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3844 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3844 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3845 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3846 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3846 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3847 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3847 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3848 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3848 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3849 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3850 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3850 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3851 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3851 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3852 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3852 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3853 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3853 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3854 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3855 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3856 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3856 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3857 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3858 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3859 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3860 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3860 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3861 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3862 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3862 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3863 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3863 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3864 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3864 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3865 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3866 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3866 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3867 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3867 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3868 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3868 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3869 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3870 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3870 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3871 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3871 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3872 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3873 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3873 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3874 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3875 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3875 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3876 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3877 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3877 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3878 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3879 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3879 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3880 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3881 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3881 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3882 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3883 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3883 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3884 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3885 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3885 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3886 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3887 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3887 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3888 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3889 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3890 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3890 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3891 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3891 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3892 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3892 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3893 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3893 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3894 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3894 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3895 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3895 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3896 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3896 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3897 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3897 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3898 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3898 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3899 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3899 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3900 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3900 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3901 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3901 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3902 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3902 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3903 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3903 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3904 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3904 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3905 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3905 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3906 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3906 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3907 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3907 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3908 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3908 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3909 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3909 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3910 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3910 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3911 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3911 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3912 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3912 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3913 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3913 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3914 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3914 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3915 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3915 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3916 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3916 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3917 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3917 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3918 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3918 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3919 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3919 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3920 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3920 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3921 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3921 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3922 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3922 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3923 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3923 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3924 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3924 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3925 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3925 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3926 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3926 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3927 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3927 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3928 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3928 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3929 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3929 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3930 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3930 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3931 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3931 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3932 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3932 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3933 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3933 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3934 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3934 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3935 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3935 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3936 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3936 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3937 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3937 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3938 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3938 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3939 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3939 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3940 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3940 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3941 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3941 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3942 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3942 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3943 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3943 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3944 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3944 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3945 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3945 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3946 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3946 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3947 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3947 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3948 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3948 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3949 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3949 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3950 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3950 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3951 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3951 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3952 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3952 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3953 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3953 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3954 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3954 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3955 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3955 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3956 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3956 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3957 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3957 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3958 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3958 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3959 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3959 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3960 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3960 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3961 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3961 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3962 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3962 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3963 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3963 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3964 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3964 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3965 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3965 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3966 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3966 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3967 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3967 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3968 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3968 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3969 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3970 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3971 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3972 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3973 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3974 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3974 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3975 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3976 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3977 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3978 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3979 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3980 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3981 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3982 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3983 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3984 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3985 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3986 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3986 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3987 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3988 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3989 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3990 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3991 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3992 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3993 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3994 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3994 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3995 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3995 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3996 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3997 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3998 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3999 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4000 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4000 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4001 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4001 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4002 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4002 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4003 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4003 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4004 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4005 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4006 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4007 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4008 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4009 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4010 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4011 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4012 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4013 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4013 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4014 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4014 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4015 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4016 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4017 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4018 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4019 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4020 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4021 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4022 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4023 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4024 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4025 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4026 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4026 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4027 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4028 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4029 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4029 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4030 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4031 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4032 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4033 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4034 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4035 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4035 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4036 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4037 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4038 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4039 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4040 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4041 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4042 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4042 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4043 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4043 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4044 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4044 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4045 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4046 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4046 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4047 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4048 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4049 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4049 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4050 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4050 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4051 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4051 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4052 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4053 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4054 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4054 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4055 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4056 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4057 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4058 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4058 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4059 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4059 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4060 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4060 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4061 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4061 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4062 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4062 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4063 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4063 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4064 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4064 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4065 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4065 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4066 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4066 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4067 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4067 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4068 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4068 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4069 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4069 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4070 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4070 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4071 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4071 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4072 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4072 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4073 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4073 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4074 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4074 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4075 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4075 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4076 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4076 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4077 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4077 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4078 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4078 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4079 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4079 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4080 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4080 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4081 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4081 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4082 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4082 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4083 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4083 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4084 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4084 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4085 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4085 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4086 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4086 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4087 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4087 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4088 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4088 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4089 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4089 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4090 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4090 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4091 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4091 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4092 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4092 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4093 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4093 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4094 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4094 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4095 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4095 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4096 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4096 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4097 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4097 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4098 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4098 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4099 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4099 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4100 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4100 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4101 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4101 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4102 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4102 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4103 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4103 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4104 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4104 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4105 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4105 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4106 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4106 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4107 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4107 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4108 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4108 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4109 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4109 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4110 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4110 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4111 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4111 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4112 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4112 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4113 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4113 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4114 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4114 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4115 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4115 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4116 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4117 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4117 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4118 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4119 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4120 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4121 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4121 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4122 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4123 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4124 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4125 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4125 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4126 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4127 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4128 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4129 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4129 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4130 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4131 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4132 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4132 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4133 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4134 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4135 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4136 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4136 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4137 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4138 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4139 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4140 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4140 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4141 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4142 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4143 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4144 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4144 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4145 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4146 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4147 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4148 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4148 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4149 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4150 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4151 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4152 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4152 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4153 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4154 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4155 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4156 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4156 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4157 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4158 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4159 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4160 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4160 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4161 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4162 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4163 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4164 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4164 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4165 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4166 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4167 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4168 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4168 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4169 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4170 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4171 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4172 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4172 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4173 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4174 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4175 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4176 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4176 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4177 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4178 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4178 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4179 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4180 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4180 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4181 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4182 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4182 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4183 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4184 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4184 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4185 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4186 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4187 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4187 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4188 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4189 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4189 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4190 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4191 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4191 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4192 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4193 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4193 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4194 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4195 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4195 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4196 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4197 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4197 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4198 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4199 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4199 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4200 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4201 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4201 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4202 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4203 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4203 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4204 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4205 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4205 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4206 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4207 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4207 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4208 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4208 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4209 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4210 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4211 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4211 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4212 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4212 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4213 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4214 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4215 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4215 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4216 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4216 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4217 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4218 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4219 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4219 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4220 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4220 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4221 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4222 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4223 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4223 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4224 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4225 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4226 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4226 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4227 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4227 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4228 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4229 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4230 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4230 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4231 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4231 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4232 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4233 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4234 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4234 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4235 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4235 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4236 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4236 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4237 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4237 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4238 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4238 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4239 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4239 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4240 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4240 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4241 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4241 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4242 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4242 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4243 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4243 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4244 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4244 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4245 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4245 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4246 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4246 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4247 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4247 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4248 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4248 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4249 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4249 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4250 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4250 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4251 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4251 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4252 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4252 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4253 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4253 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4254 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4254 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4255 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4255 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4256 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4256 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4257 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4257 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4258 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4258 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4259 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4259 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4260 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4260 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4261 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4261 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4262 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4262 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4263 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4263 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4264 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4264 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4265 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4265 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4266 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4266 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4267 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4267 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4268 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4268 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4269 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4269 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4270 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4270 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4271 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4271 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4272 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4272 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4273 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4273 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4274 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4274 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4275 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4275 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4276 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4276 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4277 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4277 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4278 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4278 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4279 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4279 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4280 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4280 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4281 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4281 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4282 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4282 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4283 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4283 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4284 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4284 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4285 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4285 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4286 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4286 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4287 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4287 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4288 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4288 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4289 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4289 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4290 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4290 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4291 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4291 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4292 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4292 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4293 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4293 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4294 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4294 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4295 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4295 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4296 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4296 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4297 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4297 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4298 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4298 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4299 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4299 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4300 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4300 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4301 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4301 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4302 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4302 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4303 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4303 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4304 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4304 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4305 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4305 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4306 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4306 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4307 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4307 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4308 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4308 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4309 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4309 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4310 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4310 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4311 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4311 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4312 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4312 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4313 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4313 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4314 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4314 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4315 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4315 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4316 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4316 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4317 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4317 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4318 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4318 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4319 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4319 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4320 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4320 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4321 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4321 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4322 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4322 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4323 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4323 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4324 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4324 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4325 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4325 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4326 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4326 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4327 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4327 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4328 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4328 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4329 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4329 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4330 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4330 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4331 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4331 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4332 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4332 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4333 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4333 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4334 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4334 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4335 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4335 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4336 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4336 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4337 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4337 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4338 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4338 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4339 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4339 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4340 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4340 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4341 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4341 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4342 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4342 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4343 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4344 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4344 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4345 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4345 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4346 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4347 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4348 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4349 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4349 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4350 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4351 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4352 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4352 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4353 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4353 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4354 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4355 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4356 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4356 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4357 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4357 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4358 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4359 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4360 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4360 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4361 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4361 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4362 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4363 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4363 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4364 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4364 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4365 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4365 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4366 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4367 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4368 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4369 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4369 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4370 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4371 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4372 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4372 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4373 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4373 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4374 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4374 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4375 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4375 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4376 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4376 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4377 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4377 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4378 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4378 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4379 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4379 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4380 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4380 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4381 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4381 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4382 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4382 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4383 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4383 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4384 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4384 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4385 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4385 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4386 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4386 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4387 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4387 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4388 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4388 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4389 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4389 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4390 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4390 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4391 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4391 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4392 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4393 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4394 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4394 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4395 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4396 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4396 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4397 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4398 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4399 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4400 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4400 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4401 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4401 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4402 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4402 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4403 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4403 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4404 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4405 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4405 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4406 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4406 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4407 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4407 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4408 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4408 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4409 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4410 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4411 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4412 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4413 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4413 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4414 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4414 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4415 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4416 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4417 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4418 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4418 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4419 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4420 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4420 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4421 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4421 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4422 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4423 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4424 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4425 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4426 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4427 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4428 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4429 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4430 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4430 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4431 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4431 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4432 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4432 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4433 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4433 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4434 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4434 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4435 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4435 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4436 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4436 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4437 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4437 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4438 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4438 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4439 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4439 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4440 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4440 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4441 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4441 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4442 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4442 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4443 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4443 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4444 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4444 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4445 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4445 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4446 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4446 (1 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4447 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4447 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4448 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4448 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4449 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4449 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4450 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4450 (4 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4451 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4451 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4452 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4452 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4453 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4453 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4454 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4454 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4455 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4455 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4456 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4456 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4457 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4457 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4458 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4458 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4459 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4459 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4460 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4461 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4462 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4463 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4463 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4464 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4465 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4466 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4466 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4467 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4468 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4469 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4470 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4470 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4471 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4472 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4473 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4474 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4474 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4475 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4476 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4477 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4478 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4478 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4479 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4480 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4481 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4482 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4482 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4483 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4484 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4485 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4486 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4486 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4487 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4488 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4489 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4490 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4490 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4491 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4492 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4493 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4494 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4495 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4496 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4497 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4497 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4498 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4499 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4500 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4501 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4501 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4502 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4503 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4504 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4505 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4505 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4506 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4507 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4508 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4509 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4509 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4510 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4511 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4512 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4513 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4513 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4514 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4515 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4516 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4517 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4517 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4518 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4519 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4520 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4520 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4521 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4522 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4523 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4524 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4524 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4525 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4526 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4527 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4528 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4528 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4529 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4530 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4531 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4532 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4532 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4533 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4534 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4535 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4536 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4536 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4537 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4538 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4539 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4540 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4540 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4541 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4542 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4543 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4544 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4544 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4545 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4545 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4546 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4547 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4548 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4548 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4549 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4549 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4550 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4551 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4552 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4552 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4553 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4554 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4555 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4556 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4556 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4557 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4558 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4559 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4559 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4560 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4561 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4562 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4562 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4563 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4563 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4564 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4565 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4566 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4566 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4567 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4567 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4568 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4568 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4569 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4569 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4570 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4570 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4571 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4571 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4572 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4572 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4573 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4573 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4574 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4574 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4575 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4575 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4576 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4576 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4577 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4577 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4578 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4578 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4579 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4579 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4580 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4580 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4581 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4581 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4582 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4582 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4583 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4583 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4584 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4584 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4585 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4585 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4586 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4586 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4587 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4587 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4588 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4588 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4589 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4589 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4590 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4590 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4591 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4591 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4592 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4592 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4593 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4593 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4594 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4594 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4595 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4595 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4596 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4596 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4597 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4597 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4598 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4598 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4599 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4599 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4600 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4600 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4601 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4601 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4602 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4602 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4603 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4603 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4604 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4604 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4605 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4605 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4606 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4606 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4607 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4607 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4608 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4608 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4609 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4609 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4610 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4610 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4611 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4611 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4612 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4612 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4613 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4613 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4614 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4614 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4615 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4615 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4616 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4616 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4617 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4617 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4618 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4618 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4619 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4619 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4620 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4620 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4621 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4621 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4622 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4622 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4623 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4623 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4624 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4624 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4625 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4625 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4626 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4626 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4627 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4627 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4628 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4628 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4629 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4629 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4630 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4630 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4631 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4631 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4632 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4632 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4633 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4633 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4634 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4634 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4635 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4635 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4636 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4636 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4637 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4637 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4638 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4638 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4639 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4639 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4640 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4640 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4641 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4641 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4642 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4642 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4643 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4643 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4644 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4644 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4645 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4645 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4646 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4646 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4647 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4647 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4648 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4648 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4649 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4649 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4650 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4650 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4651 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4651 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4652 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4652 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4653 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4653 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4654 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4654 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4655 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4655 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4656 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4656 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4657 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4657 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4658 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4658 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4659 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4659 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4660 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4660 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4661 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4661 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4662 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4662 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4663 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4663 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4664 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4664 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4665 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4665 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4666 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4666 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4667 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4667 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4668 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4668 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4669 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4669 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4670 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4670 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4671 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4671 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4672 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4672 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4673 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4673 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4674 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4674 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4675 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4675 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4676 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4676 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4677 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4677 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4678 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4678 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4679 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4679 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4680 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4680 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4681 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4681 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4682 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4682 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4683 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4683 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4684 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4684 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4685 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4685 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4686 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4686 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4687 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4687 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4688 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4688 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4689 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4689 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4690 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4690 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4691 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4691 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4692 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4692 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4693 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4693 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4694 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4694 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4695 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4695 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4696 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4696 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4697 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4697 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4698 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4698 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4699 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4699 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4700 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4700 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4701 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4701 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4702 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4702 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4703 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4703 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4704 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4704 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4705 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4705 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4706 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4706 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4707 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4707 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4708 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4708 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4709 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4709 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4710 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4710 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4711 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4711 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4712 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4712 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4713 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4713 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4714 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4714 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4715 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4716 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4716 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4717 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4717 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4718 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4719 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4719 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4720 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4721 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4721 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4722 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4723 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4724 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4724 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4725 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4725 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4726 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4727 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4727 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4728 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4729 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4729 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4730 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4731 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4732 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4733 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4733 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4734 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4735 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4736 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4736 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4737 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4737 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4738 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4739 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4739 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4740 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4740 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4741 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4741 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4742 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4743 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4743 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4744 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4745 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4745 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4746 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4747 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4747 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4748 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4749 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4749 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4750 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4751 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4752 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4752 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4753 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4754 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4754 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4755 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4756 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4756 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4757 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4758 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4759 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4760 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4760 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4761 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4762 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4763 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4764 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4764 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4765 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4766 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4767 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4768 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4768 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4769 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4770 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4771 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4772 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4772 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4773 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4774 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4775 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4776 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4776 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4777 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4778 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4779 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4780 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4780 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4781 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4782 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4783 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4784 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4784 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4785 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4786 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4787 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4788 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4788 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4789 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4790 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4791 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4792 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4792 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4793 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4794 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4795 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4796 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4796 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4797 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4798 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4799 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4800 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4800 (3 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4801 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4801 (2 ms) [----------] 4802 tests from TLSVersionRanges/TestPolicyVersionRange (7182 ms total) [----------] 16 tests from AllHashFuncs/TlsHkdfTest [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 Hash = SHA-256 Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 Hash = SHA-384 Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 Hash = SHA-256 Output: [32] 416c5392b9f36df188e90eb14d17bf0da190bfdb7f1f4956e6e566a569c8b15c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 Hash = SHA-384 Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 Hash = SHA-256 Output: [32] 16af00543a56c826a2a7fcb634668afd36dc8ecec4d26c7adce370363d60fa0b [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 Hash = SHA-384 Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 Hash = SHA-256 Output: [32] a568025a95c97f5538bcf797cc0fd5f6a88d15bc0e8574703ca365bd76cf9fd3 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 Hash = SHA-384 Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 Hash = SHA-256 Output: [32] 3e4e6ed0bcc4f4fff0f569d06c1e0e1032aad7a3eff6a8658ebeeec71f016d3c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 Hash = SHA-384 Output: [48] 41ea77098c900410ecbc37d85b54cd7b08151320ed1e3f5474f78b0638280637... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/0 Hash = SHA-256 Output: [32] b70800e38e486891b10f5e6f22536b846975aaa32ae7deaac3d1b405225c68f5 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/1 Hash = SHA-384 Output: [48] 13d3369f3c78a03240ee16e9111266c751add83ca1a39774d745ffa7889e5217... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/0 [ OK ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/1 [ OK ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/0 [ OK ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/1 [ OK ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/1 (0 ms) [----------] 16 tests from AllHashFuncs/TlsHkdfTest (1 ms total) [----------] 28 tests from EchAgentTest/TlsAgentEchTest [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ShortEchConfig/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.LongEchConfig/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.LongEchConfig/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.LongEchConfig/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.LongEchConfig/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedEchConfigVersion/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.UnsupportedHpkeKem/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchRejectIgnoreAllUnknownSuites/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigRejectEmptyPublicName/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.ApiInvalidArgs/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEarlyRetryConfigs/1 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoSniSoNoEch/1 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/0 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.NoEchConfigSoNoEch/1 (0 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/0 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/0 (1 ms) [ RUN ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/1 client: Changing state from INIT to CONNECTING [ OK ] EchAgentTest/TlsAgentEchTest.EchConfigDuplicateExtensions/1 (0 ms) [----------] 28 tests from EchAgentTest/TlsAgentEchTest (10 ms total) [----------] 34 tests from Tls13PskTest/Tls13PskTest [ RUN ] Tls13PskTest/Tls13PskTest.NormalExternal/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.NormalExternal/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.NormalExternal/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.NormalExternal/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.KeyTooLarge/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.KeyTooLarge/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.KeyTooLarge/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.KeyTooLarge/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 030366fce37e95cb624761292458f3e3127743e78ca4bbdf92c4cc9f1baf726c... handshake new: [92] 030366fce37e95cb624761292458f3e3127743e78ca4bbdf92c4cc9f1baf726c... record old: [96] 0200005c030366fce37e95cb624761292458f3e3127743e78ca4bbdf92c4cc9f... record new: [96] 0200005c030366fce37e95cb624761292458f3e3127743e78ca4bbdf92c4cc9f... server: Filtered packet: [215] 16030300600200005c030366fce37e95cb624761292458f3e3127743e78ca4bb... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] fefdf860ad54e52db0b83725e63aaa2e633388a935caf7352f07adb4ff76f6ec... handshake new: [92] fefdf860ad54e52db0b83725e63aaa2e633388a935caf7352f07adb4ff76f6ec... record old: [104] 0200005c000000000000005cfefdf860ad54e52db0b83725e63aaa2e633388a9... record new: [104] 0200005c000000000000005cfefdf860ad54e52db0b83725e63aaa2e633388a9... server: Filtered packet: [269] 16fefd000000000000000000680200005c000000000000005cfefdf860ad54e5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.LabelMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.LabelMismatch/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.LabelMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.LabelMismatch/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/0 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/1 (9 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/0 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/1 (5 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ClientOnly/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ClientOnly/1 (5 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropKexModes/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [508] 03034581c6bb6ebc21f33e9e599cdeffac9fbd23da32c6b86806f2ac4adbbfb5... handshake new: [502] 03034581c6bb6ebc21f33e9e599cdeffac9fbd23da32c6b86806f2ac4adbbfb5... record old: [512] 010001fc03034581c6bb6ebc21f33e9e599cdeffac9fbd23da32c6b86806f2ac... record new: [506] 010001f603034581c6bb6ebc21f33e9e599cdeffac9fbd23da32c6b86806f2ac... client: Filtered packet: [511] 16030101fa010001f603034581c6bb6ebc21f33e9e599cdeffac9fbd23da32c6... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropKexModes/0 (2 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropKexModes/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [263] fefd329bd5dd8af29a628d60c9d33e72921f70ca80098d8906d40c1e885282d7... handshake new: [257] fefd329bd5dd8af29a628d60c9d33e72921f70ca80098d8906d40c1e885282d7... record old: [275] 010001070000000000000107fefd329bd5dd8af29a628d60c9d33e72921f70ca... record new: [269] 010001010000000000000101fefd329bd5dd8af29a628d60c9d33e72921f70ca... client: Filtered packet: [282] 16feff0000000000000000010d010001010000000000000101fefd329bd5dd8a... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropKexModes/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d002045790af27a0c89c6008396cd81bb72d3661671e4b3aae65bd7a033cc... handshake old: [92] 0303954f088a605219a000f821f2e7a1c7e31731e45ec59b398bcd7a2a22d2f4... handshake new: [52] 0303954f088a605219a000f821f2e7a1c7e31731e45ec59b398bcd7a2a22d2f4... record old: [96] 0200005c0303954f088a605219a000f821f2e7a1c7e31731e45ec59b398bcd7a... record new: [56] 020000340303954f088a605219a000f821f2e7a1c7e31731e45ec59b398bcd7a... server: Filtered packet: [175] 1603030038020000340303954f088a605219a000f821f2e7a1c7e31731e45ec5... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d00208cd301816e5d406cab0607d156a8430c8b96559b33ad4980fff2f750... handshake old: [92] fefde8207a707d8263bb1b3c4a324464b645d8249ec9973ea500a4502f9497bb... handshake new: [52] fefde8207a707d8263bb1b3c4a324464b645d8249ec9973ea500a4502f9497bb... record old: [104] 0200005c000000000000005cfefde8207a707d8263bb1b3c4a324464b645d824... record new: [64] 020000340000000000000034fefde8207a707d8263bb1b3c4a324464b645d824... server: Filtered packet: [229] 16fefd00000000000000000040020000340000000000000034fefde8207a707d... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0000 extension new: [2] 0001 handshake old: [92] 0303204132cc2b80a6e69b7ae583e03a2ddf10f89f6df11e9661b978742bf244... handshake new: [92] 0303204132cc2b80a6e69b7ae583e03a2ddf10f89f6df11e9661b978742bf244... record old: [96] 0200005c0303204132cc2b80a6e69b7ae583e03a2ddf10f89f6df11e9661b978... record new: [96] 0200005c0303204132cc2b80a6e69b7ae583e03a2ddf10f89f6df11e9661b978... server: Filtered packet: [215] 16030300600200005c0303204132cc2b80a6e69b7ae583e03a2ddf10f89f6df1... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_PRE_SHARED_KEY: SSL received an invalid PreSharedKey extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0000 extension new: [2] 0001 handshake old: [92] fefd5279589ccb77ea014d5a3bd7962119fea302c5c5507e971ce07c7a84f605... handshake new: [92] fefd5279589ccb77ea014d5a3bd7962119fea302c5c5507e971ce07c7a84f605... record old: [104] 0200005c000000000000005cfefd5279589ccb77ea014d5a3bd7962119fea302... record new: [104] 0200005c000000000000005cfefd5279589ccb77ea014d5a3bd7962119fea302... server: Filtered packet: [269] 16fefd000000000000000000680200005c000000000000005cfefd5279589ccb... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_PRE_SHARED_KEY: SSL received an invalid PreSharedKey extension. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.PreferEpsk/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.PreferEpsk/0 (7 ms) [ RUN ] Tls13PskTest/Tls13PskTest.PreferEpsk/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.PreferEpsk/1 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/0 (8 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/1 (9 ms) [ RUN ] Tls13PskTest/Tls13PskTest.BadConfigValues/0 Version: TLS 1.3 [ OK ] Tls13PskTest/Tls13PskTest.BadConfigValues/0 (0 ms) [ RUN ] Tls13PskTest/Tls13PskTest.BadConfigValues/1 Version: DTLS 1.3 [ OK ] Tls13PskTest/Tls13PskTest.BadConfigValues/1 (0 ms) [ RUN ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/1 (2 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/1 (2 ms) [----------] 34 tests from Tls13PskTest/Tls13PskTest (141 ms total) [----------] 12 tests from Tls13PskTestWithCiphers/Tls13PskTestWithCiphers [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/0 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/1 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/2 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/3 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/4 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/4 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/5 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/5 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/0 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/1 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/2 (3 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/3 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/4 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/4 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/5 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/5 (3 ms) [----------] 12 tests from Tls13PskTestWithCiphers/Tls13PskTestWithCiphers (43 ms total) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileTest [ RUN ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/0 Version: DTLS 1.0 [ OK ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/0 (83 ms) [ RUN ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/1 Version: DTLS 1.2 [ OK ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/1 (81 ms) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileTest (164 ms total) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileTest [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/0 Version: TLS 1.0 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/0 (82 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/1 Version: TLS 1.1 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/1 (82 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/2 Version: TLS 1.2 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/2 (81 ms) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileTest (245 ms total) [----------] 1 test from KeyLogFileTLS13/KeyLogFileTest [ RUN ] KeyLogFileTLS13/KeyLogFileTest.KeyLogFile/0 Version: TLS 1.3 [ OK ] KeyLogFileTLS13/KeyLogFileTest.KeyLogFile/0 (86 ms) [----------] 1 test from KeyLogFileTLS13/KeyLogFileTest (86 ms total) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileUnsetTest [ RUN ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/0 Version: DTLS 1.0 [ OK ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/0 (81 ms) [ RUN ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/1 Version: DTLS 1.2 [ OK ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/1 (81 ms) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileUnsetTest (162 ms total) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileUnsetTest [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/0 Version: TLS 1.0 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/0 (82 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/1 Version: TLS 1.1 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/1 (81 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/2 Version: TLS 1.2 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/2 (82 ms) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileUnsetTest (245 ms total) [----------] 1 test from KeyLogFileTLS13/KeyLogFileUnsetTest [ RUN ] KeyLogFileTLS13/KeyLogFileUnsetTest.KeyLogFile/0 Version: TLS 1.3 [ OK ] KeyLogFileTLS13/KeyLogFileUnsetTest.KeyLogFile/0 (85 ms) [----------] 1 test from KeyLogFileTLS13/KeyLogFileUnsetTest (85 ms total) [----------] Global test environment tear-down [==========] 12780 tests from 103 test suites ran. (68353 ms total) [ PASSED ] 12278 tests. [ SKIPPED ] 502 tests, listed below: [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 [ SKIPPED ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 [ SKIPPED ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 [ SKIPPED ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 [ SKIPPED ] StreamOnly/TlsConnectStream.ShortRead/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 [ SKIPPED ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedYesNo/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoYes/1 [ SKIPPED ] EchAgentTest/TlsAgentEchTest.EchConfigsSupportedNoNo/1 YOU HAVE 64 DISABLED TESTS ssl_gtest.sh: #26: ssl_gtests ran successfully - PASSED DEBUG: Falling back to legacy XML report parsing using only sed TIMESTAMP ssl_gtests END: Tue Aug 3 01:11:13 UTC 2021 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64= NSS_CYCLES="" NSS_TESTS="" NSS_SSL_TESTS="crl iopr policy normal_normal" NSS_SSL_RUN="cov auth stapling signed_cert_timestamps scheme" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= NSS_DISABLE_HW_AES= NSS_DISABLE_HW_SHA1= NSS_DISABLE_HW_SHA2= NSS_DISABLE_PCLMUL= NSS_DISABLE_AVX= NSS_DISABLE_ARM_NEON= NSS_DISABLE_SSSE3= Tests summary: -------------- Passed: 7741 Failed: 0 Failed with core: 0 ASan failures: 0 Unknown status: 0 + popd ~/RPM/BUILD/nss-3.66.0 + exit 0 Processing files: libnss-3.66.0-alt2 Finding Provides (using /usr/lib/rpm/find-provides) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.vFfvju find-provides: running scripts (alternatives,debuginfo,lib,pam,perl,pkgconfig,python,python3,shell) lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libfreebl3.so: 9 symbols, 14 bpp lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libfreeblpriv3.so: 2 symbols, 11 bpp lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libnss3.so: 887 symbols, 20 bpp warning: hash collision: PK11_ParamFromIV SECKEY_RemovePrivateKeyListNode lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libnssckbi-testlib.so: 1 symbols, 10 bpp lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libnssdbm3.so: 7 symbols, 13 bpp lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libnsssysinit.so: 1 symbols, 10 bpp lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libnssutil3.so: 230 symbols, 18 bpp lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libpkcs11testmodule.so: 120 symbols, 17 bpp lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libsmime3.so: 169 symbols, 18 bpp lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libsoftokn3.so: 10 symbols, 14 bpp lib.prov: /usr/src/tmp/nss-buildroot/usr/lib64/libssl3.so: 107 symbols, 17 bpp Finding Requires (using /usr/lib/rpm/find-requires) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.ckmEQw find-requires: running scripts (cpp,debuginfo,files,lib,pam,perl,pkgconfig,pkgconfiglib,python,python3,rpmlib,shebang,shell,static,symlinks,systemd-services) find-requires: FINDPACKAGE-COMMANDS: cat grep sed warning: libnss provides another subpackage: nss Provides: nss = 3.66.0-alt2, nss-sysinit, nss-system-init, libnss-sysinit = 3.66.0-alt2, /usr/lib64/libnssckbi.so = 10, libfreebl3.so()(64bit) = set:hd7UIZDObjhQWg21AHBu1, libfreebl3.so(NSSRAWHASH_3.12.3)(64bit), libfreebl3.so(NSSprivate_3.11)(64bit), libfreeblpriv3.so()(64bit) = set:ecyEz6, libfreeblpriv3.so(NSSprivate_3.11)(64bit), libfreeblpriv3.so(NSSprivate_3.16)(64bit), libnss3.so()(64bit) = set:ndU8b10ZJmgtjZ9GcZKu7dDfqkcPHyNcMB9gLXs3K5bHd2Lw5uI1Z5HhnOXwFLHYPxKqEG4Ioe0jrxDEwZDALkeyheitVM7qGVuVIwYktwGMzstOK9ZjVEWLswgzBocRseqlxYBWTYfNU9wZgBmQb2vWQINYmQZ3WJ3gZfQg3ATG9hNIfj5rCUB8FxriAwXvqXFNc05GgnmlQnHbwtlZmUyVgqXlnXVXZ7dtpP7fZy17GrCQiSMjt0BstbedhhyuPHF3yimoaPlt999YJcZeLudtUiGQAy43AUoYouMcuX9WM6eB9cAEUb55Hga3uBGpJSXOZj5oZcYIail5SoXKgIZq7XwZ964MznuizqVsIoD05DAzmp1ZfZ21ZCbmZiNbZH0tHZ2Oqy93BggRKKs02hI6ssmiFetxZbIkqTnwvRC5ZFTxzTtEJTL8NKVo0BCq124yfTufKwDU7Z2o5JVLp985xYSFxKIRpGE7wSyTXTqAC9zHQn4G0utSuZ1OpOplx9JER5aBlzfA4fI77sRN4FVm8K2RdoYdhdQndZJn2QfCKmdR9xGZtOeZz4Gi56JXwHuUozkCNDOtGLm92oLwKJJjpOtyaoezEDlzDZD22mZtfnCqOVxSr8FFmXje76py3BlM3d4RC5vABaCTCw0W5CvX7C5BwgOZdEQt2qE9zesX8jAYefThD1FB5WemCJ5VZ4mVsctm0h5gPYtYQYswZFZsNSxZd7GxqOfINbZbnVdL4HdzKlW9D1NBDB0UigbZBlFahsj24JJaHsYvEjqKdiZup4coCQSyLPbmZqXalArMRawoWJBU8weAesUdhZCAZ62bgXgOP7QpJmPKoiJa0LNguSXGZ09Bec3iSnDdtwuwQH5kvbImn4jKHiM3FKCYl34y1gGWnNJWbl16zvwZ3b5q9BFq8K7MBITDkOpTpfDOqKpnZkZyx3zWEqQB1J3XnmYwzfJNUsSA0BZBdwZtfOUMzxRqd8n7GrRYVhBZjrchAynZ8lKxMbPeZigzq32vO1Z2B0OkdguczrNlCpGcQqZl2xS87H4PVka8CMlcyZfqRAbe5OdCaiNjyLsrIF49ThApX6Z2qkoPG2HBZEY3VLh6FOKGZsNk1Bvix7PfYQYbJSt56OH7ZGPjtSnNpI4spVtAOJgLNGso0ZuiqfnFZ1a9mGSd60ZvI76iGXcdZqZcZ91OMGGKzlRoHIwiNgfK55i88goKJBqQCEc6Zva8bkzjn8LJdBycCTppnwFuKVPMTvpcCuAJ3cmAQWUXCzgFjCZ0JzUH4cneg4xSnO82yvfDmrLV7qQWJAwNtc01VHDPseJZ78sg3EZuVckBGZpXxAMCaYn26sjQovaWN40dz221JgjC7u0T7RNZhKq3A0EfmidogFyFx1rKXadSXdJOUqRoON4pAxqkLVAXrESUUQewIdUNYTwLn2r78g26PfpadVGBP91lNZ2s4GQc4ZJoSUuRbfcyYutrtOeeoqp7hXFc0tSgYTDShgLRaIdP8ZB2NJBQRsDUtBXkQ3Y4e7vGwpqHqiEzFOliL8IeItaEl6gL9AZiSLVYiD2n1WiVXN3bhfTx6gSn8c0RWUXAS2ZFACjWaJeiK8S6Td7Cbw5XxoyutpFm1hx5vqI8S69JnpJPHJzpSRZ6T4tkRTpdRvoSs3a7cBwZxje0oo0TKUI8qCyR6vdZ0mWOWJ9IvZuQbmbUmo1PjdyZ7Mbt0Uv4DHc7SrvdIrmZKgfmA6G1R3BcFLjToIZtzj2bt0, libnss3.so(NSS_3.10)(64bit), libnss3.so(NSS_3.10.2)(64bit), libnss3.so(NSS_3.11)(64bit), libnss3.so(NSS_3.11.1)(64bit), libnss3.so(NSS_3.11.2)(64bit), libnss3.so(NSS_3.11.7)(64bit), libnss3.so(NSS_3.11.9)(64bit), libnss3.so(NSS_3.12)(64bit), libnss3.so(NSS_3.12.1)(64bit), libnss3.so(NSS_3.12.10)(64bit), libnss3.so(NSS_3.12.3)(64bit), libnss3.so(NSS_3.12.4)(64bit), libnss3.so(NSS_3.12.5)(64bit), libnss3.so(NSS_3.12.6)(64bit), libnss3.so(NSS_3.12.7)(64bit), libnss3.so(NSS_3.12.9)(64bit), libnss3.so(NSS_3.13)(64bit), libnss3.so(NSS_3.13.2)(64bit), libnss3.so(NSS_3.14)(64bit), libnss3.so(NSS_3.14.1)(64bit), libnss3.so(NSS_3.14.3)(64bit), libnss3.so(NSS_3.15)(64bit), libnss3.so(NSS_3.15.4)(64bit), libnss3.so(NSS_3.16.1)(64bit), libnss3.so(NSS_3.16.2)(64bit), libnss3.so(NSS_3.18)(64bit), libnss3.so(NSS_3.19)(64bit), libnss3.so(NSS_3.19.1)(64bit), libnss3.so(NSS_3.2)(64bit), libnss3.so(NSS_3.2.1)(64bit), libnss3.so(NSS_3.21)(64bit), libnss3.so(NSS_3.22)(64bit), libnss3.so(NSS_3.3)(64bit), libnss3.so(NSS_3.3.1)(64bit), libnss3.so(NSS_3.30)(64bit), libnss3.so(NSS_3.31)(64bit), libnss3.so(NSS_3.33)(64bit), libnss3.so(NSS_3.34)(64bit), libnss3.so(NSS_3.39)(64bit), libnss3.so(NSS_3.4)(64bit), libnss3.so(NSS_3.43)(64bit), libnss3.so(NSS_3.44)(64bit), libnss3.so(NSS_3.45)(64bit), libnss3.so(NSS_3.47)(64bit), libnss3.so(NSS_3.5)(64bit), libnss3.so(NSS_3.52)(64bit), libnss3.so(NSS_3.53)(64bit), libnss3.so(NSS_3.55)(64bit), libnss3.so(NSS_3.58)(64bit), libnss3.so(NSS_3.59)(64bit), libnss3.so(NSS_3.6)(64bit), libnss3.so(NSS_3.62)(64bit), libnss3.so(NSS_3.65)(64bit), libnss3.so(NSS_3.66)(64bit), libnss3.so(NSS_3.7)(64bit), libnss3.so(NSS_3.7.1)(64bit), libnss3.so(NSS_3.8)(64bit), libnss3.so(NSS_3.9)(64bit), libnss3.so(NSS_3.9.2)(64bit), libnss3.so(NSS_3.9.3)(64bit), libnssckbi-testlib.so()(64bit) = set:dce7, libnssckbi-testlib.so(NSS_3.1)(64bit), libnssdbm3.so()(64bit) = set:gda4vcNZCfQn24fm, libnssdbm3.so(NSSDBM_3.12)(64bit), libnsssysinit.so()(64bit) = set:dcus, libnsssysinit.so(NSS_3.15)(64bit), libnssutil3.so()(64bit) = set:ldFbKIZ239ftDoTSGREXK8rXpuxcUWSryjJuqO8Hkdv0HC11hKzZcC7GRMTSjG84zGHSCYjNIWwcpWG4qjC5O7UeiENYq4EmahxCn4pVEFBYv3yepykWFYAvi2GmAervx5xVVOwDkH4JZr9hid9C6X1nFKY9PwJeOnZj6kpjWNyXj8n2dlccYNcCITXj7OcDb4TpZIZJUIczHsqkg5h33tCD1ZGavAvaz7TrPhssqJZBHWexQjGhhWgPwxycVIOzMOD5flABZtL3oc7iFgJ9Muxa43TW1iTMpd061o3jV4zN8hAQ6zdgk3NJF4FZmyZC8tIetYZLJ0D4yuWvuhTAhIwgu9je7m1CnPyhobYtsDJuOWJbDf9NR7ALZbVFfkonki8OScQGqwAD3iZJTJhmYEGchg3DZzNZz3Kvt2138hmVtJoSIxkiZooumhgpeu5y62TWDND2, libnssutil3.so(NSSUTIL_3.12)(64bit), libnssutil3.so(NSSUTIL_3.12.3)(64bit), libnssutil3.so(NSSUTIL_3.12.5)(64bit), libnssutil3.so(NSSUTIL_3.12.7)(64bit), libnssutil3.so(NSSUTIL_3.13)(64bit), libnssutil3.so(NSSUTIL_3.14)(64bit), libnssutil3.so(NSSUTIL_3.15)(64bit), libnssutil3.so(NSSUTIL_3.17.1)(64bit), libnssutil3.so(NSSUTIL_3.21)(64bit), libnssutil3.so(NSSUTIL_3.24)(64bit), libnssutil3.so(NSSUTIL_3.25)(64bit), libnssutil3.so(NSSUTIL_3.31)(64bit), libnssutil3.so(NSSUTIL_3.33)(64bit), libnssutil3.so(NSSUTIL_3.38)(64bit), libnssutil3.so(NSSUTIL_3.39)(64bit), libnssutil3.so(NSSUTIL_3.59)(64bit), libpkcs11testmodule.so()(64bit) = set:kdO9FwFR6NyRCgfXBZ1NNzgkrqtdkyjeTzH2FzQ6zl6rXzZ2KFm77C0VF7GdjN6glzTWlAae1C1hvcXKFH7zQLCltZlVZo4xqAhIUn3jAcjOVmtqK2fZjaixQ2Own4k5Kk2kfCQjgPrDMXttqj2tGwnhmO7WT8sB73gyrLbS5Blk7qnyehWlyzZpBWkCYHAzYzvYn9fpWbZcyVBSgOm9TQ8gjojLPgq9OSiCllJi0UjXX2, libsmime3.so()(64bit) = set:ldK1sZcPKr9wEFwAe589ZkZhbJx3ChQY5EIafv7XunCl6267yRqL2ecr1Z4Oe5IGvnyCg2OAToYIYA22iBkBZlt4sYGAOA5nvOjyj0uYGacvAnmf65RV1nC07uux9Ui6ox750ulWeygZkN8tdmXZkCkcO60vGq5rQRKiUlvVZ6Y4kv1atuSMs30dqNsuxLoviwZDz6GEz7ZnFDVvXR1V8IlCgZHlRnHiHSC5XTnCNYC1e1Ch4fvb0B0wKZeadaQvSFb5AXNvrZJvvPpdN9FZ0Ay0uqqQck88QgZHYfd1kfPE785hGB3fPo1xoXQ6f4RGIjUYmNppjYn42sVHYPkqcpZKbyk, libsmime3.so(NSS_3.10)(64bit), libsmime3.so(NSS_3.12.10)(64bit), libsmime3.so(NSS_3.12.2)(64bit), libsmime3.so(NSS_3.13)(64bit), libsmime3.so(NSS_3.15)(64bit), libsmime3.so(NSS_3.16)(64bit), libsmime3.so(NSS_3.18)(64bit), libsmime3.so(NSS_3.2)(64bit), libsmime3.so(NSS_3.2.1)(64bit), libsmime3.so(NSS_3.3)(64bit), libsmime3.so(NSS_3.4)(64bit), libsmime3.so(NSS_3.4.1)(64bit), libsmime3.so(NSS_3.6)(64bit), libsmime3.so(NSS_3.7)(64bit), libsmime3.so(NSS_3.7.2)(64bit), libsmime3.so(NSS_3.8)(64bit), libsmime3.so(NSS_3.9)(64bit), libsmime3.so(NSS_3.9.3)(64bit), libsoftokn3.so()(64bit) = set:hdWWRIVc20XJ4PU6tv3bi5, libsoftokn3.so(NSS_3.4)(64bit), libsoftokn3.so(NSS_3.52)(64bit), libssl3.so()(64bit) = set:kd0Zfm5JrnnGAgwKZ4PprG2DxtPp9YEZIKEUu9H9DRRHZzuZBIRGsrYtpqFhVluw2LW5XAzkZGFkmZlmNk0xAP6v3BgCrbyZdnKnfZcO7HbqBZEjgKVy54MmnusI0VcGKmnJ0IVgJNvikBzxZc8yG06xagdGez6sa3fYl6Bu9TFipwtOOIejQwLZic7QRidJ4hEbQENOZ8jZpa7Z4qfSMnF5, libssl3.so(NSS_3.11.4)(64bit), libssl3.so(NSS_3.11.8)(64bit), libssl3.so(NSS_3.12.10)(64bit), libssl3.so(NSS_3.12.6)(64bit), libssl3.so(NSS_3.13)(64bit), libssl3.so(NSS_3.13.2)(64bit), libssl3.so(NSS_3.14)(64bit), libssl3.so(NSS_3.15)(64bit), libssl3.so(NSS_3.15.4)(64bit), libssl3.so(NSS_3.2)(64bit), libssl3.so(NSS_3.2.1)(64bit), libssl3.so(NSS_3.20)(64bit), libssl3.so(NSS_3.21)(64bit), libssl3.so(NSS_3.22)(64bit), libssl3.so(NSS_3.23)(64bit), libssl3.so(NSS_3.24)(64bit), libssl3.so(NSS_3.27)(64bit), libssl3.so(NSS_3.28)(64bit), libssl3.so(NSS_3.30)(64bit), libssl3.so(NSS_3.30.0.1)(64bit), libssl3.so(NSS_3.33)(64bit), libssl3.so(NSS_3.4)(64bit), libssl3.so(NSS_3.7.4)(64bit) Requires: /bin/sh, /etc/alternatives/packages.d, coreutils, grep, libc.so.6(GLIBC_2.14)(64bit), libc.so.6(GLIBC_2.2.5)(64bit), libc.so.6(GLIBC_2.25)(64bit), libc.so.6(GLIBC_2.3)(64bit), libc.so.6(GLIBC_2.3.4)(64bit), libc.so.6(GLIBC_2.4)(64bit), libdl.so.2(GLIBC_2.2.5)(64bit), libnspr4.so()(64bit) >= set:mfmFrZ0ZgZhv4Ug0LgwM1IPzBulKfDVLGJuOnR4qJ56u8uks0HEAXQZ77mym8tciPeAijgLjKYSlEEc2XkZwUK7ZHerw5pXT3CvkS3upZASOB0H3HGbxru8au2eipSXOxm8u0o7A2uCVKMqygSCckq3RVoYXPCNEyK3L73GY5qDZsZ2unDj56SH6HbqR2Gv6XzdoOsDwdZxS31F6HtFZGNM4JRZCBnLU5DaBPjznXlQ9ZLdAUIMx7kYfZth5QZfQaV, libplc4.so()(64bit) >= set:jfpsValz8jUF4rdUsjgPIwjOI4tfI2, libplds4.so()(64bit) >= set:idc8tK18vcZHzVknZAxvUP6DtQzyapIAiNDKn3, libpthread.so.0(GLIBC_2.2.5)(64bit), libsqlite3.so.0()(64bit) >= set:oj4iEQrYGElEG3Qi7nSX7jmlCyi1MqmHyTZpQsiu67xh1g70mnoNYpLZ4YZz6, libstdc++.so.6(CXXABI_1.3)(64bit), libstdc++.so.6(GLIBCXX_3.4)(64bit), libstdc++.so.6(GLIBCXX_3.4.11)(64bit), libstdc++.so.6(GLIBCXX_3.4.9)(64bit), rtld(GNU_HASH), sed Requires(rpmlib): rpmlib(SetVersions) Obsoletes: libnss-sysinit Finding debuginfo files (using /usr/lib/rpm/find-debuginfo-files) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.lNEmxw Creating libnss-debuginfo package Processing files: libnss-devel-3.66.0-alt2 warning: File listed twice: /usr/include/nss Finding Provides (using /usr/lib/rpm/find-provides) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.7816rw find-provides: running scripts (alternatives,debuginfo,lib,pam,perl,pkgconfig,python,python3,shell) Finding Requires (using /usr/lib/rpm/find-requires) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.LLo1Ov find-requires: running scripts (cpp,debuginfo,files,lib,pam,perl,pkgconfig,pkgconfiglib,python,python3,rpmlib,shebang,shell,static,symlinks,systemd-services) /usr/src/tmp/nss-buildroot/usr/include/nss/mozpkix/Time.h:29:10: fatal error: ctime: No such file or directory 29 | #include | ^~~~~~~ compilation terminated. cpp.req: /usr/src/tmp/nss-buildroot/usr/include/nss/mozpkix/Time.h: cpp failed, trying c++ mode find-requires: FINDPACKAGE-COMMANDS: cat Provides: nss-devel = 3.66.0-alt2, nss-pkcs11-devel = 3.66.0-alt2, pkgconfig(nss) = 3.66.0 Requires: libnss = 3.66.0-alt2, /bin/sh, /usr/lib64/libnss3.so, /usr/lib64/libnssutil3.so, /usr/lib64/libsmime3.so, /usr/lib64/libssl3.so, /usr/lib64/pkgconfig, coreutils, libnspr-devel, pkgconfig(nspr) >= 4.31.0 Finding debuginfo files (using /usr/lib/rpm/find-debuginfo-files) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.hrMZOu Processing files: libnss-devel-static-3.66.0-alt2 Finding Provides (using /usr/lib/rpm/find-provides) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.q7VAYu find-provides: running scripts (alternatives,debuginfo,lib,pam,perl,pkgconfig,python,python3,shell) Finding Requires (using /usr/lib/rpm/find-requires) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.33dTBv find-requires: running scripts (cpp,debuginfo,files,lib,pam,perl,pkgconfig,pkgconfiglib,python,python3,rpmlib,shebang,shell,static,symlinks,systemd-services) Provides: nss-devel-static = 3.66.0-alt2, nss-pkcs11-devel-static = 3.66.0-alt2 Requires: libnss-devel = 3.66.0-alt2, glibc-devel-static Finding debuginfo files (using /usr/lib/rpm/find-debuginfo-files) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.oq3Byu Processing files: libnss-nssckbi-checkinstall-3.66.0-alt2 Requires: p11-kit-checkinstall Processing files: nss-utils-3.66.0-alt2 Finding Provides (using /usr/lib/rpm/find-provides) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.kIUg0u find-provides: running scripts (alternatives,debuginfo,lib,pam,perl,pkgconfig,python,python3,shell) Finding Requires (using /usr/lib/rpm/find-requires) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.IPtIsw find-requires: running scripts (cpp,debuginfo,files,lib,pam,perl,pkgconfig,pkgconfiglib,python,python3,rpmlib,shebang,shell,static,symlinks,systemd-services) Provides: nss-tools Requires: libnss = 3.66.0-alt2, /lib64/ld-linux-x86-64.so.2, libc.so.6(GLIBC_2.14)(64bit), libc.so.6(GLIBC_2.16)(64bit), libc.so.6(GLIBC_2.2.5)(64bit), libc.so.6(GLIBC_2.25)(64bit), libc.so.6(GLIBC_2.3)(64bit), libc.so.6(GLIBC_2.3.4)(64bit), libc.so.6(GLIBC_2.4)(64bit), libdl.so.2(GLIBC_2.2.5)(64bit), libfreebl3.so()(64bit) >= set:he7opvvin6LQ8UbZ6, libfreebl3.so(NSSRAWHASH_3.12.3)(64bit), libgcc_s.so.1(GCC_3.0)(64bit), libnspr4.so()(64bit) >= set:meVAoZhmf6OW48nehIZaJ32sYLo0m80MdByNMDmkD7zw3ZsPRFssswysxDMUAJZpLtgT4KSiK6mE9ucewlkAXwXLXZCj23ogIa2nttciP6iV3W5CT9nut5aa12XGv0OoUbCuacsBdYiHHTZt2CtkyAwdFmiOZhpbb1m7GZiTaV79sVxwWwE6wWqcdXgzmyBzmER6BOI3O6Za7pf5wsRKMehAJBxiroDzNLDdzho4XR3V40T21lvxSFDXzTRVgxxZayRzmngZFNZocoOsnMCZwDOQHykzqnKvfgzxhQ6Zn3VR5Lwj5OVhz7XlEjZvdsFruGMxgMTzUiUNZJh5QZrKKj3wap, libnss3.so()(64bit) >= set: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, libnss3.so(NSS_3.10)(64bit), libnss3.so(NSS_3.10.2)(64bit), libnss3.so(NSS_3.11)(64bit), libnss3.so(NSS_3.11.1)(64bit), libnss3.so(NSS_3.11.2)(64bit), libnss3.so(NSS_3.11.7)(64bit), libnss3.so(NSS_3.12)(64bit), libnss3.so(NSS_3.12.1)(64bit), libnss3.so(NSS_3.12.3)(64bit), libnss3.so(NSS_3.12.5)(64bit), libnss3.so(NSS_3.12.6)(64bit), libnss3.so(NSS_3.12.9)(64bit), libnss3.so(NSS_3.13)(64bit), libnss3.so(NSS_3.13.2)(64bit), libnss3.so(NSS_3.14)(64bit), libnss3.so(NSS_3.14.1)(64bit), libnss3.so(NSS_3.14.3)(64bit), libnss3.so(NSS_3.15)(64bit), libnss3.so(NSS_3.15.4)(64bit), libnss3.so(NSS_3.16.1)(64bit), libnss3.so(NSS_3.16.2)(64bit), libnss3.so(NSS_3.18)(64bit), libnss3.so(NSS_3.2)(64bit), libnss3.so(NSS_3.21)(64bit), libnss3.so(NSS_3.22)(64bit), libnss3.so(NSS_3.3)(64bit), libnss3.so(NSS_3.3.1)(64bit), libnss3.so(NSS_3.30)(64bit), libnss3.so(NSS_3.31)(64bit), libnss3.so(NSS_3.33)(64bit), libnss3.so(NSS_3.34)(64bit), libnss3.so(NSS_3.39)(64bit), libnss3.so(NSS_3.4)(64bit), libnss3.so(NSS_3.44)(64bit), libnss3.so(NSS_3.45)(64bit), libnss3.so(NSS_3.47)(64bit), libnss3.so(NSS_3.5)(64bit), libnss3.so(NSS_3.52)(64bit), libnss3.so(NSS_3.55)(64bit), libnss3.so(NSS_3.58)(64bit), libnss3.so(NSS_3.59)(64bit), libnss3.so(NSS_3.6)(64bit), libnss3.so(NSS_3.62)(64bit), libnss3.so(NSS_3.65)(64bit), libnss3.so(NSS_3.7)(64bit), libnss3.so(NSS_3.8)(64bit), libnss3.so(NSS_3.9)(64bit), libnss3.so(NSS_3.9.2)(64bit), libnss3.so(NSS_3.9.3)(64bit), libnssutil3.so()(64bit) >= set:ldFbcTuWEXlJOEOSuCk7T4cZi4ldv0J8ys7XpP3RqUrX9l4yhRlrjZpypR1pOQl9QCcbAfgqSz0Ri9aQYy8b7dJAZH1hDchaZ4V9ZAigBUZDx5xVVOwZdERvjQJpq8qpMMZ1ZiZx3Qdz5K8iEF2xfz9XZej7OcDb4TpZIZJUIczHswgD66Wcf3ZllZoYzlkZJNFRZnJGX4ifF65F3d36gvFY8IYpNj5pFvZK06Pxkakr2InE2NMJuwQdsm3wIyFsyVpAQ63IJDiAWrysGmDeZi1ocGZFnQdp4b8AnOAPxlwVlRI5Oj9Hrqb9KZgOTQgEZw1uJG68O5ZJTJhmYEGcCKZDE9S94cw4pBTRypzvS7NYIywOsYa4d4KRJd, libnssutil3.so(NSSUTIL_3.12)(64bit), libnssutil3.so(NSSUTIL_3.12.3)(64bit), libnssutil3.so(NSSUTIL_3.12.5)(64bit), libnssutil3.so(NSSUTIL_3.12.7)(64bit), libnssutil3.so(NSSUTIL_3.13)(64bit), libnssutil3.so(NSSUTIL_3.14)(64bit), libnssutil3.so(NSSUTIL_3.15)(64bit), libnssutil3.so(NSSUTIL_3.17.1)(64bit), libnssutil3.so(NSSUTIL_3.21)(64bit), libnssutil3.so(NSSUTIL_3.24)(64bit), libnssutil3.so(NSSUTIL_3.31)(64bit), libnssutil3.so(NSSUTIL_3.33)(64bit), libnssutil3.so(NSSUTIL_3.38)(64bit), libnssutil3.so(NSSUTIL_3.39)(64bit), libnssutil3.so(NSSUTIL_3.59)(64bit), libplc4.so()(64bit) >= set:jeOUS1uiqjNotz8CMNWpkN0EQ5Z0BZIXTO1T6i0618RlMQTCjDwjOIsWKy4m1, libplds4.so()(64bit) >= set:idc8tK18vcZHzVknZAxvUP6DtQGEYgBcmiFUjTH1, libpthread.so.0(GLIBC_2.2.5)(64bit), libsmime3.so()(64bit) >= set:leTwKuuSXuraxGxALoFdYApoaoKqBhMUxM98x7Z46bz5ADAwwkpjk717LliWiZkZk2GZaGARoYYBwxn4YLEZ11ZJbDkcsnHEgSujeU66atgg2wcMfpYZIExXdZHgW5V8SaDgZnHGvJaJurKoXMquT0D03NDu1gTShJZjxqHZKSsmjNe5ItoEgjlvS4E64ZnpUp6f8sgS3Fh8D5r2ZB42qBrCizhS7, libsmime3.so(NSS_3.10)(64bit), libsmime3.so(NSS_3.2)(64bit), libsmime3.so(NSS_3.3)(64bit), libsmime3.so(NSS_3.4)(64bit), libsmime3.so(NSS_3.6)(64bit), libsmime3.so(NSS_3.9.3)(64bit), libsqlite3.so.0()(64bit) >= set:oj4iEQrYGElEG3Qi7nSX7jmlCyi1MqmHyTZpQsiu67xh1g7rGrwEgocvSrfNZLo, libssl3.so()(64bit) >= set:keEZFbfUqJV07yfqsDBPSRlZJURLMXS6T8mzy5ZaYOOupQUnjCgQZIZmne6vnnQaZ3m22DH8tjWO2UCbAAwhT6Bez6skgDsvroDopih7LtvqB8oUVAXkh7ox9, libssl3.so(NSS_3.12.6)(64bit), libssl3.so(NSS_3.13.2)(64bit), libssl3.so(NSS_3.14)(64bit), libssl3.so(NSS_3.15)(64bit), libssl3.so(NSS_3.15.4)(64bit), libssl3.so(NSS_3.2)(64bit), libssl3.so(NSS_3.20)(64bit), libssl3.so(NSS_3.22)(64bit), libssl3.so(NSS_3.24)(64bit), libssl3.so(NSS_3.27)(64bit), libssl3.so(NSS_3.28)(64bit), libssl3.so(NSS_3.33)(64bit), libssl3.so(NSS_3.4)(64bit), libssl3.so(NSS_3.7.4)(64bit), libstdc++.so.6(CXXABI_1.3)(64bit), libstdc++.so.6(CXXABI_1.3.5)(64bit), libstdc++.so.6(GLIBCXX_3.4)(64bit), libstdc++.so.6(GLIBCXX_3.4.11)(64bit), libstdc++.so.6(GLIBCXX_3.4.14)(64bit), libstdc++.so.6(GLIBCXX_3.4.15)(64bit), libstdc++.so.6(GLIBCXX_3.4.18)(64bit), libstdc++.so.6(GLIBCXX_3.4.19)(64bit), libstdc++.so.6(GLIBCXX_3.4.20)(64bit), libstdc++.so.6(GLIBCXX_3.4.21)(64bit), libstdc++.so.6(GLIBCXX_3.4.26)(64bit), libstdc++.so.6(GLIBCXX_3.4.9)(64bit), libz.so.1()(64bit) >= set:khb6pwmWdIhpAOoqvxaG1, rtld(GNU_HASH) Requires(rpmlib): rpmlib(SetVersions) Finding debuginfo files (using /usr/lib/rpm/find-debuginfo-files) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.N8w0Fx Creating nss-utils-debuginfo package Processing files: libnss-debuginfo-3.66.0-alt2 Finding Provides (using /usr/lib/rpm/find-provides) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.dOWrUx find-provides: running scripts (debuginfo) Finding Requires (using /usr/lib/rpm/find-requires) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.NPAJut find-requires: running scripts (debuginfo) Provides: debug64(libfreebl3.so), debug64(libfreeblpriv3.so), debug64(libnss3.so), debug64(libnssckbi-testlib.so), debug64(libnssdbm3.so), debug64(libnsssysinit.so), debug64(libnssutil3.so), debug64(libpkcs11testmodule.so), debug64(libsmime3.so), debug64(libsoftokn3.so), debug64(libssl3.so) Requires: libnss = 3.66.0-alt2, debug64(libc.so.6), debug64(libdl.so.2), debug64(libnspr4.so), debug64(libplc4.so), debug64(libplds4.so), debug64(libpthread.so.0), debug64(libsqlite3.so.0), debug64(libstdc++.so.6) Processing files: nss-utils-debuginfo-3.66.0-alt2 Finding Provides (using /usr/lib/rpm/find-provides) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.R7hxzu find-provides: running scripts (debuginfo) Finding Requires (using /usr/lib/rpm/find-requires) Executing: /bin/sh -e /usr/src/tmp/rpm-tmp.Irbduv find-requires: running scripts (debuginfo) Requires: nss-utils = 3.66.0-alt2, /usr/lib/debug/lib64/ld-linux-x86-64.so.2.debug, debug64(libc.so.6), debug64(libdl.so.2), debug64(libfreebl3.so), debug64(libgcc_s.so.1), debug64(libnspr4.so), debug64(libnss3.so), debug64(libnssutil3.so), debug64(libplc4.so), debug64(libplds4.so), debug64(libpthread.so.0), debug64(libsmime3.so), debug64(libsqlite3.so.0), debug64(libssl3.so), debug64(libstdc++.so.6), debug64(libz.so.1) Adding to libnss-devel a strict dependency on libnss Adding to nss-utils a strict dependency on libnss Adding to libnss-debuginfo a strict dependency on libnss Adding to libnss-devel-static a strict dependency on libnss-devel Adding to nss-utils-debuginfo a strict dependency on nss-utils Adding to nss-utils-debuginfo a strict dependency on libnss-debuginfo Removing 4 extra deps from libnss-devel due to dependency on libnss Removing 90 extra deps from nss-utils due to dependency on libnss Removing 5 extra deps from nss-utils-debuginfo due to dependency on libnss-debuginfo Removing 2 extra deps from libnss-devel due to repentancy on libnss Removing 14 extra deps from nss-utils due to repentancy on libnss Removing 8 extra deps from nss-utils-debuginfo due to repentancy on libnss-debuginfo Wrote: /usr/src/RPM/RPMS/x86_64/libnss-3.66.0-alt2.x86_64.rpm (w2.lzdio) Wrote: /usr/src/RPM/RPMS/x86_64/libnss-devel-3.66.0-alt2.x86_64.rpm (w2.lzdio) Wrote: /usr/src/RPM/RPMS/x86_64/libnss-devel-static-3.66.0-alt2.x86_64.rpm (w2.lzdio) Wrote: /usr/src/RPM/RPMS/x86_64/libnss-nssckbi-checkinstall-3.66.0-alt2.x86_64.rpm (w2.lzdio) Wrote: /usr/src/RPM/RPMS/x86_64/nss-utils-3.66.0-alt2.x86_64.rpm (w2T8.xzdio) Wrote: /usr/src/RPM/RPMS/x86_64/libnss-debuginfo-3.66.0-alt2.x86_64.rpm (w2.lzdio) Wrote: /usr/src/RPM/RPMS/x86_64/nss-utils-debuginfo-3.66.0-alt2.x86_64.rpm (w2.lzdio) 5128.76user 165.01system 1:10:00elapsed 126%CPU (0avgtext+0avgdata 2317764maxresident)k 0inputs+0outputs (0major+51539644minor)pagefaults 0swaps 5139.16user 170.72system 1:10:13elapsed 126%CPU (0avgtext+0avgdata 2317764maxresident)k 46304inputs+0outputs (0major+51967641minor)pagefaults 0swaps --- libnss-3.66.0-alt2.x86_64.rpm.repo 2021-07-19 11:28:02.000000000 +0000 +++ libnss-3.66.0-alt2.x86_64.rpm.hasher 2021-08-03 01:11:54.238393741 +0000 @@ -203,19 +203,19 @@ File: /usr/bin/setup-nsssysinit.sh 100755 root:root 0256d66cf2e26d1f204527eb80c8b620 -File: /usr/lib64/libfreebl3.chk 100644 root:root 033dadca4af1c57a73ce1e852714551e -File: /usr/lib64/libfreebl3.so 100644 root:root ac70be175dcd099e0dd0726271e43a4a -File: /usr/lib64/libfreeblpriv3.chk 100644 root:root 1eb5ef30c67f2d47dff62049db4030cf -File: /usr/lib64/libfreeblpriv3.so 100644 root:root 94cd6e9e5afaa73caa85a498b0c0e550 -File: /usr/lib64/libnss3.so 100644 root:root 8f8f89bace121bdd35a40080f8baf6ec -File: /usr/lib64/libnssckbi-testlib.so 100644 root:root e6b35b755760506642850c07ee88561c -File: /usr/lib64/libnssdbm3.chk 100644 root:root 4664ef2bbdbed9e1ce1eb3ca68a75e65 -File: /usr/lib64/libnssdbm3.so 100644 root:root 5c0dffd97b9a8b3c730bbbb9d4be877e -File: /usr/lib64/libnsssysinit.so 100644 root:root 998a092196cf7a9d93cda2bced3f6d57 -File: /usr/lib64/libnssutil3.so 100644 root:root 5dbaa450e1006ff4353dd8b9015ad1de -File: /usr/lib64/libpkcs11testmodule.so 100644 root:root 6945f9683b6f6e2b6c7b39841571958f -File: /usr/lib64/libsmime3.so 100644 root:root fa523fa63657595e027b436700ee18a8 -File: /usr/lib64/libsoftokn3.chk 100644 root:root c0585fabd6f05b861efe9c3b4d847433 -File: /usr/lib64/libsoftokn3.so 100644 root:root df525bcd6340ae9e94ffa8b9b359110e -File: /usr/lib64/libssl3.so 100644 root:root 1da912905512382e841d3932ff07aad5 +File: /usr/lib64/libfreebl3.chk 100644 root:root 6d73191fbd18cf8a6ae0159d186e4cd1 +File: /usr/lib64/libfreebl3.so 100644 root:root 18d42c6338722b593cbcc746c3f02179 +File: /usr/lib64/libfreeblpriv3.chk 100644 root:root e2b6eddbbb24a625a692c379a5aa610d +File: /usr/lib64/libfreeblpriv3.so 100644 root:root 0d8391dd8108d9d13ae15fd627880eea +File: /usr/lib64/libnss3.so 100644 root:root dacc1a48d1ec7b30e4012aad7193a5c6 +File: /usr/lib64/libnssckbi-testlib.so 100644 root:root 3db2a9c7da649647a296cfc0aa66d58f +File: /usr/lib64/libnssdbm3.chk 100644 root:root 00430bb1fbe87e206aa4785bb9f09ca6 +File: /usr/lib64/libnssdbm3.so 100644 root:root 5441221344c0716cdf4160060fbd0cbd +File: /usr/lib64/libnsssysinit.so 100644 root:root d4ca3f7d0681d27b31cecbfaa4c1a1cc +File: /usr/lib64/libnssutil3.so 100644 root:root 04eb7aa920e86a08986767f98f7231b8 +File: /usr/lib64/libpkcs11testmodule.so 100644 root:root 9ca04725011bea324abd8eff9e36461c +File: /usr/lib64/libsmime3.so 100644 root:root 75830c3e876f7b21e8162afdc78071a6 +File: /usr/lib64/libsoftokn3.chk 100644 root:root b3ecd4e6cdb2a4cf34990fa51c93e5f0 +File: /usr/lib64/libsoftokn3.so 100644 root:root 1b7f40fc54401b236e0fc27960fb3c17 +File: /usr/lib64/libssl3.so 100644 root:root 1a2ca52223edd8c53c18e6673911809e File: /usr/lib64/nss 40755 root:root -File: /usr/lib64/nss/libnssckbi.so 100644 root:root 33abcdd37c260000bee77bcfa247747c -RPMIdentity: 854a18675b5223f3ed5de60635b2f9e6a1bf81bece94b288f8bbb3105fdab03bbe8670374066f89ac027f1b507085ac41dff34c72c2863b87fec16fca85eaacd +File: /usr/lib64/nss/libnssckbi.so 100644 root:root bf662748da335a71011f001ce8199f85 +RPMIdentity: 8e4ef1e7aab75722a16cac1308269e53199b79385cb0aea1c2e6089dfeb3f4abcdeb1bbb2aad571da28156beb2dd11640ad674651612391e48325acf660527b2 --- libnss-debuginfo-3.66.0-alt2.x86_64.rpm.repo 2021-07-19 11:28:02.000000000 +0000 +++ libnss-debuginfo-3.66.0-alt2.x86_64.rpm.hasher 2021-08-03 01:11:54.318394584 +0000 @@ -1,37 +1,37 @@ -/usr/lib/debug/.build-id/21 40755 root:root -/usr/lib/debug/.build-id/21/da1fbc1523f15695f6ce608dec3b2cf5bd8f9c 120777 root:root ../../../../lib64/libnssutil3.so -/usr/lib/debug/.build-id/21/da1fbc1523f15695f6ce608dec3b2cf5bd8f9c.debug 120777 root:root ../../usr/lib64/libnssutil3.so.debug -/usr/lib/debug/.build-id/2a 40755 root:root -/usr/lib/debug/.build-id/2a/e50e1cdfdcc417bfa55dec73a3fb7937a17c57 120777 root:root ../../../../lib64/libnssdbm3.so -/usr/lib/debug/.build-id/2a/e50e1cdfdcc417bfa55dec73a3fb7937a17c57.debug 120777 root:root ../../usr/lib64/libnssdbm3.so.debug -/usr/lib/debug/.build-id/2b 40755 root:root -/usr/lib/debug/.build-id/2b/b6f288056bab36ca2213b61d90bfb8b6574cf5 120777 root:root ../../../../lib64/libfreeblpriv3.so -/usr/lib/debug/.build-id/2b/b6f288056bab36ca2213b61d90bfb8b6574cf5.debug 120777 root:root ../../usr/lib64/libfreeblpriv3.so.debug -/usr/lib/debug/.build-id/3e 40755 root:root -/usr/lib/debug/.build-id/3e/e9d77115c392179c1102596c03be654e81a9f2 120777 root:root ../../../../lib64/libnssckbi-testlib.so -/usr/lib/debug/.build-id/3e/e9d77115c392179c1102596c03be654e81a9f2.debug 120777 root:root ../../usr/lib64/libnssckbi-testlib.so.debug -/usr/lib/debug/.build-id/47 40755 root:root -/usr/lib/debug/.build-id/47/81559881c8df0f98dd31208d0488e45b8b8eb1 120777 root:root ../../../../lib64/libnsssysinit.so -/usr/lib/debug/.build-id/47/81559881c8df0f98dd31208d0488e45b8b8eb1.debug 120777 root:root ../../usr/lib64/libnsssysinit.so.debug -/usr/lib/debug/.build-id/5e 40755 root:root -/usr/lib/debug/.build-id/5e/628b13fae4c5f5dc626c6e2ec022d7081ce903 120777 root:root ../../../../lib64/libssl3.so -/usr/lib/debug/.build-id/5e/628b13fae4c5f5dc626c6e2ec022d7081ce903.debug 120777 root:root ../../usr/lib64/libssl3.so.debug -/usr/lib/debug/.build-id/74 40755 root:root -/usr/lib/debug/.build-id/74/126a8d66b41aaf37d6605858363fcd645c65b5 120777 root:root ../../../../lib64/libnss3.so -/usr/lib/debug/.build-id/74/126a8d66b41aaf37d6605858363fcd645c65b5.debug 120777 root:root ../../usr/lib64/libnss3.so.debug -/usr/lib/debug/.build-id/84 40755 root:root -/usr/lib/debug/.build-id/84/ff286cf74d5c4e63b3eda34dad90be574f10ff 120777 root:root ../../../../lib64/libsmime3.so -/usr/lib/debug/.build-id/84/ff286cf74d5c4e63b3eda34dad90be574f10ff.debug 120777 root:root ../../usr/lib64/libsmime3.so.debug -/usr/lib/debug/.build-id/9b 40755 root:root -/usr/lib/debug/.build-id/9b/c3e3a87293d950a420f599284e52a09892b209 120777 root:root ../../../../lib64/nss/libnssckbi.so -/usr/lib/debug/.build-id/9b/c3e3a87293d950a420f599284e52a09892b209.debug 120777 root:root ../../usr/lib64/nss/libnssckbi.so.debug -/usr/lib/debug/.build-id/d0 40755 root:root -/usr/lib/debug/.build-id/d0/fcabec8e8c79087cf44d2a6d0d0d5c2d5244c6 120777 root:root ../../../../lib64/libfreebl3.so -/usr/lib/debug/.build-id/d0/fcabec8e8c79087cf44d2a6d0d0d5c2d5244c6.debug 120777 root:root ../../usr/lib64/libfreebl3.so.debug -/usr/lib/debug/.build-id/f2 40755 root:root -/usr/lib/debug/.build-id/f2/b992fb853491bcbdb03a867b05178d1f659d50 120777 root:root ../../../../lib64/libpkcs11testmodule.so -/usr/lib/debug/.build-id/f2/b992fb853491bcbdb03a867b05178d1f659d50.debug 120777 root:root ../../usr/lib64/libpkcs11testmodule.so.debug -/usr/lib/debug/.build-id/f9 40755 root:root -/usr/lib/debug/.build-id/f9/edb7d24892d6453b4bc9be964d2e7e2a041087 120777 root:root ../../../../lib64/libsoftokn3.so -/usr/lib/debug/.build-id/f9/edb7d24892d6453b4bc9be964d2e7e2a041087.debug 120777 root:root ../../usr/lib64/libsoftokn3.so.debug +/usr/lib/debug/.build-id/16 40755 root:root +/usr/lib/debug/.build-id/16/6d326b7bdf20251d10f16fd1f2ceea61b31da2 120777 root:root ../../../../lib64/libpkcs11testmodule.so +/usr/lib/debug/.build-id/16/6d326b7bdf20251d10f16fd1f2ceea61b31da2.debug 120777 root:root ../../usr/lib64/libpkcs11testmodule.so.debug +/usr/lib/debug/.build-id/55 40755 root:root +/usr/lib/debug/.build-id/55/c319217bdd75992aa2c5c11bf06ed9362d2aec 120777 root:root ../../../../lib64/libnsssysinit.so +/usr/lib/debug/.build-id/55/c319217bdd75992aa2c5c11bf06ed9362d2aec.debug 120777 root:root ../../usr/lib64/libnsssysinit.so.debug +/usr/lib/debug/.build-id/61 40755 root:root +/usr/lib/debug/.build-id/61/21c2b624e7b9caa6815c6ae4754ad30c80686d 120777 root:root ../../../../lib64/libfreebl3.so +/usr/lib/debug/.build-id/61/21c2b624e7b9caa6815c6ae4754ad30c80686d.debug 120777 root:root ../../usr/lib64/libfreebl3.so.debug +/usr/lib/debug/.build-id/91 40755 root:root +/usr/lib/debug/.build-id/91/2f3433e58dde82a04f2756571824d07e900758 120777 root:root ../../../../lib64/libnssckbi-testlib.so +/usr/lib/debug/.build-id/91/2f3433e58dde82a04f2756571824d07e900758.debug 120777 root:root ../../usr/lib64/libnssckbi-testlib.so.debug +/usr/lib/debug/.build-id/98 40755 root:root +/usr/lib/debug/.build-id/98/a5e0823f9b6dacfed73b522c0e7ab6b627634b 120777 root:root ../../../../lib64/nss/libnssckbi.so +/usr/lib/debug/.build-id/98/a5e0823f9b6dacfed73b522c0e7ab6b627634b.debug 120777 root:root ../../usr/lib64/nss/libnssckbi.so.debug +/usr/lib/debug/.build-id/a0 40755 root:root +/usr/lib/debug/.build-id/a0/73d23949c0b1049e8e546d8387bebf695aca22 120777 root:root ../../../../lib64/libsmime3.so +/usr/lib/debug/.build-id/a0/73d23949c0b1049e8e546d8387bebf695aca22.debug 120777 root:root ../../usr/lib64/libsmime3.so.debug +/usr/lib/debug/.build-id/a4 40755 root:root +/usr/lib/debug/.build-id/a4/8175c302ab9b9e1acc5cd043fdf3deb6d83ed9 120777 root:root ../../../../lib64/libssl3.so +/usr/lib/debug/.build-id/a4/8175c302ab9b9e1acc5cd043fdf3deb6d83ed9.debug 120777 root:root ../../usr/lib64/libssl3.so.debug +/usr/lib/debug/.build-id/a8 40755 root:root +/usr/lib/debug/.build-id/a8/68362504f636242df245fe5c79411293192a34 120777 root:root ../../../../lib64/libnss3.so +/usr/lib/debug/.build-id/a8/68362504f636242df245fe5c79411293192a34.debug 120777 root:root ../../usr/lib64/libnss3.so.debug +/usr/lib/debug/.build-id/be 40755 root:root +/usr/lib/debug/.build-id/be/6af2f8040139d5ae04168f4f4dde714a8ae1a1 120777 root:root ../../../../lib64/libnssutil3.so +/usr/lib/debug/.build-id/be/6af2f8040139d5ae04168f4f4dde714a8ae1a1.debug 120777 root:root ../../usr/lib64/libnssutil3.so.debug +/usr/lib/debug/.build-id/e0 40755 root:root +/usr/lib/debug/.build-id/e0/f95e18e1cfbad39f269a79b058adce3cd8e19c 120777 root:root ../../../../lib64/libnssdbm3.so +/usr/lib/debug/.build-id/e0/f95e18e1cfbad39f269a79b058adce3cd8e19c.debug 120777 root:root ../../usr/lib64/libnssdbm3.so.debug +/usr/lib/debug/.build-id/e2 40755 root:root +/usr/lib/debug/.build-id/e2/b4aaa408a241e102a1ae35e744847ccbb1e0cd 120777 root:root ../../../../lib64/libfreeblpriv3.so +/usr/lib/debug/.build-id/e2/b4aaa408a241e102a1ae35e744847ccbb1e0cd.debug 120777 root:root ../../usr/lib64/libfreeblpriv3.so.debug +/usr/lib/debug/.build-id/e4 40755 root:root +/usr/lib/debug/.build-id/e4/7398e0d12235383ee81c6427961d9392409e44 120777 root:root ../../../../lib64/libsoftokn3.so +/usr/lib/debug/.build-id/e4/7398e0d12235383ee81c6427961d9392409e44.debug 120777 root:root ../../usr/lib64/libsoftokn3.so.debug /usr/lib/debug/usr/lib64/libfreebl3.so.debug 100644 root:root @@ -71,51 +71,51 @@ Provides: libnss-debuginfo = 3.66.0-alt2:sisyphus+279433.500.6.1 -File: /usr/lib/debug/.build-id/21 40755 root:root -File: /usr/lib/debug/.build-id/21/da1fbc1523f15695f6ce608dec3b2cf5bd8f9c 120777 root:root ../../../../lib64/libnssutil3.so -File: /usr/lib/debug/.build-id/21/da1fbc1523f15695f6ce608dec3b2cf5bd8f9c.debug 120777 root:root ../../usr/lib64/libnssutil3.so.debug -File: /usr/lib/debug/.build-id/2a 40755 root:root -File: /usr/lib/debug/.build-id/2a/e50e1cdfdcc417bfa55dec73a3fb7937a17c57 120777 root:root ../../../../lib64/libnssdbm3.so -File: /usr/lib/debug/.build-id/2a/e50e1cdfdcc417bfa55dec73a3fb7937a17c57.debug 120777 root:root ../../usr/lib64/libnssdbm3.so.debug -File: /usr/lib/debug/.build-id/2b 40755 root:root -File: /usr/lib/debug/.build-id/2b/b6f288056bab36ca2213b61d90bfb8b6574cf5 120777 root:root ../../../../lib64/libfreeblpriv3.so -File: /usr/lib/debug/.build-id/2b/b6f288056bab36ca2213b61d90bfb8b6574cf5.debug 120777 root:root ../../usr/lib64/libfreeblpriv3.so.debug -File: /usr/lib/debug/.build-id/3e 40755 root:root -File: /usr/lib/debug/.build-id/3e/e9d77115c392179c1102596c03be654e81a9f2 120777 root:root ../../../../lib64/libnssckbi-testlib.so -File: /usr/lib/debug/.build-id/3e/e9d77115c392179c1102596c03be654e81a9f2.debug 120777 root:root ../../usr/lib64/libnssckbi-testlib.so.debug -File: /usr/lib/debug/.build-id/47 40755 root:root -File: /usr/lib/debug/.build-id/47/81559881c8df0f98dd31208d0488e45b8b8eb1 120777 root:root ../../../../lib64/libnsssysinit.so -File: /usr/lib/debug/.build-id/47/81559881c8df0f98dd31208d0488e45b8b8eb1.debug 120777 root:root ../../usr/lib64/libnsssysinit.so.debug -File: /usr/lib/debug/.build-id/5e 40755 root:root -File: /usr/lib/debug/.build-id/5e/628b13fae4c5f5dc626c6e2ec022d7081ce903 120777 root:root ../../../../lib64/libssl3.so -File: /usr/lib/debug/.build-id/5e/628b13fae4c5f5dc626c6e2ec022d7081ce903.debug 120777 root:root ../../usr/lib64/libssl3.so.debug -File: /usr/lib/debug/.build-id/74 40755 root:root -File: /usr/lib/debug/.build-id/74/126a8d66b41aaf37d6605858363fcd645c65b5 120777 root:root ../../../../lib64/libnss3.so -File: /usr/lib/debug/.build-id/74/126a8d66b41aaf37d6605858363fcd645c65b5.debug 120777 root:root ../../usr/lib64/libnss3.so.debug -File: /usr/lib/debug/.build-id/84 40755 root:root -File: /usr/lib/debug/.build-id/84/ff286cf74d5c4e63b3eda34dad90be574f10ff 120777 root:root ../../../../lib64/libsmime3.so -File: /usr/lib/debug/.build-id/84/ff286cf74d5c4e63b3eda34dad90be574f10ff.debug 120777 root:root ../../usr/lib64/libsmime3.so.debug -File: /usr/lib/debug/.build-id/9b 40755 root:root -File: /usr/lib/debug/.build-id/9b/c3e3a87293d950a420f599284e52a09892b209 120777 root:root ../../../../lib64/nss/libnssckbi.so -File: /usr/lib/debug/.build-id/9b/c3e3a87293d950a420f599284e52a09892b209.debug 120777 root:root ../../usr/lib64/nss/libnssckbi.so.debug -File: /usr/lib/debug/.build-id/d0 40755 root:root -File: /usr/lib/debug/.build-id/d0/fcabec8e8c79087cf44d2a6d0d0d5c2d5244c6 120777 root:root ../../../../lib64/libfreebl3.so -File: /usr/lib/debug/.build-id/d0/fcabec8e8c79087cf44d2a6d0d0d5c2d5244c6.debug 120777 root:root ../../usr/lib64/libfreebl3.so.debug -File: /usr/lib/debug/.build-id/f2 40755 root:root -File: /usr/lib/debug/.build-id/f2/b992fb853491bcbdb03a867b05178d1f659d50 120777 root:root ../../../../lib64/libpkcs11testmodule.so -File: /usr/lib/debug/.build-id/f2/b992fb853491bcbdb03a867b05178d1f659d50.debug 120777 root:root ../../usr/lib64/libpkcs11testmodule.so.debug -File: /usr/lib/debug/.build-id/f9 40755 root:root -File: /usr/lib/debug/.build-id/f9/edb7d24892d6453b4bc9be964d2e7e2a041087 120777 root:root ../../../../lib64/libsoftokn3.so -File: /usr/lib/debug/.build-id/f9/edb7d24892d6453b4bc9be964d2e7e2a041087.debug 120777 root:root ../../usr/lib64/libsoftokn3.so.debug -File: /usr/lib/debug/usr/lib64/libfreebl3.so.debug 100644 root:root 80d64524c64fc2ad62e2e7fefc79d6aa -File: /usr/lib/debug/usr/lib64/libfreeblpriv3.so.debug 100644 root:root 2ae7f2d3ce8baecca4823ebfe4b49e18 -File: /usr/lib/debug/usr/lib64/libnss3.so.debug 100644 root:root 88062585e21bb0f4572a46bce09dae4c -File: /usr/lib/debug/usr/lib64/libnssckbi-testlib.so.debug 100644 root:root 60b2d5efd828df19fe08ba997cc7975f -File: /usr/lib/debug/usr/lib64/libnssdbm3.so.debug 100644 root:root 1b1a17e3f26f67801e918a77859bc34c -File: /usr/lib/debug/usr/lib64/libnsssysinit.so.debug 100644 root:root 8ccff44a5511933c9058d7968319ad75 -File: /usr/lib/debug/usr/lib64/libnssutil3.so.debug 100644 root:root e1176a366a6bfd43a2e23cf110b987cd -File: /usr/lib/debug/usr/lib64/libpkcs11testmodule.so.debug 100644 root:root 8add5a9f3c816a657e3fecec431e5010 -File: /usr/lib/debug/usr/lib64/libsmime3.so.debug 100644 root:root 4dceacc1f4d6b552c8d67ccb9fd5a716 -File: /usr/lib/debug/usr/lib64/libsoftokn3.so.debug 100644 root:root 9a319d016ac934f6d710194321183c30 -File: /usr/lib/debug/usr/lib64/libssl3.so.debug 100644 root:root 6e58d684adc3747a47c77184ece17b70 +File: /usr/lib/debug/.build-id/16 40755 root:root +File: /usr/lib/debug/.build-id/16/6d326b7bdf20251d10f16fd1f2ceea61b31da2 120777 root:root ../../../../lib64/libpkcs11testmodule.so +File: /usr/lib/debug/.build-id/16/6d326b7bdf20251d10f16fd1f2ceea61b31da2.debug 120777 root:root ../../usr/lib64/libpkcs11testmodule.so.debug +File: /usr/lib/debug/.build-id/55 40755 root:root +File: /usr/lib/debug/.build-id/55/c319217bdd75992aa2c5c11bf06ed9362d2aec 120777 root:root ../../../../lib64/libnsssysinit.so +File: /usr/lib/debug/.build-id/55/c319217bdd75992aa2c5c11bf06ed9362d2aec.debug 120777 root:root ../../usr/lib64/libnsssysinit.so.debug +File: /usr/lib/debug/.build-id/61 40755 root:root +File: /usr/lib/debug/.build-id/61/21c2b624e7b9caa6815c6ae4754ad30c80686d 120777 root:root ../../../../lib64/libfreebl3.so +File: /usr/lib/debug/.build-id/61/21c2b624e7b9caa6815c6ae4754ad30c80686d.debug 120777 root:root ../../usr/lib64/libfreebl3.so.debug +File: /usr/lib/debug/.build-id/91 40755 root:root +File: /usr/lib/debug/.build-id/91/2f3433e58dde82a04f2756571824d07e900758 120777 root:root ../../../../lib64/libnssckbi-testlib.so +File: /usr/lib/debug/.build-id/91/2f3433e58dde82a04f2756571824d07e900758.debug 120777 root:root ../../usr/lib64/libnssckbi-testlib.so.debug +File: /usr/lib/debug/.build-id/98 40755 root:root +File: /usr/lib/debug/.build-id/98/a5e0823f9b6dacfed73b522c0e7ab6b627634b 120777 root:root ../../../../lib64/nss/libnssckbi.so +File: /usr/lib/debug/.build-id/98/a5e0823f9b6dacfed73b522c0e7ab6b627634b.debug 120777 root:root ../../usr/lib64/nss/libnssckbi.so.debug +File: /usr/lib/debug/.build-id/a0 40755 root:root +File: /usr/lib/debug/.build-id/a0/73d23949c0b1049e8e546d8387bebf695aca22 120777 root:root ../../../../lib64/libsmime3.so +File: /usr/lib/debug/.build-id/a0/73d23949c0b1049e8e546d8387bebf695aca22.debug 120777 root:root ../../usr/lib64/libsmime3.so.debug +File: /usr/lib/debug/.build-id/a4 40755 root:root +File: /usr/lib/debug/.build-id/a4/8175c302ab9b9e1acc5cd043fdf3deb6d83ed9 120777 root:root ../../../../lib64/libssl3.so +File: /usr/lib/debug/.build-id/a4/8175c302ab9b9e1acc5cd043fdf3deb6d83ed9.debug 120777 root:root ../../usr/lib64/libssl3.so.debug +File: /usr/lib/debug/.build-id/a8 40755 root:root +File: /usr/lib/debug/.build-id/a8/68362504f636242df245fe5c79411293192a34 120777 root:root ../../../../lib64/libnss3.so +File: /usr/lib/debug/.build-id/a8/68362504f636242df245fe5c79411293192a34.debug 120777 root:root ../../usr/lib64/libnss3.so.debug +File: /usr/lib/debug/.build-id/be 40755 root:root +File: /usr/lib/debug/.build-id/be/6af2f8040139d5ae04168f4f4dde714a8ae1a1 120777 root:root ../../../../lib64/libnssutil3.so +File: /usr/lib/debug/.build-id/be/6af2f8040139d5ae04168f4f4dde714a8ae1a1.debug 120777 root:root ../../usr/lib64/libnssutil3.so.debug +File: /usr/lib/debug/.build-id/e0 40755 root:root +File: /usr/lib/debug/.build-id/e0/f95e18e1cfbad39f269a79b058adce3cd8e19c 120777 root:root ../../../../lib64/libnssdbm3.so +File: /usr/lib/debug/.build-id/e0/f95e18e1cfbad39f269a79b058adce3cd8e19c.debug 120777 root:root ../../usr/lib64/libnssdbm3.so.debug +File: /usr/lib/debug/.build-id/e2 40755 root:root +File: /usr/lib/debug/.build-id/e2/b4aaa408a241e102a1ae35e744847ccbb1e0cd 120777 root:root ../../../../lib64/libfreeblpriv3.so +File: /usr/lib/debug/.build-id/e2/b4aaa408a241e102a1ae35e744847ccbb1e0cd.debug 120777 root:root ../../usr/lib64/libfreeblpriv3.so.debug +File: /usr/lib/debug/.build-id/e4 40755 root:root +File: /usr/lib/debug/.build-id/e4/7398e0d12235383ee81c6427961d9392409e44 120777 root:root ../../../../lib64/libsoftokn3.so +File: /usr/lib/debug/.build-id/e4/7398e0d12235383ee81c6427961d9392409e44.debug 120777 root:root ../../usr/lib64/libsoftokn3.so.debug +File: /usr/lib/debug/usr/lib64/libfreebl3.so.debug 100644 root:root 043ef835b4c933aeda4b7abfb7203750 +File: /usr/lib/debug/usr/lib64/libfreeblpriv3.so.debug 100644 root:root 43c4ee12dac1def04fb0855f21dbd4e3 +File: /usr/lib/debug/usr/lib64/libnss3.so.debug 100644 root:root 1f9eb6ab42206e3d7788c212a3c38498 +File: /usr/lib/debug/usr/lib64/libnssckbi-testlib.so.debug 100644 root:root c220964a83e41030d6a8c2d8fad60948 +File: /usr/lib/debug/usr/lib64/libnssdbm3.so.debug 100644 root:root ec8dab8798246c354edaef9f5b4777c3 +File: /usr/lib/debug/usr/lib64/libnsssysinit.so.debug 100644 root:root 381fa83d435c3ae1034a176822bb8deb +File: /usr/lib/debug/usr/lib64/libnssutil3.so.debug 100644 root:root 91b4e408230cee81a5e397e6a6a9b47a +File: /usr/lib/debug/usr/lib64/libpkcs11testmodule.so.debug 100644 root:root 959f3fccaa475843a3888c05c4e4865b +File: /usr/lib/debug/usr/lib64/libsmime3.so.debug 100644 root:root e480ff3f75fe9e04ef4d0fcc1e66d9d0 +File: /usr/lib/debug/usr/lib64/libsoftokn3.so.debug 100644 root:root 139ef7bcdee394eae6785394fc7ee8f2 +File: /usr/lib/debug/usr/lib64/libssl3.so.debug 100644 root:root 741d838ed03e0b3d9819ea10182bbd4e File: /usr/lib/debug/usr/lib64/nss 40755 root:root -File: /usr/lib/debug/usr/lib64/nss/libnssckbi.so.debug 100644 root:root 0636edd293518421b0d2d73dd943e501 -RPMIdentity: e6879f01d03e78806b901f1f2c2238bf9c84ee124686d1da605a70d8859b19eb6694582f5e0c273c62068b2c0a120a1f532311127219a7acf8818f669c0f3015 +File: /usr/lib/debug/usr/lib64/nss/libnssckbi.so.debug 100644 root:root 0b8b0c831441622303f706cc7fe3be4f +RPMIdentity: 1e771684c175f85e4016a52197ecd34be04d8594b39709555b04a920c5dbc633222f5674fd8f11008bdb447c5688c9f3d9633b3ee9de3dcd873e3c05b8f67484 --- libnss-devel-static-3.66.0-alt2.x86_64.rpm.repo 2021-07-19 11:28:02.000000000 +0000 +++ libnss-devel-static-3.66.0-alt2.x86_64.rpm.hasher 2021-08-03 01:11:54.447395943 +0000 @@ -9,5 +9,5 @@ Provides: libnss-devel-static = 3.66.0-alt2:sisyphus+279433.500.6.1 -File: /usr/lib64/libmozpkix-testlib.a 100644 root:root 37cdaf994b72c9f78defa9a79d4d31fd -File: /usr/lib64/libmozpkix.a 100644 root:root d49c04aa7e110fddea8b9d72724ec716 -File: /usr/lib64/libsectool.a 100644 root:root 6d7ce121ce28b6937f89cf275165ad3e -RPMIdentity: f9e2376af32be5d1ffd97a26df55730a3b13477eb1dd01d9cf78635a9e2939806770dd3b4833c41d3d9ee0fea25df548874595a034cdc7ae2f71119d14b1e0fb +File: /usr/lib64/libmozpkix-testlib.a 100644 root:root f032925c47b23f96e41d66853fc31803 +File: /usr/lib64/libmozpkix.a 100644 root:root b8201f9cb6d3b0069dd95c70cfdebfc1 +File: /usr/lib64/libsectool.a 100644 root:root a550981774be417ce39cfb6bceb31af0 +RPMIdentity: 883befb2f3fea8bbd90224b0e65064b040c1127bc8d60ad9044a7b2f70432909517cfbfd54950e828bf98d46c373b3f32ba4cb3218a5112686402b64003e7a7a --- nss-utils-3.66.0-alt2.x86_64.rpm.repo 2021-07-19 11:28:02.000000000 +0000 +++ nss-utils-3.66.0-alt2.x86_64.rpm.hasher 2021-08-03 01:11:54.604397598 +0000 @@ -96,78 +96,78 @@ Provides: nss-utils = 3.66.0-alt2:sisyphus+279433.500.6.1 -File: /usr/bin/addbuiltin 100755 root:root 05e6cf6969fe529d031d5a7f7cea6ee1 -File: /usr/bin/atob 100755 root:root ef6654454dc7c31fcc9baa490d564a3b -File: /usr/bin/baddbdir 100755 root:root fe3f9e2c80db25d1e8f55765b482abe0 -File: /usr/bin/blake2b_gtest 100755 root:root 8c48de259c748687125aecc9bd62efc7 -File: /usr/bin/bltest 100755 root:root 0edb8c0159b77e826bec48e149160ed8 -File: /usr/bin/btoa 100755 root:root 010eccee6936309a7293ce5f170a2edf -File: /usr/bin/certdb_gtest 100755 root:root c9282634ed334e4e1a6b27c42dba76fc -File: /usr/bin/certhigh_gtest 100755 root:root 1fb38fcd9a7cbebb666d2874097b608b -File: /usr/bin/certutil 100755 root:root f9a1fd7991f00d7f5f027df5b0539a0a -File: /usr/bin/chktest 100755 root:root 6907b7e99a19363ac05c762d20f5380a -File: /usr/bin/cmsutil 100755 root:root 3d1e47ee80536538cbf6173c58528d69 -File: /usr/bin/conflict 100755 root:root e288ad3c9bf58f5367360d400c64c7c5 -File: /usr/bin/crlutil 100755 root:root e5b996f3345c9a28471b512ef6462e56 -File: /usr/bin/crmftest 100755 root:root a18079210aa04bb0e117577f85028f2e -File: /usr/bin/cryptohi_gtest 100755 root:root fa16091ae2417797c2e18c2999db81b1 -File: /usr/bin/dbtest 100755 root:root 5bed7a5a7b1bec8ac690bc7d1016762d -File: /usr/bin/der_gtest 100755 root:root ad96f126b2812f8ffa0680ba63c03d01 -File: /usr/bin/derdump 100755 root:root 360aac87b2ec5acac666344575cde458 -File: /usr/bin/dertimetest 100755 root:root 370b5744ae6f3e58ee166d99c94c0d96 -File: /usr/bin/digest 100755 root:root f97e9851957b774e0bb13d162710049b -File: /usr/bin/ecperf 100755 root:root a3964b2de61a39b2014e9242bd1ba6a2 -File: /usr/bin/encodeinttest 100755 root:root a343d96b0a7a68648323049ea4fec0cd -File: /usr/bin/fbectest 100755 root:root 0c95e171094d51c17317693229b862c7 -File: /usr/bin/freebl_gtest 100755 root:root 42394ce5b34965753f1eefd802c18b78 -File: /usr/bin/httpserv 100755 root:root d200506bfebfcccb804f3a596f049b53 -File: /usr/bin/hw-support 100755 root:root 7634a73d2a2282642ad22b76a099c92b -File: /usr/bin/listsuites 100755 root:root 5368efdb9d9ae152dd8088fda9a21a17 -File: /usr/bin/lowhashtest 100755 root:root 041492ee4a32516498d494f01d377f84 -File: /usr/bin/makepqg 100755 root:root b5488886057cf4713d08591412a00353 -File: /usr/bin/mangle 100755 root:root f4bfae42ff1a7169ecffd32a0e180c6c -File: /usr/bin/modutil 100755 root:root 2a987e80498c0af35f6dc5f331c44b7d -File: /usr/bin/mozpkix_gtest 100755 root:root 4114df50ce99dfefb82978df9ff44fc0 -File: /usr/bin/mpi_tests 100755 root:root f515ce996ec78f37bba1586055159cfd -File: /usr/bin/multinit 100755 root:root d2dcf1083edad7e5e0b17d7959aa5225 -File: /usr/bin/nonspr10 100755 root:root 1b812863b307c1281aa013439bd7284f -File: /usr/bin/nss 100755 root:root bc29d7f03d03c45caffaffba44e53648 -File: /usr/bin/nss-policy-check 100755 root:root 6ccdfa65b931cb20e520b04e5f3e9a18 -File: /usr/bin/nss_bogo_shim 100755 root:root 7983825749e5df757a7e4c6626aae543 -File: /usr/bin/ocspclnt 100755 root:root f21123abfe20bbe8dec053885c920191 -File: /usr/bin/ocspresp 100755 root:root 3067c67fe70d9c813dec1a123d951049 -File: /usr/bin/oidcalc 100755 root:root 893087d4e67c635e13b56918f89436b5 -File: /usr/bin/p7content 100755 root:root bd2935aa7d452275db2e48c886aa479b -File: /usr/bin/p7env 100755 root:root e0eb67a7c958664e58371325fe292d55 -File: /usr/bin/p7sign 100755 root:root 007cca391fe156705d14fa23084e78bd -File: /usr/bin/p7verify 100755 root:root 38b1eb7e312a2e82691af1279130a4e2 -File: /usr/bin/pk11_gtest 100755 root:root 6772c40a6fe685c85789b8bc350a2bdc -File: /usr/bin/pk11ectest 100755 root:root fbd383418de1ea2af656c0896d02133b -File: /usr/bin/pk11gcmtest 100755 root:root 2eb652093a25b6a4dd0caf0fd204fd06 -File: /usr/bin/pk11importtest 100755 root:root cd7bb16ef5bd543ce67621d9c9cb0b4c -File: /usr/bin/pk11mode 100755 root:root cf8407f9a4e433f14a4200a6926470f7 -File: /usr/bin/pk12util 100755 root:root 11123d0431721e2379af01d81a1517a2 -File: /usr/bin/pk1sign 100755 root:root 275668aa5c99bda866ccf3d5736f4a87 -File: /usr/bin/pkix-errcodes 100755 root:root 26079c8ee18bfe5ebf4967845018ff87 -File: /usr/bin/pp 100755 root:root 1910e4edb511559063319f6ba8dbc7dd -File: /usr/bin/prng_gtest 100755 root:root f4c56818e4fd50ee8c9497849df28546 -File: /usr/bin/pwdecrypt 100755 root:root 6c1df6bae3799c699e054a6fcd3afd42 -File: /usr/bin/remtest 100755 root:root ac797e424081632f1dcab0e986a4ae2a -File: /usr/bin/rsaperf 100755 root:root 317f789e9c5f997b260a293597a2adb4 -File: /usr/bin/rsapoptst 100755 root:root 7f8b0472d4c7b47739e3c620e5327504 -File: /usr/bin/sdrtest 100755 root:root c371f3cc763737654199cd23267e9998 -File: /usr/bin/secmodtest 100755 root:root afada3413b4cb9183eecfab04cd1d458 -File: /usr/bin/selfserv 100755 root:root 08497308fa13a2cf12572d3a8ddb0be9 -File: /usr/bin/shlibsign 100755 root:root ae3ff65014269d41b058cc1625069d86 -File: /usr/bin/signtool 100755 root:root 262548d351c33f538811d96b5af50298 -File: /usr/bin/signver 100755 root:root 392e267efa371b43c9f0c9dec5428887 -File: /usr/bin/smime_gtest 100755 root:root 72b948239f982ad1cead0864528afabc -File: /usr/bin/softoken_gtest 100755 root:root d2196230c48d8a243a1f0039f8ac1719 -File: /usr/bin/ssl_gtest 100755 root:root 1fd5f7bfcb7a2465d0dfd38055adc90d -File: /usr/bin/ssltap 100755 root:root 0c70c734d0c9c963923d949f5f35754f -File: /usr/bin/strsclnt 100755 root:root 99d00ad29054857433e64685603dc229 -File: /usr/bin/symkeyutil 100755 root:root a1d6cd2b46877fe0d4a127d327726052 -File: /usr/bin/sysinit_gtest 100755 root:root 216039ae9b61e74683670a77e59b07d1 -File: /usr/bin/tstclnt 100755 root:root 243f0936b89dad14bbc38e2b1f825784 -File: /usr/bin/util_gtest 100755 root:root 06e6f2f65ad7baa9ccb60a86130677b7 -File: /usr/bin/vfychain 100755 root:root 2aacd16eaf4904b48343775aff3189b6 -File: /usr/bin/vfyserv 100755 root:root 53ffa3362d8f4398abadad319d6933fa -RPMIdentity: 5da087b40bb15f09a60aed8c4d3726bf90271b2cc463955d53514f9d3d885fe0d0ca81a47a57c8eedb6b1973e5214079410548fd85e40672b69eda73d4bc9cac +File: /usr/bin/addbuiltin 100755 root:root 453515d011a021142ac7a58c46194585 +File: /usr/bin/atob 100755 root:root 1295cc54803e1d186a6de71c20d7b006 +File: /usr/bin/baddbdir 100755 root:root a1bfa4d267bd0ccc538989242b89de90 +File: /usr/bin/blake2b_gtest 100755 root:root f25a3e5932a3beb6bb25470065a6129f +File: /usr/bin/bltest 100755 root:root 8b517deae3f4c0b35088c7ff523b1807 +File: /usr/bin/btoa 100755 root:root 4f5665789871c0602993c34c9a128fb1 +File: /usr/bin/certdb_gtest 100755 root:root 4f2e40d4d9ec04c7b911dab264cc825b +File: /usr/bin/certhigh_gtest 100755 root:root 15850be7117c5601e621852fe006b312 +File: /usr/bin/certutil 100755 root:root 32abc6185d6a1a84c4ccdf8bcfee473c +File: /usr/bin/chktest 100755 root:root 7dbaca05a218546f0bab941f3dbde4aa +File: /usr/bin/cmsutil 100755 root:root 5455d566101893917199531547561906 +File: /usr/bin/conflict 100755 root:root 28bf0906abd19ee1d1ef2a1406a96ce3 +File: /usr/bin/crlutil 100755 root:root 94145f172266e340b5cce474ac2a0e8d +File: /usr/bin/crmftest 100755 root:root 004b47e6340c5b123f4d6115b9619eac +File: /usr/bin/cryptohi_gtest 100755 root:root fab04b7d73747c7063f9c62aa0f79d74 +File: /usr/bin/dbtest 100755 root:root 330ecedef10dd4a979420172224af23b +File: /usr/bin/der_gtest 100755 root:root 20ec8e5f011f7893b22235d9b75ec4d5 +File: /usr/bin/derdump 100755 root:root 338f202ba4d474f234e0695466a88ce2 +File: /usr/bin/dertimetest 100755 root:root 7c3ba6762b8a807f5819f26a2a945138 +File: /usr/bin/digest 100755 root:root 46f90735d9c1940aecc5a763287331ee +File: /usr/bin/ecperf 100755 root:root 9aaf76f32ff5b1aeaf57e12f399b5787 +File: /usr/bin/encodeinttest 100755 root:root 62d3a9cfd2f611cf469a050ffcae9f06 +File: /usr/bin/fbectest 100755 root:root dfb389f2c80ff2734027d01ac85befdd +File: /usr/bin/freebl_gtest 100755 root:root 3e9e50180fbf5a3915a5ebf396df5064 +File: /usr/bin/httpserv 100755 root:root c6d16531b9b6f416c463bbc30b0dd657 +File: /usr/bin/hw-support 100755 root:root 2ee1e27b819e964fddf6d102a2a053cc +File: /usr/bin/listsuites 100755 root:root 5cc7da0137b6e89c81c4c0d39f1923bd +File: /usr/bin/lowhashtest 100755 root:root b9c91143cbaaca2a2d041ce96ac01f03 +File: /usr/bin/makepqg 100755 root:root cce5648120218fedb3379479edcac75b +File: /usr/bin/mangle 100755 root:root 21bd15dbc73df0de1f9bc3bd4af7c75c +File: /usr/bin/modutil 100755 root:root 5e733d3572c6ec4f6164a77980102fd4 +File: /usr/bin/mozpkix_gtest 100755 root:root 9b2d5e2cdfcd0633a9e77f05d4ad631b +File: /usr/bin/mpi_tests 100755 root:root 9b7b110ef00a76712031a4bd2f6fb08a +File: /usr/bin/multinit 100755 root:root 4b05f15c95bb5fc4a3167000a840840d +File: /usr/bin/nonspr10 100755 root:root c4c647930e8000b13c94365529a8867b +File: /usr/bin/nss 100755 root:root b1d256d1ac4c45e327e4a02a7cd1bb65 +File: /usr/bin/nss-policy-check 100755 root:root dbd7f22611a0eb93af99b7871f5c69b8 +File: /usr/bin/nss_bogo_shim 100755 root:root 393f9fc53e5381b04ff6984aa54c498c +File: /usr/bin/ocspclnt 100755 root:root cd10f82ee302a6fb6402d0d390cc46e4 +File: /usr/bin/ocspresp 100755 root:root f2debc2d31dbcb41c0d98ccfa8a0a5c7 +File: /usr/bin/oidcalc 100755 root:root 7fea8015fb1025a09ee859f7f8de6dbc +File: /usr/bin/p7content 100755 root:root 76e37724597af142db09757e33c12bbc +File: /usr/bin/p7env 100755 root:root 3982652441375b3738c5e28f11ff5364 +File: /usr/bin/p7sign 100755 root:root 7f2e4203c286c90499f9f6a32266bbda +File: /usr/bin/p7verify 100755 root:root fc6cc485734b786251d0ac08e815f7bd +File: /usr/bin/pk11_gtest 100755 root:root 72c35f4d594c5032422611f0bc6cf819 +File: /usr/bin/pk11ectest 100755 root:root f6481049e3c4754f0bcd77304c243e04 +File: /usr/bin/pk11gcmtest 100755 root:root e51cb8d916e8c93762c01451c553c7f9 +File: /usr/bin/pk11importtest 100755 root:root 23b9fd2848355c88ab0bba7958b3d261 +File: /usr/bin/pk11mode 100755 root:root 9a8a660fc09f96845cfe7c2989e4d908 +File: /usr/bin/pk12util 100755 root:root a9ea80b672b2a8f8c7f69549a25b4873 +File: /usr/bin/pk1sign 100755 root:root 34e5ec40ea76325417fe003c8b60eff3 +File: /usr/bin/pkix-errcodes 100755 root:root fbfc3b1173187cf05dd7011585fd1922 +File: /usr/bin/pp 100755 root:root 72e86bdbea2b7aa57e4108c9fe6b6444 +File: /usr/bin/prng_gtest 100755 root:root 178c21a2f740ef24ad773f0fc2c44ed3 +File: /usr/bin/pwdecrypt 100755 root:root 518a007134179eda99b5f52d91a217f5 +File: /usr/bin/remtest 100755 root:root 0f68b4d7ae5a0b7cb82e15ed654590ed +File: /usr/bin/rsaperf 100755 root:root c198a95be4308681ad4627e0207bd477 +File: /usr/bin/rsapoptst 100755 root:root 233ee64cc7abed992e06790c7b3a40f3 +File: /usr/bin/sdrtest 100755 root:root 5cee9bfe928841c3eb10d74684334847 +File: /usr/bin/secmodtest 100755 root:root b2374f9239a49347b76872a079d1bd9c +File: /usr/bin/selfserv 100755 root:root 9c02511b99a33abe632aa8511105f421 +File: /usr/bin/shlibsign 100755 root:root c85f050343bee169abe40b4febddcd94 +File: /usr/bin/signtool 100755 root:root 4eca5f28f3cd756998416667ee88e666 +File: /usr/bin/signver 100755 root:root af89641ff6406bb902ffc9f07ed9271b +File: /usr/bin/smime_gtest 100755 root:root a4c9aaa332582daae00cca8fca2d47c0 +File: /usr/bin/softoken_gtest 100755 root:root b4ee901039486da06d20ac560b8f4937 +File: /usr/bin/ssl_gtest 100755 root:root 8d49bbfb1afb6904a8a931302e51d57b +File: /usr/bin/ssltap 100755 root:root 137fdc48c7bff1c2f96c944453057b1f +File: /usr/bin/strsclnt 100755 root:root ea2462ff3781ef4e98aab3772bd399c9 +File: /usr/bin/symkeyutil 100755 root:root 6e3d060781410a082b847042b14d53b6 +File: /usr/bin/sysinit_gtest 100755 root:root 1691f2f3f55f494e9532a9a91cf29a90 +File: /usr/bin/tstclnt 100755 root:root fb31861eca9303b325143ae15a7a344f +File: /usr/bin/util_gtest 100755 root:root aa5b214f8695a810c5bad61ce40fa333 +File: /usr/bin/vfychain 100755 root:root 32b9526e50f220dba49db7dbdde49cc6 +File: /usr/bin/vfyserv 100755 root:root 0286c9cbfbddb4d91346c5799062153b +RPMIdentity: e4d9726dc7e1eb274e12e5f719245bbb2c65522a0c5f3a9312d1ad161fb4a91c6eae7dc093fd80b30765b3be49ce61cb5bd8455d59c20e2c7cb1f19ddf7dcf6a --- nss-utils-debuginfo-3.66.0-alt2.x86_64.rpm.repo 2021-07-19 11:28:02.000000000 +0000 +++ nss-utils-debuginfo-3.66.0-alt2.x86_64.rpm.hasher 2021-08-03 01:11:54.673398325 +0000 @@ -1,222 +1,219 @@ /usr/lib/debug/.build-id/00 40755 root:root -/usr/lib/debug/.build-id/00/b4ae544332df6b0aa89fc98b2c3c105c58301c 120777 root:root ../../../../bin/mangle -/usr/lib/debug/.build-id/00/b4ae544332df6b0aa89fc98b2c3c105c58301c.debug 120777 root:root ../../usr/bin/mangle.debug -/usr/lib/debug/.build-id/04 40755 root:root -/usr/lib/debug/.build-id/04/7c19b2d018f394a81a68c2884e9d3650fd2fc4 120777 root:root ../../../../bin/baddbdir -/usr/lib/debug/.build-id/04/7c19b2d018f394a81a68c2884e9d3650fd2fc4.debug 120777 root:root ../../usr/bin/baddbdir.debug -/usr/lib/debug/.build-id/09 40755 root:root -/usr/lib/debug/.build-id/09/994d94441fe5112264b2a3f01d9132e56df8d0 120777 root:root ../../../../bin/remtest -/usr/lib/debug/.build-id/09/994d94441fe5112264b2a3f01d9132e56df8d0.debug 120777 root:root ../../usr/bin/remtest.debug +/usr/lib/debug/.build-id/00/ee21383d096a2a102cdd30de447153110a58a8 120777 root:root ../../../../bin/lowhashtest +/usr/lib/debug/.build-id/00/ee21383d096a2a102cdd30de447153110a58a8.debug 120777 root:root ../../usr/bin/lowhashtest.debug +/usr/lib/debug/.build-id/01 40755 root:root +/usr/lib/debug/.build-id/01/daa60f4af6062576a6a8e2cce4e62686ece500 120777 root:root ../../../../bin/pk11mode +/usr/lib/debug/.build-id/01/daa60f4af6062576a6a8e2cce4e62686ece500.debug 120777 root:root ../../usr/bin/pk11mode.debug +/usr/lib/debug/.build-id/0a 40755 root:root +/usr/lib/debug/.build-id/0a/a02722d71c13d0107ede08fe6bb12cae0ec042 120777 root:root ../../../../bin/pwdecrypt +/usr/lib/debug/.build-id/0a/a02722d71c13d0107ede08fe6bb12cae0ec042.debug 120777 root:root ../../usr/bin/pwdecrypt.debug /usr/lib/debug/.build-id/0d 40755 root:root -/usr/lib/debug/.build-id/0d/d3acf9951070c08902366ee10e590424fe43a2 120777 root:root ../../../../bin/digest -/usr/lib/debug/.build-id/0d/d3acf9951070c08902366ee10e590424fe43a2.debug 120777 root:root ../../usr/bin/digest.debug -/usr/lib/debug/.build-id/10 40755 root:root -/usr/lib/debug/.build-id/10/9ccff634eae139edf7cde2c8c6dfd85989b6a5 120777 root:root ../../../../bin/chktest -/usr/lib/debug/.build-id/10/9ccff634eae139edf7cde2c8c6dfd85989b6a5.debug 120777 root:root ../../usr/bin/chktest.debug -/usr/lib/debug/.build-id/13 40755 root:root -/usr/lib/debug/.build-id/13/0bb5a427d7a680c70fee50cf991b20c3a0c561 120777 root:root ../../../../bin/certdb_gtest -/usr/lib/debug/.build-id/13/0bb5a427d7a680c70fee50cf991b20c3a0c561.debug 120777 root:root ../../usr/bin/certdb_gtest.debug +/usr/lib/debug/.build-id/0d/554e24c3753f214d22178009a40fba639e61cc 120777 root:root ../../../../bin/ssltap +/usr/lib/debug/.build-id/0d/554e24c3753f214d22178009a40fba639e61cc.debug 120777 root:root ../../usr/bin/ssltap.debug +/usr/lib/debug/.build-id/11 40755 root:root +/usr/lib/debug/.build-id/11/6321bebf81875b53f836638ade8d0e116f3d21 120777 root:root ../../../../bin/crlutil +/usr/lib/debug/.build-id/11/6321bebf81875b53f836638ade8d0e116f3d21.debug 120777 root:root ../../usr/bin/crlutil.debug /usr/lib/debug/.build-id/16 40755 root:root -/usr/lib/debug/.build-id/16/57d1c7beabd6a62bf4adca1cd1abf23c4a908e 120777 root:root ../../../../bin/vfychain -/usr/lib/debug/.build-id/16/57d1c7beabd6a62bf4adca1cd1abf23c4a908e.debug 120777 root:root ../../usr/bin/vfychain.debug -/usr/lib/debug/.build-id/1a 40755 root:root -/usr/lib/debug/.build-id/1a/f0dbdfaea943ce0b566437fbc060fd7809b67f 120777 root:root ../../../../bin/pkix-errcodes -/usr/lib/debug/.build-id/1a/f0dbdfaea943ce0b566437fbc060fd7809b67f.debug 120777 root:root ../../usr/bin/pkix-errcodes.debug +/usr/lib/debug/.build-id/16/a2f059ee3434ce1bf2f25c4df080660be00934 120777 root:root ../../../../bin/signver +/usr/lib/debug/.build-id/16/a2f059ee3434ce1bf2f25c4df080660be00934.debug 120777 root:root ../../usr/bin/signver.debug +/usr/lib/debug/.build-id/19 40755 root:root +/usr/lib/debug/.build-id/19/08bb65cfd4e902fc2c6adf193d1ef28a78cf13 120777 root:root ../../../../bin/selfserv +/usr/lib/debug/.build-id/19/08bb65cfd4e902fc2c6adf193d1ef28a78cf13.debug 120777 root:root ../../usr/bin/selfserv.debug +/usr/lib/debug/.build-id/1b 40755 root:root +/usr/lib/debug/.build-id/1b/2f04b106257155ec9e43db3a383778c127bc61 120777 root:root ../../../../bin/vfychain +/usr/lib/debug/.build-id/1b/2f04b106257155ec9e43db3a383778c127bc61.debug 120777 root:root ../../usr/bin/vfychain.debug /usr/lib/debug/.build-id/1c 40755 root:root -/usr/lib/debug/.build-id/1c/0e77cd73d578768325c1ea1d68644175126cee 120777 root:root ../../../../bin/makepqg -/usr/lib/debug/.build-id/1c/0e77cd73d578768325c1ea1d68644175126cee.debug 120777 root:root ../../usr/bin/makepqg.debug -/usr/lib/debug/.build-id/1d 40755 root:root -/usr/lib/debug/.build-id/1d/ddcf121e5135d3f696622c8196549cd85f4420 120777 root:root ../../../../bin/smime_gtest -/usr/lib/debug/.build-id/1d/ddcf121e5135d3f696622c8196549cd85f4420.debug 120777 root:root ../../usr/bin/smime_gtest.debug -/usr/lib/debug/.build-id/23 40755 root:root -/usr/lib/debug/.build-id/23/8dac4e1f33e24dba4cd9d6d41611606e89adcc 120777 root:root ../../../../bin/pk12util -/usr/lib/debug/.build-id/23/8dac4e1f33e24dba4cd9d6d41611606e89adcc.debug 120777 root:root ../../usr/bin/pk12util.debug -/usr/lib/debug/.build-id/25 40755 root:root -/usr/lib/debug/.build-id/25/a53f8d1b44dd3e7682e4d4ca8b191af6ed1709 120777 root:root ../../../../bin/vfyserv -/usr/lib/debug/.build-id/25/a53f8d1b44dd3e7682e4d4ca8b191af6ed1709.debug 120777 root:root ../../usr/bin/vfyserv.debug -/usr/lib/debug/.build-id/26 40755 root:root -/usr/lib/debug/.build-id/26/2443e97103a7891693081e72c937a7cf839f35 120777 root:root ../../../../bin/ocspresp -/usr/lib/debug/.build-id/26/2443e97103a7891693081e72c937a7cf839f35.debug 120777 root:root ../../usr/bin/ocspresp.debug -/usr/lib/debug/.build-id/26/c762d4ff857ff6b4d70b159d1458f39283bece 120777 root:root ../../../../bin/crmftest -/usr/lib/debug/.build-id/26/c762d4ff857ff6b4d70b159d1458f39283bece.debug 120777 root:root ../../usr/bin/crmftest.debug -/usr/lib/debug/.build-id/27 40755 root:root -/usr/lib/debug/.build-id/27/ee6cc872ba4676f102e577b65adba783707d43 120777 root:root ../../../../bin/p7sign -/usr/lib/debug/.build-id/27/ee6cc872ba4676f102e577b65adba783707d43.debug 120777 root:root ../../usr/bin/p7sign.debug +/usr/lib/debug/.build-id/1c/53c834010d351acc0d4cc089ce1784b0da934a 120777 root:root ../../../../bin/ecperf +/usr/lib/debug/.build-id/1c/53c834010d351acc0d4cc089ce1784b0da934a.debug 120777 root:root ../../usr/bin/ecperf.debug +/usr/lib/debug/.build-id/24 40755 root:root +/usr/lib/debug/.build-id/24/16e8fb9fd75f8e3ccbd47e999ac166e7312eb2 120777 root:root ../../../../bin/p7sign +/usr/lib/debug/.build-id/24/16e8fb9fd75f8e3ccbd47e999ac166e7312eb2.debug 120777 root:root ../../usr/bin/p7sign.debug +/usr/lib/debug/.build-id/24/c15ebd30a651f210f725ad55548b7b8518fe9a 120777 root:root ../../../../bin/sdrtest +/usr/lib/debug/.build-id/24/c15ebd30a651f210f725ad55548b7b8518fe9a.debug 120777 root:root ../../usr/bin/sdrtest.debug /usr/lib/debug/.build-id/29 40755 root:root -/usr/lib/debug/.build-id/29/60a99d187c83bf8f758ce721dbb8880217dfe2 120777 root:root ../../../../bin/pk11gcmtest -/usr/lib/debug/.build-id/29/60a99d187c83bf8f758ce721dbb8880217dfe2.debug 120777 root:root ../../usr/bin/pk11gcmtest.debug -/usr/lib/debug/.build-id/29/c1c2a813a17e01d56e5b10711f83ef48c25269 120777 root:root ../../../../bin/pk1sign -/usr/lib/debug/.build-id/29/c1c2a813a17e01d56e5b10711f83ef48c25269.debug 120777 root:root ../../usr/bin/pk1sign.debug -/usr/lib/debug/.build-id/2e 40755 root:root -/usr/lib/debug/.build-id/2e/0ffa3e7ff9ae404feb7cbad05825de561b099f 120777 root:root ../../../../bin/hw-support -/usr/lib/debug/.build-id/2e/0ffa3e7ff9ae404feb7cbad05825de561b099f.debug 120777 root:root ../../usr/bin/hw-support.debug -/usr/lib/debug/.build-id/2f 40755 root:root -/usr/lib/debug/.build-id/2f/9a096a72b179c160ac137d295e19c2e8518ab7 120777 root:root ../../../../bin/tstclnt -/usr/lib/debug/.build-id/2f/9a096a72b179c160ac137d295e19c2e8518ab7.debug 120777 root:root ../../usr/bin/tstclnt.debug -/usr/lib/debug/.build-id/30 40755 root:root -/usr/lib/debug/.build-id/30/d78c7afcb6b79b3f4241be6b7d811219e0943b 120777 root:root ../../../../bin/certhigh_gtest -/usr/lib/debug/.build-id/30/d78c7afcb6b79b3f4241be6b7d811219e0943b.debug 120777 root:root ../../usr/bin/certhigh_gtest.debug -/usr/lib/debug/.build-id/32 40755 root:root -/usr/lib/debug/.build-id/32/b16ff458b532cdc5005ac280176d589dc9a8d9 120777 root:root ../../../../bin/selfserv -/usr/lib/debug/.build-id/32/b16ff458b532cdc5005ac280176d589dc9a8d9.debug 120777 root:root ../../usr/bin/selfserv.debug -/usr/lib/debug/.build-id/33 40755 root:root -/usr/lib/debug/.build-id/33/88e2bc0779083b9b0db26bedf5c9588468a62e 120777 root:root ../../../../bin/crlutil -/usr/lib/debug/.build-id/33/88e2bc0779083b9b0db26bedf5c9588468a62e.debug 120777 root:root ../../usr/bin/crlutil.debug -/usr/lib/debug/.build-id/39 40755 root:root -/usr/lib/debug/.build-id/39/c5e9e3dd8fa279ad95bb00db00a6bae64bd912 120777 root:root ../../../../bin/ssltap -/usr/lib/debug/.build-id/39/c5e9e3dd8fa279ad95bb00db00a6bae64bd912.debug 120777 root:root ../../usr/bin/ssltap.debug -/usr/lib/debug/.build-id/3b 40755 root:root -/usr/lib/debug/.build-id/3b/b4f34874446af0b2892aac495057881653126f 120777 root:root ../../../../bin/nss -/usr/lib/debug/.build-id/3b/b4f34874446af0b2892aac495057881653126f.debug 120777 root:root ../../usr/bin/nss.debug -/usr/lib/debug/.build-id/3c 40755 root:root -/usr/lib/debug/.build-id/3c/c305822495e406c544c505cd153288784e3ee2 120777 root:root ../../../../bin/pk11importtest -/usr/lib/debug/.build-id/3c/c305822495e406c544c505cd153288784e3ee2.debug 120777 root:root ../../usr/bin/pk11importtest.debug +/usr/lib/debug/.build-id/29/162c15a1b3c63481c7c79e7813890de2c2aa7f 120777 root:root ../../../../bin/dertimetest +/usr/lib/debug/.build-id/29/162c15a1b3c63481c7c79e7813890de2c2aa7f.debug 120777 root:root ../../usr/bin/dertimetest.debug +/usr/lib/debug/.build-id/38 40755 root:root +/usr/lib/debug/.build-id/38/623902c32c42a5429fcb0b02fffb5ced136c17 120777 root:root ../../../../bin/chktest +/usr/lib/debug/.build-id/38/623902c32c42a5429fcb0b02fffb5ced136c17.debug 120777 root:root ../../usr/bin/chktest.debug /usr/lib/debug/.build-id/3d 40755 root:root -/usr/lib/debug/.build-id/3d/002507feae3f323e8c0c4b35b5c77215cb3d2e 120777 root:root ../../../../bin/p7env -/usr/lib/debug/.build-id/3d/002507feae3f323e8c0c4b35b5c77215cb3d2e.debug 120777 root:root ../../usr/bin/p7env.debug -/usr/lib/debug/.build-id/3e 40755 root:root -/usr/lib/debug/.build-id/3e/f0453b5eaedc53f0419547f9fabd81b33b3714 120777 root:root ../../../../bin/sysinit_gtest -/usr/lib/debug/.build-id/3e/f0453b5eaedc53f0419547f9fabd81b33b3714.debug 120777 root:root ../../usr/bin/sysinit_gtest.debug -/usr/lib/debug/.build-id/3f 40755 root:root -/usr/lib/debug/.build-id/3f/cda42a7f7a501635f35d1e6be7d88add832731 120777 root:root ../../../../bin/modutil -/usr/lib/debug/.build-id/3f/cda42a7f7a501635f35d1e6be7d88add832731.debug 120777 root:root ../../usr/bin/modutil.debug -/usr/lib/debug/.build-id/40 40755 root:root -/usr/lib/debug/.build-id/40/c4ad16f9098b95b4422320922505344a4bb020 120777 root:root ../../../../bin/pp -/usr/lib/debug/.build-id/40/c4ad16f9098b95b4422320922505344a4bb020.debug 120777 root:root ../../usr/bin/pp.debug -/usr/lib/debug/.build-id/41 40755 root:root -/usr/lib/debug/.build-id/41/646ccaafe965d112fd319ebf41dfef7c7acb51 120777 root:root ../../../../bin/ssl_gtest -/usr/lib/debug/.build-id/41/646ccaafe965d112fd319ebf41dfef7c7acb51.debug 120777 root:root ../../usr/bin/ssl_gtest.debug -/usr/lib/debug/.build-id/48 40755 root:root -/usr/lib/debug/.build-id/48/bb56e9a8d8b9ac9010230520dd5aaa869171b7 120777 root:root ../../../../bin/blake2b_gtest -/usr/lib/debug/.build-id/48/bb56e9a8d8b9ac9010230520dd5aaa869171b7.debug 120777 root:root ../../usr/bin/blake2b_gtest.debug -/usr/lib/debug/.build-id/49 40755 root:root -/usr/lib/debug/.build-id/49/cc2071902593044082d9244b6eb986e6f14634 120777 root:root ../../../../bin/prng_gtest -/usr/lib/debug/.build-id/49/cc2071902593044082d9244b6eb986e6f14634.debug 120777 root:root ../../usr/bin/prng_gtest.debug -/usr/lib/debug/.build-id/4f 40755 root:root -/usr/lib/debug/.build-id/4f/03341a7aa7860b58f004910bdb6f3cf0a6340d 120777 root:root ../../../../bin/dbtest -/usr/lib/debug/.build-id/4f/03341a7aa7860b58f004910bdb6f3cf0a6340d.debug 120777 root:root ../../usr/bin/dbtest.debug -/usr/lib/debug/.build-id/4f/dfd3bb07843184f2cbfa81ad5c80b782bd2481 120777 root:root ../../../../bin/nss-policy-check -/usr/lib/debug/.build-id/4f/dfd3bb07843184f2cbfa81ad5c80b782bd2481.debug 120777 root:root ../../usr/bin/nss-policy-check.debug +/usr/lib/debug/.build-id/3d/0e68a7ffe65bfda73276eeeb8d3ad81ae2bc0f 120777 root:root ../../../../bin/pk11gcmtest +/usr/lib/debug/.build-id/3d/0e68a7ffe65bfda73276eeeb8d3ad81ae2bc0f.debug 120777 root:root ../../usr/bin/pk11gcmtest.debug +/usr/lib/debug/.build-id/43 40755 root:root +/usr/lib/debug/.build-id/43/3914cf6274c9792854dc7f8d434c1f8f52a6e4 120777 root:root ../../../../bin/pp +/usr/lib/debug/.build-id/43/3914cf6274c9792854dc7f8d434c1f8f52a6e4.debug 120777 root:root ../../usr/bin/pp.debug +/usr/lib/debug/.build-id/44 40755 root:root +/usr/lib/debug/.build-id/44/a751086af19118c76ee69d2babb5cac103af82 120777 root:root ../../../../bin/cryptohi_gtest +/usr/lib/debug/.build-id/44/a751086af19118c76ee69d2babb5cac103af82.debug 120777 root:root ../../usr/bin/cryptohi_gtest.debug /usr/lib/debug/.build-id/54 40755 root:root -/usr/lib/debug/.build-id/54/60dcd25878ea9b3ded36c8543b255c89eb07dc 120777 root:root ../../../../bin/strsclnt -/usr/lib/debug/.build-id/54/60dcd25878ea9b3ded36c8543b255c89eb07dc.debug 120777 root:root ../../usr/bin/strsclnt.debug +/usr/lib/debug/.build-id/54/539ead0538c49fe2c072635a7d1a6051989eaa 120777 root:root ../../../../bin/secmodtest +/usr/lib/debug/.build-id/54/539ead0538c49fe2c072635a7d1a6051989eaa.debug 120777 root:root ../../usr/bin/secmodtest.debug +/usr/lib/debug/.build-id/55 40755 root:root +/usr/lib/debug/.build-id/55/a0ba32dca9b759c3bce7d044342036d5401af9 120777 root:root ../../../../bin/derdump +/usr/lib/debug/.build-id/55/a0ba32dca9b759c3bce7d044342036d5401af9.debug 120777 root:root ../../usr/bin/derdump.debug /usr/lib/debug/.build-id/56 40755 root:root -/usr/lib/debug/.build-id/56/260e5047ab73c04a2118934efc03c9c72ef729 120777 root:root ../../../../bin/secmodtest -/usr/lib/debug/.build-id/56/260e5047ab73c04a2118934efc03c9c72ef729.debug 120777 root:root ../../usr/bin/secmodtest.debug -/usr/lib/debug/.build-id/57 40755 root:root -/usr/lib/debug/.build-id/57/6d51370cbb99d0ecded4fcf94a4a503c6543bc 120777 root:root ../../../../bin/signtool -/usr/lib/debug/.build-id/57/6d51370cbb99d0ecded4fcf94a4a503c6543bc.debug 120777 root:root ../../usr/bin/signtool.debug -/usr/lib/debug/.build-id/58 40755 root:root -/usr/lib/debug/.build-id/58/d28c3b11a732941efc9fce0d641247f1e9bfa0 120777 root:root ../../../../bin/pk11_gtest -/usr/lib/debug/.build-id/58/d28c3b11a732941efc9fce0d641247f1e9bfa0.debug 120777 root:root ../../usr/bin/pk11_gtest.debug +/usr/lib/debug/.build-id/56/294b39fe16fde4f83b1c790296b69255b6007b 120777 root:root ../../../../bin/tstclnt +/usr/lib/debug/.build-id/56/294b39fe16fde4f83b1c790296b69255b6007b.debug 120777 root:root ../../usr/bin/tstclnt.debug +/usr/lib/debug/.build-id/5b 40755 root:root +/usr/lib/debug/.build-id/5b/05c17bc074a7f0ea64932df8d40c6c5b322ebd 120777 root:root ../../../../bin/fbectest +/usr/lib/debug/.build-id/5b/05c17bc074a7f0ea64932df8d40c6c5b322ebd.debug 120777 root:root ../../usr/bin/fbectest.debug +/usr/lib/debug/.build-id/5b/db3f33addf25a63dd3227c2df3bf0ddfdd75a5 120777 root:root ../../../../bin/btoa +/usr/lib/debug/.build-id/5b/db3f33addf25a63dd3227c2df3bf0ddfdd75a5.debug 120777 root:root ../../usr/bin/btoa.debug +/usr/lib/debug/.build-id/5c 40755 root:root +/usr/lib/debug/.build-id/5c/ab66876e7b350d37097c09661b3f1df7b2e9f1 120777 root:root ../../../../bin/oidcalc +/usr/lib/debug/.build-id/5c/ab66876e7b350d37097c09661b3f1df7b2e9f1.debug 120777 root:root ../../usr/bin/oidcalc.debug /usr/lib/debug/.build-id/5d 40755 root:root -/usr/lib/debug/.build-id/5d/07a32d34efb797e3e59e8497b3f51ccd13fcc4 120777 root:root ../../../../bin/nss_bogo_shim -/usr/lib/debug/.build-id/5d/07a32d34efb797e3e59e8497b3f51ccd13fcc4.debug 120777 root:root ../../usr/bin/nss_bogo_shim.debug -/usr/lib/debug/.build-id/5d/f16b7d0a22037a51d0df20dff4b45aa9ca0c25 120777 root:root ../../../../bin/ecperf -/usr/lib/debug/.build-id/5d/f16b7d0a22037a51d0df20dff4b45aa9ca0c25.debug 120777 root:root ../../usr/bin/ecperf.debug -/usr/lib/debug/.build-id/62 40755 root:root -/usr/lib/debug/.build-id/62/722c694390362239296119b89d11b37b82666a 120777 root:root ../../../../bin/pwdecrypt -/usr/lib/debug/.build-id/62/722c694390362239296119b89d11b37b82666a.debug 120777 root:root ../../usr/bin/pwdecrypt.debug -/usr/lib/debug/.build-id/66 40755 root:root -/usr/lib/debug/.build-id/66/967948ef6be293380b69fe8d68292d62ac16f1 120777 root:root ../../../../bin/dertimetest -/usr/lib/debug/.build-id/66/967948ef6be293380b69fe8d68292d62ac16f1.debug 120777 root:root ../../usr/bin/dertimetest.debug +/usr/lib/debug/.build-id/5d/b92a3724931ba87064bafbaee4eb9497e3fef5 120777 root:root ../../../../bin/nss +/usr/lib/debug/.build-id/5d/b92a3724931ba87064bafbaee4eb9497e3fef5.debug 120777 root:root ../../usr/bin/nss.debug +/usr/lib/debug/.build-id/5e 40755 root:root +/usr/lib/debug/.build-id/5e/95f1c7ad569867cdb6d1886cee83f3954c25f5 120777 root:root ../../../../bin/baddbdir +/usr/lib/debug/.build-id/5e/95f1c7ad569867cdb6d1886cee83f3954c25f5.debug 120777 root:root ../../usr/bin/baddbdir.debug +/usr/lib/debug/.build-id/60 40755 root:root +/usr/lib/debug/.build-id/60/1d8c54adbdd1d0facb3672890012f36a6671be 120777 root:root ../../../../bin/ssl_gtest +/usr/lib/debug/.build-id/60/1d8c54adbdd1d0facb3672890012f36a6671be.debug 120777 root:root ../../usr/bin/ssl_gtest.debug +/usr/lib/debug/.build-id/63 40755 root:root +/usr/lib/debug/.build-id/63/b2c8d4a91d2153315e97f1a8aa1e9eb4452238 120777 root:root ../../../../bin/dbtest +/usr/lib/debug/.build-id/63/b2c8d4a91d2153315e97f1a8aa1e9eb4452238.debug 120777 root:root ../../usr/bin/dbtest.debug +/usr/lib/debug/.build-id/65 40755 root:root +/usr/lib/debug/.build-id/65/b2a24afe3a6bc523215630390d4490c342511d 120777 root:root ../../../../bin/listsuites +/usr/lib/debug/.build-id/65/b2a24afe3a6bc523215630390d4490c342511d.debug 120777 root:root ../../usr/bin/listsuites.debug /usr/lib/debug/.build-id/67 40755 root:root -/usr/lib/debug/.build-id/67/9efb3de320bc780891d0715c8fdc17a16550a3 120777 root:root ../../../../bin/cryptohi_gtest -/usr/lib/debug/.build-id/67/9efb3de320bc780891d0715c8fdc17a16550a3.debug 120777 root:root ../../usr/bin/cryptohi_gtest.debug -/usr/lib/debug/.build-id/69 40755 root:root -/usr/lib/debug/.build-id/69/2d9a206de815ea2a4b5849d869fad78a223621 120777 root:root ../../../../bin/mpi_tests -/usr/lib/debug/.build-id/69/2d9a206de815ea2a4b5849d869fad78a223621.debug 120777 root:root ../../usr/bin/mpi_tests.debug -/usr/lib/debug/.build-id/76 40755 root:root -/usr/lib/debug/.build-id/76/f2b385b149df5e36b3f9adc3371ef3bc9ade81 120777 root:root ../../../../bin/shlibsign -/usr/lib/debug/.build-id/76/f2b385b149df5e36b3f9adc3371ef3bc9ade81.debug 120777 root:root ../../usr/bin/shlibsign.debug -/usr/lib/debug/.build-id/78 40755 root:root -/usr/lib/debug/.build-id/78/e7d75f7efd307dfe248be6d81fbaa9e94199e3 120777 root:root ../../../../bin/certutil -/usr/lib/debug/.build-id/78/e7d75f7efd307dfe248be6d81fbaa9e94199e3.debug 120777 root:root ../../usr/bin/certutil.debug -/usr/lib/debug/.build-id/87 40755 root:root -/usr/lib/debug/.build-id/87/bc9457ca4e35b33305fd4d9ab6e5418355f8fb 120777 root:root ../../../../bin/cmsutil -/usr/lib/debug/.build-id/87/bc9457ca4e35b33305fd4d9ab6e5418355f8fb.debug 120777 root:root ../../usr/bin/cmsutil.debug -/usr/lib/debug/.build-id/88 40755 root:root -/usr/lib/debug/.build-id/88/c2bdc37a28cc01220b721b0f73607907a2227c 120777 root:root ../../../../bin/p7content -/usr/lib/debug/.build-id/88/c2bdc37a28cc01220b721b0f73607907a2227c.debug 120777 root:root ../../usr/bin/p7content.debug -/usr/lib/debug/.build-id/91 40755 root:root -/usr/lib/debug/.build-id/91/6bd393a9cf1e36c045443be4c93ad48274e4a6 120777 root:root ../../../../bin/util_gtest -/usr/lib/debug/.build-id/91/6bd393a9cf1e36c045443be4c93ad48274e4a6.debug 120777 root:root ../../usr/bin/util_gtest.debug -/usr/lib/debug/.build-id/91/79a5d812c1825f783202bd415d6c9c2d6a8efb 120777 root:root ../../../../bin/conflict -/usr/lib/debug/.build-id/91/79a5d812c1825f783202bd415d6c9c2d6a8efb.debug 120777 root:root ../../usr/bin/conflict.debug -/usr/lib/debug/.build-id/98 40755 root:root -/usr/lib/debug/.build-id/98/fd9e39dd513732448fd677b0599c90cc0c0ef1 120777 root:root ../../../../bin/multinit -/usr/lib/debug/.build-id/98/fd9e39dd513732448fd677b0599c90cc0c0ef1.debug 120777 root:root ../../usr/bin/multinit.debug +/usr/lib/debug/.build-id/67/31358239c57e24030bfa2d6b2722c32a54f688 120777 root:root ../../../../bin/softoken_gtest +/usr/lib/debug/.build-id/67/31358239c57e24030bfa2d6b2722c32a54f688.debug 120777 root:root ../../usr/bin/softoken_gtest.debug +/usr/lib/debug/.build-id/67/814bc2ee74a45d1dcd0bb8996474a563a0d1fa 120777 root:root ../../../../bin/httpserv +/usr/lib/debug/.build-id/67/814bc2ee74a45d1dcd0bb8996474a563a0d1fa.debug 120777 root:root ../../usr/bin/httpserv.debug +/usr/lib/debug/.build-id/6c 40755 root:root +/usr/lib/debug/.build-id/6c/e73f6aa1932fae55357f6a4c07fd1b811e9380 120777 root:root ../../../../bin/p7content +/usr/lib/debug/.build-id/6c/e73f6aa1932fae55357f6a4c07fd1b811e9380.debug 120777 root:root ../../usr/bin/p7content.debug +/usr/lib/debug/.build-id/6f 40755 root:root +/usr/lib/debug/.build-id/6f/0e4d8caa6042a2e3019d761ea46e5f78334167 120777 root:root ../../../../bin/shlibsign +/usr/lib/debug/.build-id/6f/0e4d8caa6042a2e3019d761ea46e5f78334167.debug 120777 root:root ../../usr/bin/shlibsign.debug +/usr/lib/debug/.build-id/6f/6679bf702723dc77be98f298d7b845ddf92b3e 120777 root:root ../../../../bin/certdb_gtest +/usr/lib/debug/.build-id/6f/6679bf702723dc77be98f298d7b845ddf92b3e.debug 120777 root:root ../../usr/bin/certdb_gtest.debug +/usr/lib/debug/.build-id/73 40755 root:root +/usr/lib/debug/.build-id/73/cca998cccac7c34c5e5c98e59a2176e9b3bc22 120777 root:root ../../../../bin/nonspr10 +/usr/lib/debug/.build-id/73/cca998cccac7c34c5e5c98e59a2176e9b3bc22.debug 120777 root:root ../../usr/bin/nonspr10.debug +/usr/lib/debug/.build-id/75 40755 root:root +/usr/lib/debug/.build-id/75/98b836148e6b2fab838bf8899274f38b82722b 120777 root:root ../../../../bin/der_gtest +/usr/lib/debug/.build-id/75/98b836148e6b2fab838bf8899274f38b82722b.debug 120777 root:root ../../usr/bin/der_gtest.debug +/usr/lib/debug/.build-id/77 40755 root:root +/usr/lib/debug/.build-id/77/1ea92bcb1cbca7277cc029c2f4a4237bb48103 120777 root:root ../../../../bin/conflict +/usr/lib/debug/.build-id/77/1ea92bcb1cbca7277cc029c2f4a4237bb48103.debug 120777 root:root ../../usr/bin/conflict.debug +/usr/lib/debug/.build-id/7a 40755 root:root +/usr/lib/debug/.build-id/7a/dd8d590809a08b627227490081b0e5c6512df5 120777 root:root ../../../../bin/crmftest +/usr/lib/debug/.build-id/7a/dd8d590809a08b627227490081b0e5c6512df5.debug 120777 root:root ../../usr/bin/crmftest.debug +/usr/lib/debug/.build-id/80 40755 root:root +/usr/lib/debug/.build-id/80/3dfdda30cef397f56eba3c21fa997bcdce2670 120777 root:root ../../../../bin/hw-support +/usr/lib/debug/.build-id/80/3dfdda30cef397f56eba3c21fa997bcdce2670.debug 120777 root:root ../../usr/bin/hw-support.debug +/usr/lib/debug/.build-id/82 40755 root:root +/usr/lib/debug/.build-id/82/01275a8099d166dd5bb92444169d11569b2bf5 120777 root:root ../../../../bin/blake2b_gtest +/usr/lib/debug/.build-id/82/01275a8099d166dd5bb92444169d11569b2bf5.debug 120777 root:root ../../usr/bin/blake2b_gtest.debug +/usr/lib/debug/.build-id/83 40755 root:root +/usr/lib/debug/.build-id/83/3b423d6fbfa0a544996397311319259adb598c 120777 root:root ../../../../bin/sysinit_gtest +/usr/lib/debug/.build-id/83/3b423d6fbfa0a544996397311319259adb598c.debug 120777 root:root ../../usr/bin/sysinit_gtest.debug +/usr/lib/debug/.build-id/8b 40755 root:root +/usr/lib/debug/.build-id/8b/995eaa1fd1d093dfa79320932527a9c9c576bb 120777 root:root ../../../../bin/encodeinttest +/usr/lib/debug/.build-id/8b/995eaa1fd1d093dfa79320932527a9c9c576bb.debug 120777 root:root ../../usr/bin/encodeinttest.debug +/usr/lib/debug/.build-id/8f 40755 root:root +/usr/lib/debug/.build-id/8f/e446e750fa698a9bf912e80f60a5bc479ade79 120777 root:root ../../../../bin/digest +/usr/lib/debug/.build-id/8f/e446e750fa698a9bf912e80f60a5bc479ade79.debug 120777 root:root ../../usr/bin/digest.debug +/usr/lib/debug/.build-id/95 40755 root:root +/usr/lib/debug/.build-id/95/84b0dd09afb658ef33a44d7d889ff38b69e0df 120777 root:root ../../../../bin/pk11importtest +/usr/lib/debug/.build-id/95/84b0dd09afb658ef33a44d7d889ff38b69e0df.debug 120777 root:root ../../usr/bin/pk11importtest.debug +/usr/lib/debug/.build-id/96 40755 root:root +/usr/lib/debug/.build-id/96/5d2c04ccac92519a4831f16ca38f3085aab277 120777 root:root ../../../../bin/addbuiltin +/usr/lib/debug/.build-id/96/5d2c04ccac92519a4831f16ca38f3085aab277.debug 120777 root:root ../../usr/bin/addbuiltin.debug +/usr/lib/debug/.build-id/9a 40755 root:root +/usr/lib/debug/.build-id/9a/02c5903c3c64a7126d0511d4a76782f2d78e25 120777 root:root ../../../../bin/p7verify +/usr/lib/debug/.build-id/9a/02c5903c3c64a7126d0511d4a76782f2d78e25.debug 120777 root:root ../../usr/bin/p7verify.debug +/usr/lib/debug/.build-id/9b 40755 root:root +/usr/lib/debug/.build-id/9b/4bdb8fa2015fb66b0a4243ee0776216f21df69 120777 root:root ../../../../bin/pk11_gtest +/usr/lib/debug/.build-id/9b/4bdb8fa2015fb66b0a4243ee0776216f21df69.debug 120777 root:root ../../usr/bin/pk11_gtest.debug +/usr/lib/debug/.build-id/9f 40755 root:root +/usr/lib/debug/.build-id/9f/15e5a50afacb102d4f6fc1e91682203d69973e 120777 root:root ../../../../bin/ocspclnt +/usr/lib/debug/.build-id/9f/15e5a50afacb102d4f6fc1e91682203d69973e.debug 120777 root:root ../../usr/bin/ocspclnt.debug +/usr/lib/debug/.build-id/a3 40755 root:root +/usr/lib/debug/.build-id/a3/daaadbe35c3f4a7aef9ba36faf256ec151af07 120777 root:root ../../../../bin/ocspresp +/usr/lib/debug/.build-id/a3/daaadbe35c3f4a7aef9ba36faf256ec151af07.debug 120777 root:root ../../usr/bin/ocspresp.debug /usr/lib/debug/.build-id/a4 40755 root:root -/usr/lib/debug/.build-id/a4/ca2c558dcd28c1fa0e0f3469fb9f1463bd7fd7 120777 root:root ../../../../bin/atob -/usr/lib/debug/.build-id/a4/ca2c558dcd28c1fa0e0f3469fb9f1463bd7fd7.debug 120777 root:root ../../usr/bin/atob.debug -/usr/lib/debug/.build-id/ad 40755 root:root -/usr/lib/debug/.build-id/ad/84e9bfad86207836dc5778a1c3a7bf84e0422a 120777 root:root ../../../../bin/rsaperf -/usr/lib/debug/.build-id/ad/84e9bfad86207836dc5778a1c3a7bf84e0422a.debug 120777 root:root ../../usr/bin/rsaperf.debug -/usr/lib/debug/.build-id/af 40755 root:root -/usr/lib/debug/.build-id/af/bfa8bd6ad344337380bf9dd1bd101191ab5385 120777 root:root ../../../../bin/pk11mode -/usr/lib/debug/.build-id/af/bfa8bd6ad344337380bf9dd1bd101191ab5385.debug 120777 root:root ../../usr/bin/pk11mode.debug -/usr/lib/debug/.build-id/b0 40755 root:root -/usr/lib/debug/.build-id/b0/d2be4cc3e5acaefd10f514bf1642faff13dcc7 120777 root:root ../../../../bin/addbuiltin -/usr/lib/debug/.build-id/b0/d2be4cc3e5acaefd10f514bf1642faff13dcc7.debug 120777 root:root ../../usr/bin/addbuiltin.debug +/usr/lib/debug/.build-id/a4/2d6db29dbfb87ab33fa6430aabe072533d5396 120777 root:root ../../../../bin/modutil +/usr/lib/debug/.build-id/a4/2d6db29dbfb87ab33fa6430aabe072533d5396.debug 120777 root:root ../../usr/bin/modutil.debug +/usr/lib/debug/.build-id/a6 40755 root:root +/usr/lib/debug/.build-id/a6/ccd89894825e6e4bccc2d689a3e28e22546639 120777 root:root ../../../../bin/rsapoptst +/usr/lib/debug/.build-id/a6/ccd89894825e6e4bccc2d689a3e28e22546639.debug 120777 root:root ../../usr/bin/rsapoptst.debug +/usr/lib/debug/.build-id/a7 40755 root:root +/usr/lib/debug/.build-id/a7/fe6632a0cccc5745df057029d440faa0a59f69 120777 root:root ../../../../bin/certutil +/usr/lib/debug/.build-id/a7/fe6632a0cccc5745df057029d440faa0a59f69.debug 120777 root:root ../../usr/bin/certutil.debug +/usr/lib/debug/.build-id/ab 40755 root:root +/usr/lib/debug/.build-id/ab/37fbc5a0b439f60fc36482d6d284d4053de2f8 120777 root:root ../../../../bin/util_gtest +/usr/lib/debug/.build-id/ab/37fbc5a0b439f60fc36482d6d284d4053de2f8.debug 120777 root:root ../../usr/bin/util_gtest.debug +/usr/lib/debug/.build-id/b3 40755 root:root +/usr/lib/debug/.build-id/b3/a59655c5173c43c8d234e2e123458a3a03c724 120777 root:root ../../../../bin/pkix-errcodes +/usr/lib/debug/.build-id/b3/a59655c5173c43c8d234e2e123458a3a03c724.debug 120777 root:root ../../usr/bin/pkix-errcodes.debug +/usr/lib/debug/.build-id/b3/ce3c9146e024676236fb9b71997cbcabbc54f4 120777 root:root ../../../../bin/bltest +/usr/lib/debug/.build-id/b3/ce3c9146e024676236fb9b71997cbcabbc54f4.debug 120777 root:root ../../usr/bin/bltest.debug /usr/lib/debug/.build-id/b6 40755 root:root -/usr/lib/debug/.build-id/b6/a441a2572eadcfa4cb4ca8638c33d2cae59b16 120777 root:root ../../../../bin/fbectest -/usr/lib/debug/.build-id/b6/a441a2572eadcfa4cb4ca8638c33d2cae59b16.debug 120777 root:root ../../usr/bin/fbectest.debug +/usr/lib/debug/.build-id/b6/3987a9648a50a837664c891a0315f909aa23b2 120777 root:root ../../../../bin/cmsutil +/usr/lib/debug/.build-id/b6/3987a9648a50a837664c891a0315f909aa23b2.debug 120777 root:root ../../usr/bin/cmsutil.debug +/usr/lib/debug/.build-id/b7 40755 root:root +/usr/lib/debug/.build-id/b7/05e892f71596d7760ca0072ff2d3f4c1c1cf19 120777 root:root ../../../../bin/signtool +/usr/lib/debug/.build-id/b7/05e892f71596d7760ca0072ff2d3f4c1c1cf19.debug 120777 root:root ../../usr/bin/signtool.debug +/usr/lib/debug/.build-id/b7/63afc2c5b243bf35d492a1d16b77ac245321a7 120777 root:root ../../../../bin/smime_gtest +/usr/lib/debug/.build-id/b7/63afc2c5b243bf35d492a1d16b77ac245321a7.debug 120777 root:root ../../usr/bin/smime_gtest.debug +/usr/lib/debug/.build-id/b8 40755 root:root +/usr/lib/debug/.build-id/b8/2435b85e7082788e0ead5b1083152a130ffd22 120777 root:root ../../../../bin/vfyserv +/usr/lib/debug/.build-id/b8/2435b85e7082788e0ead5b1083152a130ffd22.debug 120777 root:root ../../usr/bin/vfyserv.debug /usr/lib/debug/.build-id/ba 40755 root:root -/usr/lib/debug/.build-id/ba/ebb60959f1b0b86ba3f9bff97235604a167a2e 120777 root:root ../../../../bin/sdrtest -/usr/lib/debug/.build-id/ba/ebb60959f1b0b86ba3f9bff97235604a167a2e.debug 120777 root:root ../../usr/bin/sdrtest.debug +/usr/lib/debug/.build-id/ba/5f639503ef563b11a6741463e492f076924635 120777 root:root ../../../../bin/certhigh_gtest +/usr/lib/debug/.build-id/ba/5f639503ef563b11a6741463e492f076924635.debug 120777 root:root ../../usr/bin/certhigh_gtest.debug /usr/lib/debug/.build-id/bd 40755 root:root -/usr/lib/debug/.build-id/bd/6cd2646f7fad96d5e7928ae6b2723a3bc50f4e 120777 root:root ../../../../bin/oidcalc -/usr/lib/debug/.build-id/bd/6cd2646f7fad96d5e7928ae6b2723a3bc50f4e.debug 120777 root:root ../../usr/bin/oidcalc.debug -/usr/lib/debug/.build-id/c2 40755 root:root -/usr/lib/debug/.build-id/c2/bcd507feb3e45f8116639108d68f0ea49d1d90 120777 root:root ../../../../bin/btoa -/usr/lib/debug/.build-id/c2/bcd507feb3e45f8116639108d68f0ea49d1d90.debug 120777 root:root ../../usr/bin/btoa.debug -/usr/lib/debug/.build-id/ca 40755 root:root -/usr/lib/debug/.build-id/ca/eb48714e831a18433754cace4ad2f77a01edd6 120777 root:root ../../../../bin/mozpkix_gtest -/usr/lib/debug/.build-id/ca/eb48714e831a18433754cace4ad2f77a01edd6.debug 120777 root:root ../../usr/bin/mozpkix_gtest.debug -/usr/lib/debug/.build-id/d0 40755 root:root -/usr/lib/debug/.build-id/d0/ca78c044c0383380a72d5afde81c0a08a5f63e 120777 root:root ../../../../bin/signver -/usr/lib/debug/.build-id/d0/ca78c044c0383380a72d5afde81c0a08a5f63e.debug 120777 root:root ../../usr/bin/signver.debug -/usr/lib/debug/.build-id/d1 40755 root:root -/usr/lib/debug/.build-id/d1/a439883d12852f4a2eb6ffc9df1632ef6f8076 120777 root:root ../../../../bin/ocspclnt -/usr/lib/debug/.build-id/d1/a439883d12852f4a2eb6ffc9df1632ef6f8076.debug 120777 root:root ../../usr/bin/ocspclnt.debug -/usr/lib/debug/.build-id/d3 40755 root:root -/usr/lib/debug/.build-id/d3/46d8d83b0894c63fd55f6109d58fb91a777de7 120777 root:root ../../../../bin/httpserv -/usr/lib/debug/.build-id/d3/46d8d83b0894c63fd55f6109d58fb91a777de7.debug 120777 root:root ../../usr/bin/httpserv.debug -/usr/lib/debug/.build-id/d4 40755 root:root -/usr/lib/debug/.build-id/d4/6a889bf8934b4517895f02bf87fdf97e0d6ceb 120777 root:root ../../../../bin/freebl_gtest -/usr/lib/debug/.build-id/d4/6a889bf8934b4517895f02bf87fdf97e0d6ceb.debug 120777 root:root ../../usr/bin/freebl_gtest.debug -/usr/lib/debug/.build-id/d4/ecf3148b635c934655343b1a85c2b719e6bd8f 120777 root:root ../../../../bin/nonspr10 -/usr/lib/debug/.build-id/d4/ecf3148b635c934655343b1a85c2b719e6bd8f.debug 120777 root:root ../../usr/bin/nonspr10.debug -/usr/lib/debug/.build-id/d6 40755 root:root -/usr/lib/debug/.build-id/d6/12a3332cdb8329bd7d9d223462158117316d3a 120777 root:root ../../../../bin/listsuites -/usr/lib/debug/.build-id/d6/12a3332cdb8329bd7d9d223462158117316d3a.debug 120777 root:root ../../usr/bin/listsuites.debug -/usr/lib/debug/.build-id/d8 40755 root:root -/usr/lib/debug/.build-id/d8/d4cda80255d47806e76851264745ccb890d380 120777 root:root ../../../../bin/bltest -/usr/lib/debug/.build-id/d8/d4cda80255d47806e76851264745ccb890d380.debug 120777 root:root ../../usr/bin/bltest.debug -/usr/lib/debug/.build-id/d9 40755 root:root -/usr/lib/debug/.build-id/d9/9e91fc764ea364e3a2752c5296b1cf16556126 120777 root:root ../../../../bin/symkeyutil -/usr/lib/debug/.build-id/d9/9e91fc764ea364e3a2752c5296b1cf16556126.debug 120777 root:root ../../usr/bin/symkeyutil.debug +/usr/lib/debug/.build-id/bd/92041f1b68ad3adf4f50d337b693c233a7b025 120777 root:root ../../../../bin/nss-policy-check +/usr/lib/debug/.build-id/bd/92041f1b68ad3adf4f50d337b693c233a7b025.debug 120777 root:root ../../usr/bin/nss-policy-check.debug +/usr/lib/debug/.build-id/c0 40755 root:root +/usr/lib/debug/.build-id/c0/328fa62623aff695e3c0312716ebd18dc41e92 120777 root:root ../../../../bin/remtest +/usr/lib/debug/.build-id/c0/328fa62623aff695e3c0312716ebd18dc41e92.debug 120777 root:root ../../usr/bin/remtest.debug +/usr/lib/debug/.build-id/c6 40755 root:root +/usr/lib/debug/.build-id/c6/45d558bcacc7d00019e48699f1316198ff074e 120777 root:root ../../../../bin/prng_gtest +/usr/lib/debug/.build-id/c6/45d558bcacc7d00019e48699f1316198ff074e.debug 120777 root:root ../../usr/bin/prng_gtest.debug +/usr/lib/debug/.build-id/c6/84b2bf9b1396ae5202c30a05328065d9177bb1 120777 root:root ../../../../bin/freebl_gtest +/usr/lib/debug/.build-id/c6/84b2bf9b1396ae5202c30a05328065d9177bb1.debug 120777 root:root ../../usr/bin/freebl_gtest.debug +/usr/lib/debug/.build-id/c8 40755 root:root +/usr/lib/debug/.build-id/c8/0b3caa19445363374e0f15ef49f12ca5d79c12 120777 root:root ../../../../bin/p7env +/usr/lib/debug/.build-id/c8/0b3caa19445363374e0f15ef49f12ca5d79c12.debug 120777 root:root ../../usr/bin/p7env.debug +/usr/lib/debug/.build-id/cc 40755 root:root +/usr/lib/debug/.build-id/cc/c001d57624961ed7891d9923484e52cdb767cb 120777 root:root ../../../../bin/makepqg +/usr/lib/debug/.build-id/cc/c001d57624961ed7891d9923484e52cdb767cb.debug 120777 root:root ../../usr/bin/makepqg.debug +/usr/lib/debug/.build-id/d5 40755 root:root +/usr/lib/debug/.build-id/d5/0043fa778c64fd87a323ce33facfa83148f373 120777 root:root ../../../../bin/nss_bogo_shim +/usr/lib/debug/.build-id/d5/0043fa778c64fd87a323ce33facfa83148f373.debug 120777 root:root ../../usr/bin/nss_bogo_shim.debug +/usr/lib/debug/.build-id/d5/014d757853fc0910306bbd4039e3af531d5bd8 120777 root:root ../../../../bin/symkeyutil +/usr/lib/debug/.build-id/d5/014d757853fc0910306bbd4039e3af531d5bd8.debug 120777 root:root ../../usr/bin/symkeyutil.debug /usr/lib/debug/.build-id/dc 40755 root:root -/usr/lib/debug/.build-id/dc/71688bfad070fbe9221d3114760c5529212b26 120777 root:root ../../../../bin/pk11ectest -/usr/lib/debug/.build-id/dc/71688bfad070fbe9221d3114760c5529212b26.debug 120777 root:root ../../usr/bin/pk11ectest.debug -/usr/lib/debug/.build-id/e1 40755 root:root -/usr/lib/debug/.build-id/e1/8868fd1f2b196df4e550d81fb591b5c949650e 120777 root:root ../../../../bin/softoken_gtest -/usr/lib/debug/.build-id/e1/8868fd1f2b196df4e550d81fb591b5c949650e.debug 120777 root:root ../../usr/bin/softoken_gtest.debug -/usr/lib/debug/.build-id/e1/9048bc5eca7b167eed00d4bfd61031dd12e94d 120777 root:root ../../../../bin/encodeinttest -/usr/lib/debug/.build-id/e1/9048bc5eca7b167eed00d4bfd61031dd12e94d.debug 120777 root:root ../../usr/bin/encodeinttest.debug +/usr/lib/debug/.build-id/dc/42531eb8a8471a2e8eab1739bde13d53cb305c 120777 root:root ../../../../bin/strsclnt +/usr/lib/debug/.build-id/dc/42531eb8a8471a2e8eab1739bde13d53cb305c.debug 120777 root:root ../../usr/bin/strsclnt.debug +/usr/lib/debug/.build-id/e2 40755 root:root +/usr/lib/debug/.build-id/e2/131984b86b6810815e9281a6b0838c17c73fa6 120777 root:root ../../../../bin/pk11ectest +/usr/lib/debug/.build-id/e2/131984b86b6810815e9281a6b0838c17c73fa6.debug 120777 root:root ../../usr/bin/pk11ectest.debug +/usr/lib/debug/.build-id/e3 40755 root:root +/usr/lib/debug/.build-id/e3/3c3e3915e2cbf88eaedc5894b4b0d1672a2784 120777 root:root ../../../../bin/rsaperf +/usr/lib/debug/.build-id/e3/3c3e3915e2cbf88eaedc5894b4b0d1672a2784.debug 120777 root:root ../../usr/bin/rsaperf.debug /usr/lib/debug/.build-id/ea 40755 root:root -/usr/lib/debug/.build-id/ea/7e805a5d2421b4e11f027e0fae1eb3dbfe745a 120777 root:root ../../../../bin/lowhashtest -/usr/lib/debug/.build-id/ea/7e805a5d2421b4e11f027e0fae1eb3dbfe745a.debug 120777 root:root ../../usr/bin/lowhashtest.debug -/usr/lib/debug/.build-id/ec 40755 root:root -/usr/lib/debug/.build-id/ec/6996b95563fd7a88a72fe5c6e9ad93dbd85aaa 120777 root:root ../../../../bin/derdump -/usr/lib/debug/.build-id/ec/6996b95563fd7a88a72fe5c6e9ad93dbd85aaa.debug 120777 root:root ../../usr/bin/derdump.debug +/usr/lib/debug/.build-id/ea/4c8046319e1d003510af2557f0fc74964df1a3 120777 root:root ../../../../bin/mpi_tests +/usr/lib/debug/.build-id/ea/4c8046319e1d003510af2557f0fc74964df1a3.debug 120777 root:root ../../usr/bin/mpi_tests.debug +/usr/lib/debug/.build-id/ea/5924fff9f484d77815c4233e49ef6b55af39a4 120777 root:root ../../../../bin/mangle +/usr/lib/debug/.build-id/ea/5924fff9f484d77815c4233e49ef6b55af39a4.debug 120777 root:root ../../usr/bin/mangle.debug +/usr/lib/debug/.build-id/ef 40755 root:root +/usr/lib/debug/.build-id/ef/d61cf970f3efb07bb8425cdbdb0c36681acf86 120777 root:root ../../../../bin/pk12util +/usr/lib/debug/.build-id/ef/d61cf970f3efb07bb8425cdbdb0c36681acf86.debug 120777 root:root ../../usr/bin/pk12util.debug /usr/lib/debug/.build-id/f0 40755 root:root -/usr/lib/debug/.build-id/f0/93726087ede48b54cd3563ef29be76f88ed24a 120777 root:root ../../../../bin/rsapoptst -/usr/lib/debug/.build-id/f0/93726087ede48b54cd3563ef29be76f88ed24a.debug 120777 root:root ../../usr/bin/rsapoptst.debug -/usr/lib/debug/.build-id/f4 40755 root:root -/usr/lib/debug/.build-id/f4/3f8d24d19c7ee65c68bd60b6a225da8e8bb1ca 120777 root:root ../../../../bin/p7verify -/usr/lib/debug/.build-id/f4/3f8d24d19c7ee65c68bd60b6a225da8e8bb1ca.debug 120777 root:root ../../usr/bin/p7verify.debug -/usr/lib/debug/.build-id/fb 40755 root:root -/usr/lib/debug/.build-id/fb/5d022f01be816ecb57501159f6f7146978d72b 120777 root:root ../../../../bin/der_gtest -/usr/lib/debug/.build-id/fb/5d022f01be816ecb57501159f6f7146978d72b.debug 120777 root:root ../../usr/bin/der_gtest.debug +/usr/lib/debug/.build-id/f0/4b23c993070bdec921a0c8ca648af260bb2190 120777 root:root ../../../../bin/mozpkix_gtest +/usr/lib/debug/.build-id/f0/4b23c993070bdec921a0c8ca648af260bb2190.debug 120777 root:root ../../usr/bin/mozpkix_gtest.debug +/usr/lib/debug/.build-id/f5 40755 root:root +/usr/lib/debug/.build-id/f5/05c7038e1115e4a209dd86048d2b45aca7dac8 120777 root:root ../../../../bin/multinit +/usr/lib/debug/.build-id/f5/05c7038e1115e4a209dd86048d2b45aca7dac8.debug 120777 root:root ../../usr/bin/multinit.debug +/usr/lib/debug/.build-id/f5/612366caf31f07cf62118c5d0333bf6786fc22 120777 root:root ../../../../bin/atob +/usr/lib/debug/.build-id/f5/612366caf31f07cf62118c5d0333bf6786fc22.debug 120777 root:root ../../usr/bin/atob.debug +/usr/lib/debug/.build-id/ff 40755 root:root +/usr/lib/debug/.build-id/ff/523235d45126909bafe7e166aebb3c63abf0ea 120777 root:root ../../../../bin/pk1sign +/usr/lib/debug/.build-id/ff/523235d45126909bafe7e166aebb3c63abf0ea.debug 120777 root:root ../../usr/bin/pk1sign.debug /usr/lib/debug/usr/bin/addbuiltin.debug 100644 root:root @@ -305,298 +302,295 @@ File: /usr/lib/debug/.build-id/00 40755 root:root -File: /usr/lib/debug/.build-id/00/b4ae544332df6b0aa89fc98b2c3c105c58301c 120777 root:root ../../../../bin/mangle -File: /usr/lib/debug/.build-id/00/b4ae544332df6b0aa89fc98b2c3c105c58301c.debug 120777 root:root ../../usr/bin/mangle.debug -File: /usr/lib/debug/.build-id/04 40755 root:root -File: /usr/lib/debug/.build-id/04/7c19b2d018f394a81a68c2884e9d3650fd2fc4 120777 root:root ../../../../bin/baddbdir -File: /usr/lib/debug/.build-id/04/7c19b2d018f394a81a68c2884e9d3650fd2fc4.debug 120777 root:root ../../usr/bin/baddbdir.debug -File: /usr/lib/debug/.build-id/09 40755 root:root -File: /usr/lib/debug/.build-id/09/994d94441fe5112264b2a3f01d9132e56df8d0 120777 root:root ../../../../bin/remtest -File: /usr/lib/debug/.build-id/09/994d94441fe5112264b2a3f01d9132e56df8d0.debug 120777 root:root ../../usr/bin/remtest.debug +File: /usr/lib/debug/.build-id/00/ee21383d096a2a102cdd30de447153110a58a8 120777 root:root ../../../../bin/lowhashtest +File: /usr/lib/debug/.build-id/00/ee21383d096a2a102cdd30de447153110a58a8.debug 120777 root:root ../../usr/bin/lowhashtest.debug +File: /usr/lib/debug/.build-id/01 40755 root:root +File: /usr/lib/debug/.build-id/01/daa60f4af6062576a6a8e2cce4e62686ece500 120777 root:root ../../../../bin/pk11mode +File: /usr/lib/debug/.build-id/01/daa60f4af6062576a6a8e2cce4e62686ece500.debug 120777 root:root ../../usr/bin/pk11mode.debug +File: /usr/lib/debug/.build-id/0a 40755 root:root +File: /usr/lib/debug/.build-id/0a/a02722d71c13d0107ede08fe6bb12cae0ec042 120777 root:root ../../../../bin/pwdecrypt +File: /usr/lib/debug/.build-id/0a/a02722d71c13d0107ede08fe6bb12cae0ec042.debug 120777 root:root ../../usr/bin/pwdecrypt.debug File: /usr/lib/debug/.build-id/0d 40755 root:root -File: /usr/lib/debug/.build-id/0d/d3acf9951070c08902366ee10e590424fe43a2 120777 root:root ../../../../bin/digest -File: /usr/lib/debug/.build-id/0d/d3acf9951070c08902366ee10e590424fe43a2.debug 120777 root:root ../../usr/bin/digest.debug -File: /usr/lib/debug/.build-id/10 40755 root:root -File: /usr/lib/debug/.build-id/10/9ccff634eae139edf7cde2c8c6dfd85989b6a5 120777 root:root ../../../../bin/chktest -File: /usr/lib/debug/.build-id/10/9ccff634eae139edf7cde2c8c6dfd85989b6a5.debug 120777 root:root ../../usr/bin/chktest.debug -File: /usr/lib/debug/.build-id/13 40755 root:root -File: /usr/lib/debug/.build-id/13/0bb5a427d7a680c70fee50cf991b20c3a0c561 120777 root:root ../../../../bin/certdb_gtest -File: /usr/lib/debug/.build-id/13/0bb5a427d7a680c70fee50cf991b20c3a0c561.debug 120777 root:root ../../usr/bin/certdb_gtest.debug +File: /usr/lib/debug/.build-id/0d/554e24c3753f214d22178009a40fba639e61cc 120777 root:root ../../../../bin/ssltap +File: /usr/lib/debug/.build-id/0d/554e24c3753f214d22178009a40fba639e61cc.debug 120777 root:root ../../usr/bin/ssltap.debug +File: /usr/lib/debug/.build-id/11 40755 root:root +File: /usr/lib/debug/.build-id/11/6321bebf81875b53f836638ade8d0e116f3d21 120777 root:root ../../../../bin/crlutil +File: /usr/lib/debug/.build-id/11/6321bebf81875b53f836638ade8d0e116f3d21.debug 120777 root:root ../../usr/bin/crlutil.debug File: /usr/lib/debug/.build-id/16 40755 root:root -File: /usr/lib/debug/.build-id/16/57d1c7beabd6a62bf4adca1cd1abf23c4a908e 120777 root:root ../../../../bin/vfychain -File: /usr/lib/debug/.build-id/16/57d1c7beabd6a62bf4adca1cd1abf23c4a908e.debug 120777 root:root ../../usr/bin/vfychain.debug -File: /usr/lib/debug/.build-id/1a 40755 root:root -File: /usr/lib/debug/.build-id/1a/f0dbdfaea943ce0b566437fbc060fd7809b67f 120777 root:root ../../../../bin/pkix-errcodes -File: /usr/lib/debug/.build-id/1a/f0dbdfaea943ce0b566437fbc060fd7809b67f.debug 120777 root:root ../../usr/bin/pkix-errcodes.debug +File: /usr/lib/debug/.build-id/16/a2f059ee3434ce1bf2f25c4df080660be00934 120777 root:root ../../../../bin/signver +File: /usr/lib/debug/.build-id/16/a2f059ee3434ce1bf2f25c4df080660be00934.debug 120777 root:root ../../usr/bin/signver.debug +File: /usr/lib/debug/.build-id/19 40755 root:root +File: /usr/lib/debug/.build-id/19/08bb65cfd4e902fc2c6adf193d1ef28a78cf13 120777 root:root ../../../../bin/selfserv +File: /usr/lib/debug/.build-id/19/08bb65cfd4e902fc2c6adf193d1ef28a78cf13.debug 120777 root:root ../../usr/bin/selfserv.debug +File: /usr/lib/debug/.build-id/1b 40755 root:root +File: /usr/lib/debug/.build-id/1b/2f04b106257155ec9e43db3a383778c127bc61 120777 root:root ../../../../bin/vfychain +File: /usr/lib/debug/.build-id/1b/2f04b106257155ec9e43db3a383778c127bc61.debug 120777 root:root ../../usr/bin/vfychain.debug File: /usr/lib/debug/.build-id/1c 40755 root:root -File: /usr/lib/debug/.build-id/1c/0e77cd73d578768325c1ea1d68644175126cee 120777 root:root ../../../../bin/makepqg -File: /usr/lib/debug/.build-id/1c/0e77cd73d578768325c1ea1d68644175126cee.debug 120777 root:root ../../usr/bin/makepqg.debug -File: /usr/lib/debug/.build-id/1d 40755 root:root -File: /usr/lib/debug/.build-id/1d/ddcf121e5135d3f696622c8196549cd85f4420 120777 root:root ../../../../bin/smime_gtest -File: /usr/lib/debug/.build-id/1d/ddcf121e5135d3f696622c8196549cd85f4420.debug 120777 root:root ../../usr/bin/smime_gtest.debug -File: /usr/lib/debug/.build-id/23 40755 root:root -File: /usr/lib/debug/.build-id/23/8dac4e1f33e24dba4cd9d6d41611606e89adcc 120777 root:root ../../../../bin/pk12util -File: /usr/lib/debug/.build-id/23/8dac4e1f33e24dba4cd9d6d41611606e89adcc.debug 120777 root:root ../../usr/bin/pk12util.debug -File: /usr/lib/debug/.build-id/25 40755 root:root -File: /usr/lib/debug/.build-id/25/a53f8d1b44dd3e7682e4d4ca8b191af6ed1709 120777 root:root ../../../../bin/vfyserv -File: /usr/lib/debug/.build-id/25/a53f8d1b44dd3e7682e4d4ca8b191af6ed1709.debug 120777 root:root ../../usr/bin/vfyserv.debug -File: /usr/lib/debug/.build-id/26 40755 root:root -File: /usr/lib/debug/.build-id/26/2443e97103a7891693081e72c937a7cf839f35 120777 root:root ../../../../bin/ocspresp -File: /usr/lib/debug/.build-id/26/2443e97103a7891693081e72c937a7cf839f35.debug 120777 root:root ../../usr/bin/ocspresp.debug -File: /usr/lib/debug/.build-id/26/c762d4ff857ff6b4d70b159d1458f39283bece 120777 root:root ../../../../bin/crmftest -File: /usr/lib/debug/.build-id/26/c762d4ff857ff6b4d70b159d1458f39283bece.debug 120777 root:root ../../usr/bin/crmftest.debug -File: /usr/lib/debug/.build-id/27 40755 root:root -File: /usr/lib/debug/.build-id/27/ee6cc872ba4676f102e577b65adba783707d43 120777 root:root ../../../../bin/p7sign -File: /usr/lib/debug/.build-id/27/ee6cc872ba4676f102e577b65adba783707d43.debug 120777 root:root ../../usr/bin/p7sign.debug +File: /usr/lib/debug/.build-id/1c/53c834010d351acc0d4cc089ce1784b0da934a 120777 root:root ../../../../bin/ecperf +File: /usr/lib/debug/.build-id/1c/53c834010d351acc0d4cc089ce1784b0da934a.debug 120777 root:root ../../usr/bin/ecperf.debug +File: /usr/lib/debug/.build-id/24 40755 root:root +File: /usr/lib/debug/.build-id/24/16e8fb9fd75f8e3ccbd47e999ac166e7312eb2 120777 root:root ../../../../bin/p7sign +File: /usr/lib/debug/.build-id/24/16e8fb9fd75f8e3ccbd47e999ac166e7312eb2.debug 120777 root:root ../../usr/bin/p7sign.debug +File: /usr/lib/debug/.build-id/24/c15ebd30a651f210f725ad55548b7b8518fe9a 120777 root:root ../../../../bin/sdrtest +File: /usr/lib/debug/.build-id/24/c15ebd30a651f210f725ad55548b7b8518fe9a.debug 120777 root:root ../../usr/bin/sdrtest.debug File: /usr/lib/debug/.build-id/29 40755 root:root -File: /usr/lib/debug/.build-id/29/60a99d187c83bf8f758ce721dbb8880217dfe2 120777 root:root ../../../../bin/pk11gcmtest -File: /usr/lib/debug/.build-id/29/60a99d187c83bf8f758ce721dbb8880217dfe2.debug 120777 root:root ../../usr/bin/pk11gcmtest.debug -File: /usr/lib/debug/.build-id/29/c1c2a813a17e01d56e5b10711f83ef48c25269 120777 root:root ../../../../bin/pk1sign -File: /usr/lib/debug/.build-id/29/c1c2a813a17e01d56e5b10711f83ef48c25269.debug 120777 root:root ../../usr/bin/pk1sign.debug -File: /usr/lib/debug/.build-id/2e 40755 root:root -File: /usr/lib/debug/.build-id/2e/0ffa3e7ff9ae404feb7cbad05825de561b099f 120777 root:root ../../../../bin/hw-support -File: /usr/lib/debug/.build-id/2e/0ffa3e7ff9ae404feb7cbad05825de561b099f.debug 120777 root:root ../../usr/bin/hw-support.debug -File: /usr/lib/debug/.build-id/2f 40755 root:root -File: /usr/lib/debug/.build-id/2f/9a096a72b179c160ac137d295e19c2e8518ab7 120777 root:root ../../../../bin/tstclnt -File: /usr/lib/debug/.build-id/2f/9a096a72b179c160ac137d295e19c2e8518ab7.debug 120777 root:root ../../usr/bin/tstclnt.debug -File: /usr/lib/debug/.build-id/30 40755 root:root -File: /usr/lib/debug/.build-id/30/d78c7afcb6b79b3f4241be6b7d811219e0943b 120777 root:root ../../../../bin/certhigh_gtest -File: /usr/lib/debug/.build-id/30/d78c7afcb6b79b3f4241be6b7d811219e0943b.debug 120777 root:root ../../usr/bin/certhigh_gtest.debug -File: /usr/lib/debug/.build-id/32 40755 root:root -File: /usr/lib/debug/.build-id/32/b16ff458b532cdc5005ac280176d589dc9a8d9 120777 root:root ../../../../bin/selfserv -File: /usr/lib/debug/.build-id/32/b16ff458b532cdc5005ac280176d589dc9a8d9.debug 120777 root:root ../../usr/bin/selfserv.debug -File: /usr/lib/debug/.build-id/33 40755 root:root -File: /usr/lib/debug/.build-id/33/88e2bc0779083b9b0db26bedf5c9588468a62e 120777 root:root ../../../../bin/crlutil -File: /usr/lib/debug/.build-id/33/88e2bc0779083b9b0db26bedf5c9588468a62e.debug 120777 root:root ../../usr/bin/crlutil.debug -File: /usr/lib/debug/.build-id/39 40755 root:root -File: /usr/lib/debug/.build-id/39/c5e9e3dd8fa279ad95bb00db00a6bae64bd912 120777 root:root ../../../../bin/ssltap -File: /usr/lib/debug/.build-id/39/c5e9e3dd8fa279ad95bb00db00a6bae64bd912.debug 120777 root:root ../../usr/bin/ssltap.debug -File: /usr/lib/debug/.build-id/3b 40755 root:root -File: /usr/lib/debug/.build-id/3b/b4f34874446af0b2892aac495057881653126f 120777 root:root ../../../../bin/nss -File: /usr/lib/debug/.build-id/3b/b4f34874446af0b2892aac495057881653126f.debug 120777 root:root ../../usr/bin/nss.debug -File: /usr/lib/debug/.build-id/3c 40755 root:root -File: /usr/lib/debug/.build-id/3c/c305822495e406c544c505cd153288784e3ee2 120777 root:root ../../../../bin/pk11importtest -File: /usr/lib/debug/.build-id/3c/c305822495e406c544c505cd153288784e3ee2.debug 120777 root:root ../../usr/bin/pk11importtest.debug +File: /usr/lib/debug/.build-id/29/162c15a1b3c63481c7c79e7813890de2c2aa7f 120777 root:root ../../../../bin/dertimetest +File: /usr/lib/debug/.build-id/29/162c15a1b3c63481c7c79e7813890de2c2aa7f.debug 120777 root:root ../../usr/bin/dertimetest.debug +File: /usr/lib/debug/.build-id/38 40755 root:root +File: /usr/lib/debug/.build-id/38/623902c32c42a5429fcb0b02fffb5ced136c17 120777 root:root ../../../../bin/chktest +File: /usr/lib/debug/.build-id/38/623902c32c42a5429fcb0b02fffb5ced136c17.debug 120777 root:root ../../usr/bin/chktest.debug File: /usr/lib/debug/.build-id/3d 40755 root:root -File: /usr/lib/debug/.build-id/3d/002507feae3f323e8c0c4b35b5c77215cb3d2e 120777 root:root ../../../../bin/p7env -File: /usr/lib/debug/.build-id/3d/002507feae3f323e8c0c4b35b5c77215cb3d2e.debug 120777 root:root ../../usr/bin/p7env.debug -File: /usr/lib/debug/.build-id/3e 40755 root:root -File: /usr/lib/debug/.build-id/3e/f0453b5eaedc53f0419547f9fabd81b33b3714 120777 root:root ../../../../bin/sysinit_gtest -File: /usr/lib/debug/.build-id/3e/f0453b5eaedc53f0419547f9fabd81b33b3714.debug 120777 root:root ../../usr/bin/sysinit_gtest.debug -File: /usr/lib/debug/.build-id/3f 40755 root:root -File: /usr/lib/debug/.build-id/3f/cda42a7f7a501635f35d1e6be7d88add832731 120777 root:root ../../../../bin/modutil -File: /usr/lib/debug/.build-id/3f/cda42a7f7a501635f35d1e6be7d88add832731.debug 120777 root:root ../../usr/bin/modutil.debug -File: /usr/lib/debug/.build-id/40 40755 root:root -File: /usr/lib/debug/.build-id/40/c4ad16f9098b95b4422320922505344a4bb020 120777 root:root ../../../../bin/pp -File: /usr/lib/debug/.build-id/40/c4ad16f9098b95b4422320922505344a4bb020.debug 120777 root:root ../../usr/bin/pp.debug -File: /usr/lib/debug/.build-id/41 40755 root:root -File: /usr/lib/debug/.build-id/41/646ccaafe965d112fd319ebf41dfef7c7acb51 120777 root:root ../../../../bin/ssl_gtest -File: /usr/lib/debug/.build-id/41/646ccaafe965d112fd319ebf41dfef7c7acb51.debug 120777 root:root ../../usr/bin/ssl_gtest.debug -File: /usr/lib/debug/.build-id/48 40755 root:root -File: /usr/lib/debug/.build-id/48/bb56e9a8d8b9ac9010230520dd5aaa869171b7 120777 root:root ../../../../bin/blake2b_gtest -File: /usr/lib/debug/.build-id/48/bb56e9a8d8b9ac9010230520dd5aaa869171b7.debug 120777 root:root ../../usr/bin/blake2b_gtest.debug -File: /usr/lib/debug/.build-id/49 40755 root:root -File: /usr/lib/debug/.build-id/49/cc2071902593044082d9244b6eb986e6f14634 120777 root:root ../../../../bin/prng_gtest -File: /usr/lib/debug/.build-id/49/cc2071902593044082d9244b6eb986e6f14634.debug 120777 root:root ../../usr/bin/prng_gtest.debug -File: /usr/lib/debug/.build-id/4f 40755 root:root -File: /usr/lib/debug/.build-id/4f/03341a7aa7860b58f004910bdb6f3cf0a6340d 120777 root:root ../../../../bin/dbtest -File: /usr/lib/debug/.build-id/4f/03341a7aa7860b58f004910bdb6f3cf0a6340d.debug 120777 root:root ../../usr/bin/dbtest.debug -File: /usr/lib/debug/.build-id/4f/dfd3bb07843184f2cbfa81ad5c80b782bd2481 120777 root:root ../../../../bin/nss-policy-check -File: /usr/lib/debug/.build-id/4f/dfd3bb07843184f2cbfa81ad5c80b782bd2481.debug 120777 root:root ../../usr/bin/nss-policy-check.debug +File: /usr/lib/debug/.build-id/3d/0e68a7ffe65bfda73276eeeb8d3ad81ae2bc0f 120777 root:root ../../../../bin/pk11gcmtest +File: /usr/lib/debug/.build-id/3d/0e68a7ffe65bfda73276eeeb8d3ad81ae2bc0f.debug 120777 root:root ../../usr/bin/pk11gcmtest.debug +File: /usr/lib/debug/.build-id/43 40755 root:root +File: /usr/lib/debug/.build-id/43/3914cf6274c9792854dc7f8d434c1f8f52a6e4 120777 root:root ../../../../bin/pp +File: /usr/lib/debug/.build-id/43/3914cf6274c9792854dc7f8d434c1f8f52a6e4.debug 120777 root:root ../../usr/bin/pp.debug +File: /usr/lib/debug/.build-id/44 40755 root:root +File: /usr/lib/debug/.build-id/44/a751086af19118c76ee69d2babb5cac103af82 120777 root:root ../../../../bin/cryptohi_gtest +File: /usr/lib/debug/.build-id/44/a751086af19118c76ee69d2babb5cac103af82.debug 120777 root:root ../../usr/bin/cryptohi_gtest.debug File: /usr/lib/debug/.build-id/54 40755 root:root -File: /usr/lib/debug/.build-id/54/60dcd25878ea9b3ded36c8543b255c89eb07dc 120777 root:root ../../../../bin/strsclnt -File: /usr/lib/debug/.build-id/54/60dcd25878ea9b3ded36c8543b255c89eb07dc.debug 120777 root:root ../../usr/bin/strsclnt.debug +File: /usr/lib/debug/.build-id/54/539ead0538c49fe2c072635a7d1a6051989eaa 120777 root:root ../../../../bin/secmodtest +File: /usr/lib/debug/.build-id/54/539ead0538c49fe2c072635a7d1a6051989eaa.debug 120777 root:root ../../usr/bin/secmodtest.debug +File: /usr/lib/debug/.build-id/55 40755 root:root +File: /usr/lib/debug/.build-id/55/a0ba32dca9b759c3bce7d044342036d5401af9 120777 root:root ../../../../bin/derdump +File: /usr/lib/debug/.build-id/55/a0ba32dca9b759c3bce7d044342036d5401af9.debug 120777 root:root ../../usr/bin/derdump.debug File: /usr/lib/debug/.build-id/56 40755 root:root -File: /usr/lib/debug/.build-id/56/260e5047ab73c04a2118934efc03c9c72ef729 120777 root:root ../../../../bin/secmodtest -File: /usr/lib/debug/.build-id/56/260e5047ab73c04a2118934efc03c9c72ef729.debug 120777 root:root ../../usr/bin/secmodtest.debug -File: /usr/lib/debug/.build-id/57 40755 root:root -File: /usr/lib/debug/.build-id/57/6d51370cbb99d0ecded4fcf94a4a503c6543bc 120777 root:root ../../../../bin/signtool -File: /usr/lib/debug/.build-id/57/6d51370cbb99d0ecded4fcf94a4a503c6543bc.debug 120777 root:root ../../usr/bin/signtool.debug -File: /usr/lib/debug/.build-id/58 40755 root:root -File: /usr/lib/debug/.build-id/58/d28c3b11a732941efc9fce0d641247f1e9bfa0 120777 root:root ../../../../bin/pk11_gtest -File: /usr/lib/debug/.build-id/58/d28c3b11a732941efc9fce0d641247f1e9bfa0.debug 120777 root:root ../../usr/bin/pk11_gtest.debug +File: /usr/lib/debug/.build-id/56/294b39fe16fde4f83b1c790296b69255b6007b 120777 root:root ../../../../bin/tstclnt +File: /usr/lib/debug/.build-id/56/294b39fe16fde4f83b1c790296b69255b6007b.debug 120777 root:root ../../usr/bin/tstclnt.debug +File: /usr/lib/debug/.build-id/5b 40755 root:root +File: /usr/lib/debug/.build-id/5b/05c17bc074a7f0ea64932df8d40c6c5b322ebd 120777 root:root ../../../../bin/fbectest +File: /usr/lib/debug/.build-id/5b/05c17bc074a7f0ea64932df8d40c6c5b322ebd.debug 120777 root:root ../../usr/bin/fbectest.debug +File: /usr/lib/debug/.build-id/5b/db3f33addf25a63dd3227c2df3bf0ddfdd75a5 120777 root:root ../../../../bin/btoa +File: /usr/lib/debug/.build-id/5b/db3f33addf25a63dd3227c2df3bf0ddfdd75a5.debug 120777 root:root ../../usr/bin/btoa.debug +File: /usr/lib/debug/.build-id/5c 40755 root:root +File: /usr/lib/debug/.build-id/5c/ab66876e7b350d37097c09661b3f1df7b2e9f1 120777 root:root ../../../../bin/oidcalc +File: /usr/lib/debug/.build-id/5c/ab66876e7b350d37097c09661b3f1df7b2e9f1.debug 120777 root:root ../../usr/bin/oidcalc.debug File: /usr/lib/debug/.build-id/5d 40755 root:root -File: /usr/lib/debug/.build-id/5d/07a32d34efb797e3e59e8497b3f51ccd13fcc4 120777 root:root ../../../../bin/nss_bogo_shim -File: /usr/lib/debug/.build-id/5d/07a32d34efb797e3e59e8497b3f51ccd13fcc4.debug 120777 root:root ../../usr/bin/nss_bogo_shim.debug -File: /usr/lib/debug/.build-id/5d/f16b7d0a22037a51d0df20dff4b45aa9ca0c25 120777 root:root ../../../../bin/ecperf -File: /usr/lib/debug/.build-id/5d/f16b7d0a22037a51d0df20dff4b45aa9ca0c25.debug 120777 root:root ../../usr/bin/ecperf.debug -File: /usr/lib/debug/.build-id/62 40755 root:root -File: /usr/lib/debug/.build-id/62/722c694390362239296119b89d11b37b82666a 120777 root:root ../../../../bin/pwdecrypt -File: /usr/lib/debug/.build-id/62/722c694390362239296119b89d11b37b82666a.debug 120777 root:root ../../usr/bin/pwdecrypt.debug -File: /usr/lib/debug/.build-id/66 40755 root:root -File: /usr/lib/debug/.build-id/66/967948ef6be293380b69fe8d68292d62ac16f1 120777 root:root ../../../../bin/dertimetest -File: /usr/lib/debug/.build-id/66/967948ef6be293380b69fe8d68292d62ac16f1.debug 120777 root:root ../../usr/bin/dertimetest.debug +File: /usr/lib/debug/.build-id/5d/b92a3724931ba87064bafbaee4eb9497e3fef5 120777 root:root ../../../../bin/nss +File: /usr/lib/debug/.build-id/5d/b92a3724931ba87064bafbaee4eb9497e3fef5.debug 120777 root:root ../../usr/bin/nss.debug +File: /usr/lib/debug/.build-id/5e 40755 root:root +File: /usr/lib/debug/.build-id/5e/95f1c7ad569867cdb6d1886cee83f3954c25f5 120777 root:root ../../../../bin/baddbdir +File: /usr/lib/debug/.build-id/5e/95f1c7ad569867cdb6d1886cee83f3954c25f5.debug 120777 root:root ../../usr/bin/baddbdir.debug +File: /usr/lib/debug/.build-id/60 40755 root:root +File: /usr/lib/debug/.build-id/60/1d8c54adbdd1d0facb3672890012f36a6671be 120777 root:root ../../../../bin/ssl_gtest +File: /usr/lib/debug/.build-id/60/1d8c54adbdd1d0facb3672890012f36a6671be.debug 120777 root:root ../../usr/bin/ssl_gtest.debug +File: /usr/lib/debug/.build-id/63 40755 root:root +File: /usr/lib/debug/.build-id/63/b2c8d4a91d2153315e97f1a8aa1e9eb4452238 120777 root:root ../../../../bin/dbtest +File: /usr/lib/debug/.build-id/63/b2c8d4a91d2153315e97f1a8aa1e9eb4452238.debug 120777 root:root ../../usr/bin/dbtest.debug +File: /usr/lib/debug/.build-id/65 40755 root:root +File: /usr/lib/debug/.build-id/65/b2a24afe3a6bc523215630390d4490c342511d 120777 root:root ../../../../bin/listsuites +File: /usr/lib/debug/.build-id/65/b2a24afe3a6bc523215630390d4490c342511d.debug 120777 root:root ../../usr/bin/listsuites.debug File: /usr/lib/debug/.build-id/67 40755 root:root -File: /usr/lib/debug/.build-id/67/9efb3de320bc780891d0715c8fdc17a16550a3 120777 root:root ../../../../bin/cryptohi_gtest -File: /usr/lib/debug/.build-id/67/9efb3de320bc780891d0715c8fdc17a16550a3.debug 120777 root:root ../../usr/bin/cryptohi_gtest.debug -File: /usr/lib/debug/.build-id/69 40755 root:root -File: /usr/lib/debug/.build-id/69/2d9a206de815ea2a4b5849d869fad78a223621 120777 root:root ../../../../bin/mpi_tests -File: /usr/lib/debug/.build-id/69/2d9a206de815ea2a4b5849d869fad78a223621.debug 120777 root:root ../../usr/bin/mpi_tests.debug -File: /usr/lib/debug/.build-id/76 40755 root:root -File: /usr/lib/debug/.build-id/76/f2b385b149df5e36b3f9adc3371ef3bc9ade81 120777 root:root ../../../../bin/shlibsign -File: /usr/lib/debug/.build-id/76/f2b385b149df5e36b3f9adc3371ef3bc9ade81.debug 120777 root:root ../../usr/bin/shlibsign.debug -File: /usr/lib/debug/.build-id/78 40755 root:root -File: /usr/lib/debug/.build-id/78/e7d75f7efd307dfe248be6d81fbaa9e94199e3 120777 root:root ../../../../bin/certutil -File: /usr/lib/debug/.build-id/78/e7d75f7efd307dfe248be6d81fbaa9e94199e3.debug 120777 root:root ../../usr/bin/certutil.debug -File: /usr/lib/debug/.build-id/87 40755 root:root -File: /usr/lib/debug/.build-id/87/bc9457ca4e35b33305fd4d9ab6e5418355f8fb 120777 root:root ../../../../bin/cmsutil -File: /usr/lib/debug/.build-id/87/bc9457ca4e35b33305fd4d9ab6e5418355f8fb.debug 120777 root:root ../../usr/bin/cmsutil.debug -File: /usr/lib/debug/.build-id/88 40755 root:root -File: /usr/lib/debug/.build-id/88/c2bdc37a28cc01220b721b0f73607907a2227c 120777 root:root ../../../../bin/p7content -File: /usr/lib/debug/.build-id/88/c2bdc37a28cc01220b721b0f73607907a2227c.debug 120777 root:root ../../usr/bin/p7content.debug -File: /usr/lib/debug/.build-id/91 40755 root:root -File: /usr/lib/debug/.build-id/91/6bd393a9cf1e36c045443be4c93ad48274e4a6 120777 root:root ../../../../bin/util_gtest -File: /usr/lib/debug/.build-id/91/6bd393a9cf1e36c045443be4c93ad48274e4a6.debug 120777 root:root ../../usr/bin/util_gtest.debug -File: /usr/lib/debug/.build-id/91/79a5d812c1825f783202bd415d6c9c2d6a8efb 120777 root:root ../../../../bin/conflict -File: /usr/lib/debug/.build-id/91/79a5d812c1825f783202bd415d6c9c2d6a8efb.debug 120777 root:root ../../usr/bin/conflict.debug -File: /usr/lib/debug/.build-id/98 40755 root:root -File: /usr/lib/debug/.build-id/98/fd9e39dd513732448fd677b0599c90cc0c0ef1 120777 root:root ../../../../bin/multinit -File: /usr/lib/debug/.build-id/98/fd9e39dd513732448fd677b0599c90cc0c0ef1.debug 120777 root:root ../../usr/bin/multinit.debug +File: /usr/lib/debug/.build-id/67/31358239c57e24030bfa2d6b2722c32a54f688 120777 root:root ../../../../bin/softoken_gtest +File: /usr/lib/debug/.build-id/67/31358239c57e24030bfa2d6b2722c32a54f688.debug 120777 root:root ../../usr/bin/softoken_gtest.debug +File: /usr/lib/debug/.build-id/67/814bc2ee74a45d1dcd0bb8996474a563a0d1fa 120777 root:root ../../../../bin/httpserv +File: /usr/lib/debug/.build-id/67/814bc2ee74a45d1dcd0bb8996474a563a0d1fa.debug 120777 root:root ../../usr/bin/httpserv.debug +File: /usr/lib/debug/.build-id/6c 40755 root:root +File: /usr/lib/debug/.build-id/6c/e73f6aa1932fae55357f6a4c07fd1b811e9380 120777 root:root ../../../../bin/p7content +File: /usr/lib/debug/.build-id/6c/e73f6aa1932fae55357f6a4c07fd1b811e9380.debug 120777 root:root ../../usr/bin/p7content.debug +File: /usr/lib/debug/.build-id/6f 40755 root:root +File: /usr/lib/debug/.build-id/6f/0e4d8caa6042a2e3019d761ea46e5f78334167 120777 root:root ../../../../bin/shlibsign +File: /usr/lib/debug/.build-id/6f/0e4d8caa6042a2e3019d761ea46e5f78334167.debug 120777 root:root ../../usr/bin/shlibsign.debug +File: /usr/lib/debug/.build-id/6f/6679bf702723dc77be98f298d7b845ddf92b3e 120777 root:root ../../../../bin/certdb_gtest +File: /usr/lib/debug/.build-id/6f/6679bf702723dc77be98f298d7b845ddf92b3e.debug 120777 root:root ../../usr/bin/certdb_gtest.debug +File: /usr/lib/debug/.build-id/73 40755 root:root +File: /usr/lib/debug/.build-id/73/cca998cccac7c34c5e5c98e59a2176e9b3bc22 120777 root:root ../../../../bin/nonspr10 +File: /usr/lib/debug/.build-id/73/cca998cccac7c34c5e5c98e59a2176e9b3bc22.debug 120777 root:root ../../usr/bin/nonspr10.debug +File: /usr/lib/debug/.build-id/75 40755 root:root +File: /usr/lib/debug/.build-id/75/98b836148e6b2fab838bf8899274f38b82722b 120777 root:root ../../../../bin/der_gtest +File: /usr/lib/debug/.build-id/75/98b836148e6b2fab838bf8899274f38b82722b.debug 120777 root:root ../../usr/bin/der_gtest.debug +File: /usr/lib/debug/.build-id/77 40755 root:root +File: /usr/lib/debug/.build-id/77/1ea92bcb1cbca7277cc029c2f4a4237bb48103 120777 root:root ../../../../bin/conflict +File: /usr/lib/debug/.build-id/77/1ea92bcb1cbca7277cc029c2f4a4237bb48103.debug 120777 root:root ../../usr/bin/conflict.debug +File: /usr/lib/debug/.build-id/7a 40755 root:root +File: /usr/lib/debug/.build-id/7a/dd8d590809a08b627227490081b0e5c6512df5 120777 root:root ../../../../bin/crmftest +File: /usr/lib/debug/.build-id/7a/dd8d590809a08b627227490081b0e5c6512df5.debug 120777 root:root ../../usr/bin/crmftest.debug +File: /usr/lib/debug/.build-id/80 40755 root:root +File: /usr/lib/debug/.build-id/80/3dfdda30cef397f56eba3c21fa997bcdce2670 120777 root:root ../../../../bin/hw-support +File: /usr/lib/debug/.build-id/80/3dfdda30cef397f56eba3c21fa997bcdce2670.debug 120777 root:root ../../usr/bin/hw-support.debug +File: /usr/lib/debug/.build-id/82 40755 root:root +File: /usr/lib/debug/.build-id/82/01275a8099d166dd5bb92444169d11569b2bf5 120777 root:root ../../../../bin/blake2b_gtest +File: /usr/lib/debug/.build-id/82/01275a8099d166dd5bb92444169d11569b2bf5.debug 120777 root:root ../../usr/bin/blake2b_gtest.debug +File: /usr/lib/debug/.build-id/83 40755 root:root +File: /usr/lib/debug/.build-id/83/3b423d6fbfa0a544996397311319259adb598c 120777 root:root ../../../../bin/sysinit_gtest +File: /usr/lib/debug/.build-id/83/3b423d6fbfa0a544996397311319259adb598c.debug 120777 root:root ../../usr/bin/sysinit_gtest.debug +File: /usr/lib/debug/.build-id/8b 40755 root:root +File: /usr/lib/debug/.build-id/8b/995eaa1fd1d093dfa79320932527a9c9c576bb 120777 root:root ../../../../bin/encodeinttest +File: /usr/lib/debug/.build-id/8b/995eaa1fd1d093dfa79320932527a9c9c576bb.debug 120777 root:root ../../usr/bin/encodeinttest.debug +File: /usr/lib/debug/.build-id/8f 40755 root:root +File: /usr/lib/debug/.build-id/8f/e446e750fa698a9bf912e80f60a5bc479ade79 120777 root:root ../../../../bin/digest +File: /usr/lib/debug/.build-id/8f/e446e750fa698a9bf912e80f60a5bc479ade79.debug 120777 root:root ../../usr/bin/digest.debug +File: /usr/lib/debug/.build-id/95 40755 root:root +File: /usr/lib/debug/.build-id/95/84b0dd09afb658ef33a44d7d889ff38b69e0df 120777 root:root ../../../../bin/pk11importtest +File: /usr/lib/debug/.build-id/95/84b0dd09afb658ef33a44d7d889ff38b69e0df.debug 120777 root:root ../../usr/bin/pk11importtest.debug +File: /usr/lib/debug/.build-id/96 40755 root:root +File: /usr/lib/debug/.build-id/96/5d2c04ccac92519a4831f16ca38f3085aab277 120777 root:root ../../../../bin/addbuiltin +File: /usr/lib/debug/.build-id/96/5d2c04ccac92519a4831f16ca38f3085aab277.debug 120777 root:root ../../usr/bin/addbuiltin.debug +File: /usr/lib/debug/.build-id/9a 40755 root:root +File: /usr/lib/debug/.build-id/9a/02c5903c3c64a7126d0511d4a76782f2d78e25 120777 root:root ../../../../bin/p7verify +File: /usr/lib/debug/.build-id/9a/02c5903c3c64a7126d0511d4a76782f2d78e25.debug 120777 root:root ../../usr/bin/p7verify.debug +File: /usr/lib/debug/.build-id/9b 40755 root:root +File: /usr/lib/debug/.build-id/9b/4bdb8fa2015fb66b0a4243ee0776216f21df69 120777 root:root ../../../../bin/pk11_gtest +File: /usr/lib/debug/.build-id/9b/4bdb8fa2015fb66b0a4243ee0776216f21df69.debug 120777 root:root ../../usr/bin/pk11_gtest.debug +File: /usr/lib/debug/.build-id/9f 40755 root:root +File: /usr/lib/debug/.build-id/9f/15e5a50afacb102d4f6fc1e91682203d69973e 120777 root:root ../../../../bin/ocspclnt +File: /usr/lib/debug/.build-id/9f/15e5a50afacb102d4f6fc1e91682203d69973e.debug 120777 root:root ../../usr/bin/ocspclnt.debug +File: /usr/lib/debug/.build-id/a3 40755 root:root +File: /usr/lib/debug/.build-id/a3/daaadbe35c3f4a7aef9ba36faf256ec151af07 120777 root:root ../../../../bin/ocspresp +File: /usr/lib/debug/.build-id/a3/daaadbe35c3f4a7aef9ba36faf256ec151af07.debug 120777 root:root ../../usr/bin/ocspresp.debug File: /usr/lib/debug/.build-id/a4 40755 root:root -File: /usr/lib/debug/.build-id/a4/ca2c558dcd28c1fa0e0f3469fb9f1463bd7fd7 120777 root:root ../../../../bin/atob -File: /usr/lib/debug/.build-id/a4/ca2c558dcd28c1fa0e0f3469fb9f1463bd7fd7.debug 120777 root:root ../../usr/bin/atob.debug -File: /usr/lib/debug/.build-id/ad 40755 root:root -File: /usr/lib/debug/.build-id/ad/84e9bfad86207836dc5778a1c3a7bf84e0422a 120777 root:root ../../../../bin/rsaperf -File: /usr/lib/debug/.build-id/ad/84e9bfad86207836dc5778a1c3a7bf84e0422a.debug 120777 root:root ../../usr/bin/rsaperf.debug -File: /usr/lib/debug/.build-id/af 40755 root:root -File: /usr/lib/debug/.build-id/af/bfa8bd6ad344337380bf9dd1bd101191ab5385 120777 root:root ../../../../bin/pk11mode -File: /usr/lib/debug/.build-id/af/bfa8bd6ad344337380bf9dd1bd101191ab5385.debug 120777 root:root ../../usr/bin/pk11mode.debug -File: /usr/lib/debug/.build-id/b0 40755 root:root -File: /usr/lib/debug/.build-id/b0/d2be4cc3e5acaefd10f514bf1642faff13dcc7 120777 root:root ../../../../bin/addbuiltin -File: /usr/lib/debug/.build-id/b0/d2be4cc3e5acaefd10f514bf1642faff13dcc7.debug 120777 root:root ../../usr/bin/addbuiltin.debug +File: /usr/lib/debug/.build-id/a4/2d6db29dbfb87ab33fa6430aabe072533d5396 120777 root:root ../../../../bin/modutil +File: /usr/lib/debug/.build-id/a4/2d6db29dbfb87ab33fa6430aabe072533d5396.debug 120777 root:root ../../usr/bin/modutil.debug +File: /usr/lib/debug/.build-id/a6 40755 root:root +File: /usr/lib/debug/.build-id/a6/ccd89894825e6e4bccc2d689a3e28e22546639 120777 root:root ../../../../bin/rsapoptst +File: /usr/lib/debug/.build-id/a6/ccd89894825e6e4bccc2d689a3e28e22546639.debug 120777 root:root ../../usr/bin/rsapoptst.debug +File: /usr/lib/debug/.build-id/a7 40755 root:root +File: /usr/lib/debug/.build-id/a7/fe6632a0cccc5745df057029d440faa0a59f69 120777 root:root ../../../../bin/certutil +File: /usr/lib/debug/.build-id/a7/fe6632a0cccc5745df057029d440faa0a59f69.debug 120777 root:root ../../usr/bin/certutil.debug +File: /usr/lib/debug/.build-id/ab 40755 root:root +File: /usr/lib/debug/.build-id/ab/37fbc5a0b439f60fc36482d6d284d4053de2f8 120777 root:root ../../../../bin/util_gtest +File: /usr/lib/debug/.build-id/ab/37fbc5a0b439f60fc36482d6d284d4053de2f8.debug 120777 root:root ../../usr/bin/util_gtest.debug +File: /usr/lib/debug/.build-id/b3 40755 root:root +File: /usr/lib/debug/.build-id/b3/a59655c5173c43c8d234e2e123458a3a03c724 120777 root:root ../../../../bin/pkix-errcodes +File: /usr/lib/debug/.build-id/b3/a59655c5173c43c8d234e2e123458a3a03c724.debug 120777 root:root ../../usr/bin/pkix-errcodes.debug +File: /usr/lib/debug/.build-id/b3/ce3c9146e024676236fb9b71997cbcabbc54f4 120777 root:root ../../../../bin/bltest +File: /usr/lib/debug/.build-id/b3/ce3c9146e024676236fb9b71997cbcabbc54f4.debug 120777 root:root ../../usr/bin/bltest.debug File: /usr/lib/debug/.build-id/b6 40755 root:root -File: /usr/lib/debug/.build-id/b6/a441a2572eadcfa4cb4ca8638c33d2cae59b16 120777 root:root ../../../../bin/fbectest -File: /usr/lib/debug/.build-id/b6/a441a2572eadcfa4cb4ca8638c33d2cae59b16.debug 120777 root:root ../../usr/bin/fbectest.debug +File: /usr/lib/debug/.build-id/b6/3987a9648a50a837664c891a0315f909aa23b2 120777 root:root ../../../../bin/cmsutil +File: /usr/lib/debug/.build-id/b6/3987a9648a50a837664c891a0315f909aa23b2.debug 120777 root:root ../../usr/bin/cmsutil.debug +File: /usr/lib/debug/.build-id/b7 40755 root:root +File: /usr/lib/debug/.build-id/b7/05e892f71596d7760ca0072ff2d3f4c1c1cf19 120777 root:root ../../../../bin/signtool +File: /usr/lib/debug/.build-id/b7/05e892f71596d7760ca0072ff2d3f4c1c1cf19.debug 120777 root:root ../../usr/bin/signtool.debug +File: /usr/lib/debug/.build-id/b7/63afc2c5b243bf35d492a1d16b77ac245321a7 120777 root:root ../../../../bin/smime_gtest +File: /usr/lib/debug/.build-id/b7/63afc2c5b243bf35d492a1d16b77ac245321a7.debug 120777 root:root ../../usr/bin/smime_gtest.debug +File: /usr/lib/debug/.build-id/b8 40755 root:root +File: /usr/lib/debug/.build-id/b8/2435b85e7082788e0ead5b1083152a130ffd22 120777 root:root ../../../../bin/vfyserv +File: /usr/lib/debug/.build-id/b8/2435b85e7082788e0ead5b1083152a130ffd22.debug 120777 root:root ../../usr/bin/vfyserv.debug File: /usr/lib/debug/.build-id/ba 40755 root:root -File: /usr/lib/debug/.build-id/ba/ebb60959f1b0b86ba3f9bff97235604a167a2e 120777 root:root ../../../../bin/sdrtest -File: /usr/lib/debug/.build-id/ba/ebb60959f1b0b86ba3f9bff97235604a167a2e.debug 120777 root:root ../../usr/bin/sdrtest.debug +File: /usr/lib/debug/.build-id/ba/5f639503ef563b11a6741463e492f076924635 120777 root:root ../../../../bin/certhigh_gtest +File: /usr/lib/debug/.build-id/ba/5f639503ef563b11a6741463e492f076924635.debug 120777 root:root ../../usr/bin/certhigh_gtest.debug File: /usr/lib/debug/.build-id/bd 40755 root:root -File: /usr/lib/debug/.build-id/bd/6cd2646f7fad96d5e7928ae6b2723a3bc50f4e 120777 root:root ../../../../bin/oidcalc -File: /usr/lib/debug/.build-id/bd/6cd2646f7fad96d5e7928ae6b2723a3bc50f4e.debug 120777 root:root ../../usr/bin/oidcalc.debug -File: /usr/lib/debug/.build-id/c2 40755 root:root -File: /usr/lib/debug/.build-id/c2/bcd507feb3e45f8116639108d68f0ea49d1d90 120777 root:root ../../../../bin/btoa -File: /usr/lib/debug/.build-id/c2/bcd507feb3e45f8116639108d68f0ea49d1d90.debug 120777 root:root ../../usr/bin/btoa.debug -File: /usr/lib/debug/.build-id/ca 40755 root:root -File: /usr/lib/debug/.build-id/ca/eb48714e831a18433754cace4ad2f77a01edd6 120777 root:root ../../../../bin/mozpkix_gtest -File: /usr/lib/debug/.build-id/ca/eb48714e831a18433754cace4ad2f77a01edd6.debug 120777 root:root ../../usr/bin/mozpkix_gtest.debug -File: /usr/lib/debug/.build-id/d0 40755 root:root -File: /usr/lib/debug/.build-id/d0/ca78c044c0383380a72d5afde81c0a08a5f63e 120777 root:root ../../../../bin/signver -File: /usr/lib/debug/.build-id/d0/ca78c044c0383380a72d5afde81c0a08a5f63e.debug 120777 root:root ../../usr/bin/signver.debug -File: /usr/lib/debug/.build-id/d1 40755 root:root -File: /usr/lib/debug/.build-id/d1/a439883d12852f4a2eb6ffc9df1632ef6f8076 120777 root:root ../../../../bin/ocspclnt -File: /usr/lib/debug/.build-id/d1/a439883d12852f4a2eb6ffc9df1632ef6f8076.debug 120777 root:root ../../usr/bin/ocspclnt.debug -File: /usr/lib/debug/.build-id/d3 40755 root:root -File: /usr/lib/debug/.build-id/d3/46d8d83b0894c63fd55f6109d58fb91a777de7 120777 root:root ../../../../bin/httpserv -File: /usr/lib/debug/.build-id/d3/46d8d83b0894c63fd55f6109d58fb91a777de7.debug 120777 root:root ../../usr/bin/httpserv.debug -File: /usr/lib/debug/.build-id/d4 40755 root:root -File: /usr/lib/debug/.build-id/d4/6a889bf8934b4517895f02bf87fdf97e0d6ceb 120777 root:root ../../../../bin/freebl_gtest -File: /usr/lib/debug/.build-id/d4/6a889bf8934b4517895f02bf87fdf97e0d6ceb.debug 120777 root:root ../../usr/bin/freebl_gtest.debug -File: /usr/lib/debug/.build-id/d4/ecf3148b635c934655343b1a85c2b719e6bd8f 120777 root:root ../../../../bin/nonspr10 -File: /usr/lib/debug/.build-id/d4/ecf3148b635c934655343b1a85c2b719e6bd8f.debug 120777 root:root ../../usr/bin/nonspr10.debug -File: /usr/lib/debug/.build-id/d6 40755 root:root -File: /usr/lib/debug/.build-id/d6/12a3332cdb8329bd7d9d223462158117316d3a 120777 root:root ../../../../bin/listsuites -File: /usr/lib/debug/.build-id/d6/12a3332cdb8329bd7d9d223462158117316d3a.debug 120777 root:root ../../usr/bin/listsuites.debug -File: /usr/lib/debug/.build-id/d8 40755 root:root -File: /usr/lib/debug/.build-id/d8/d4cda80255d47806e76851264745ccb890d380 120777 root:root ../../../../bin/bltest -File: /usr/lib/debug/.build-id/d8/d4cda80255d47806e76851264745ccb890d380.debug 120777 root:root ../../usr/bin/bltest.debug -File: /usr/lib/debug/.build-id/d9 40755 root:root -File: /usr/lib/debug/.build-id/d9/9e91fc764ea364e3a2752c5296b1cf16556126 120777 root:root ../../../../bin/symkeyutil -File: /usr/lib/debug/.build-id/d9/9e91fc764ea364e3a2752c5296b1cf16556126.debug 120777 root:root ../../usr/bin/symkeyutil.debug +File: /usr/lib/debug/.build-id/bd/92041f1b68ad3adf4f50d337b693c233a7b025 120777 root:root ../../../../bin/nss-policy-check +File: /usr/lib/debug/.build-id/bd/92041f1b68ad3adf4f50d337b693c233a7b025.debug 120777 root:root ../../usr/bin/nss-policy-check.debug +File: /usr/lib/debug/.build-id/c0 40755 root:root +File: /usr/lib/debug/.build-id/c0/328fa62623aff695e3c0312716ebd18dc41e92 120777 root:root ../../../../bin/remtest +File: /usr/lib/debug/.build-id/c0/328fa62623aff695e3c0312716ebd18dc41e92.debug 120777 root:root ../../usr/bin/remtest.debug +File: /usr/lib/debug/.build-id/c6 40755 root:root +File: /usr/lib/debug/.build-id/c6/45d558bcacc7d00019e48699f1316198ff074e 120777 root:root ../../../../bin/prng_gtest +File: /usr/lib/debug/.build-id/c6/45d558bcacc7d00019e48699f1316198ff074e.debug 120777 root:root ../../usr/bin/prng_gtest.debug +File: /usr/lib/debug/.build-id/c6/84b2bf9b1396ae5202c30a05328065d9177bb1 120777 root:root ../../../../bin/freebl_gtest +File: /usr/lib/debug/.build-id/c6/84b2bf9b1396ae5202c30a05328065d9177bb1.debug 120777 root:root ../../usr/bin/freebl_gtest.debug +File: /usr/lib/debug/.build-id/c8 40755 root:root +File: /usr/lib/debug/.build-id/c8/0b3caa19445363374e0f15ef49f12ca5d79c12 120777 root:root ../../../../bin/p7env +File: /usr/lib/debug/.build-id/c8/0b3caa19445363374e0f15ef49f12ca5d79c12.debug 120777 root:root ../../usr/bin/p7env.debug +File: /usr/lib/debug/.build-id/cc 40755 root:root +File: /usr/lib/debug/.build-id/cc/c001d57624961ed7891d9923484e52cdb767cb 120777 root:root ../../../../bin/makepqg +File: /usr/lib/debug/.build-id/cc/c001d57624961ed7891d9923484e52cdb767cb.debug 120777 root:root ../../usr/bin/makepqg.debug +File: /usr/lib/debug/.build-id/d5 40755 root:root +File: /usr/lib/debug/.build-id/d5/0043fa778c64fd87a323ce33facfa83148f373 120777 root:root ../../../../bin/nss_bogo_shim +File: /usr/lib/debug/.build-id/d5/0043fa778c64fd87a323ce33facfa83148f373.debug 120777 root:root ../../usr/bin/nss_bogo_shim.debug +File: /usr/lib/debug/.build-id/d5/014d757853fc0910306bbd4039e3af531d5bd8 120777 root:root ../../../../bin/symkeyutil +File: /usr/lib/debug/.build-id/d5/014d757853fc0910306bbd4039e3af531d5bd8.debug 120777 root:root ../../usr/bin/symkeyutil.debug File: /usr/lib/debug/.build-id/dc 40755 root:root -File: /usr/lib/debug/.build-id/dc/71688bfad070fbe9221d3114760c5529212b26 120777 root:root ../../../../bin/pk11ectest -File: /usr/lib/debug/.build-id/dc/71688bfad070fbe9221d3114760c5529212b26.debug 120777 root:root ../../usr/bin/pk11ectest.debug -File: /usr/lib/debug/.build-id/e1 40755 root:root -File: /usr/lib/debug/.build-id/e1/8868fd1f2b196df4e550d81fb591b5c949650e 120777 root:root ../../../../bin/softoken_gtest -File: /usr/lib/debug/.build-id/e1/8868fd1f2b196df4e550d81fb591b5c949650e.debug 120777 root:root ../../usr/bin/softoken_gtest.debug -File: /usr/lib/debug/.build-id/e1/9048bc5eca7b167eed00d4bfd61031dd12e94d 120777 root:root ../../../../bin/encodeinttest -File: /usr/lib/debug/.build-id/e1/9048bc5eca7b167eed00d4bfd61031dd12e94d.debug 120777 root:root ../../usr/bin/encodeinttest.debug +File: /usr/lib/debug/.build-id/dc/42531eb8a8471a2e8eab1739bde13d53cb305c 120777 root:root ../../../../bin/strsclnt +File: /usr/lib/debug/.build-id/dc/42531eb8a8471a2e8eab1739bde13d53cb305c.debug 120777 root:root ../../usr/bin/strsclnt.debug +File: /usr/lib/debug/.build-id/e2 40755 root:root +File: /usr/lib/debug/.build-id/e2/131984b86b6810815e9281a6b0838c17c73fa6 120777 root:root ../../../../bin/pk11ectest +File: /usr/lib/debug/.build-id/e2/131984b86b6810815e9281a6b0838c17c73fa6.debug 120777 root:root ../../usr/bin/pk11ectest.debug +File: /usr/lib/debug/.build-id/e3 40755 root:root +File: /usr/lib/debug/.build-id/e3/3c3e3915e2cbf88eaedc5894b4b0d1672a2784 120777 root:root ../../../../bin/rsaperf +File: /usr/lib/debug/.build-id/e3/3c3e3915e2cbf88eaedc5894b4b0d1672a2784.debug 120777 root:root ../../usr/bin/rsaperf.debug File: /usr/lib/debug/.build-id/ea 40755 root:root -File: /usr/lib/debug/.build-id/ea/7e805a5d2421b4e11f027e0fae1eb3dbfe745a 120777 root:root ../../../../bin/lowhashtest -File: /usr/lib/debug/.build-id/ea/7e805a5d2421b4e11f027e0fae1eb3dbfe745a.debug 120777 root:root ../../usr/bin/lowhashtest.debug -File: /usr/lib/debug/.build-id/ec 40755 root:root -File: /usr/lib/debug/.build-id/ec/6996b95563fd7a88a72fe5c6e9ad93dbd85aaa 120777 root:root ../../../../bin/derdump -File: /usr/lib/debug/.build-id/ec/6996b95563fd7a88a72fe5c6e9ad93dbd85aaa.debug 120777 root:root ../../usr/bin/derdump.debug +File: /usr/lib/debug/.build-id/ea/4c8046319e1d003510af2557f0fc74964df1a3 120777 root:root ../../../../bin/mpi_tests +File: /usr/lib/debug/.build-id/ea/4c8046319e1d003510af2557f0fc74964df1a3.debug 120777 root:root ../../usr/bin/mpi_tests.debug +File: /usr/lib/debug/.build-id/ea/5924fff9f484d77815c4233e49ef6b55af39a4 120777 root:root ../../../../bin/mangle +File: /usr/lib/debug/.build-id/ea/5924fff9f484d77815c4233e49ef6b55af39a4.debug 120777 root:root ../../usr/bin/mangle.debug +File: /usr/lib/debug/.build-id/ef 40755 root:root +File: /usr/lib/debug/.build-id/ef/d61cf970f3efb07bb8425cdbdb0c36681acf86 120777 root:root ../../../../bin/pk12util +File: /usr/lib/debug/.build-id/ef/d61cf970f3efb07bb8425cdbdb0c36681acf86.debug 120777 root:root ../../usr/bin/pk12util.debug File: /usr/lib/debug/.build-id/f0 40755 root:root -File: /usr/lib/debug/.build-id/f0/93726087ede48b54cd3563ef29be76f88ed24a 120777 root:root ../../../../bin/rsapoptst -File: /usr/lib/debug/.build-id/f0/93726087ede48b54cd3563ef29be76f88ed24a.debug 120777 root:root ../../usr/bin/rsapoptst.debug -File: /usr/lib/debug/.build-id/f4 40755 root:root -File: /usr/lib/debug/.build-id/f4/3f8d24d19c7ee65c68bd60b6a225da8e8bb1ca 120777 root:root ../../../../bin/p7verify -File: /usr/lib/debug/.build-id/f4/3f8d24d19c7ee65c68bd60b6a225da8e8bb1ca.debug 120777 root:root ../../usr/bin/p7verify.debug -File: /usr/lib/debug/.build-id/fb 40755 root:root -File: /usr/lib/debug/.build-id/fb/5d022f01be816ecb57501159f6f7146978d72b 120777 root:root ../../../../bin/der_gtest -File: /usr/lib/debug/.build-id/fb/5d022f01be816ecb57501159f6f7146978d72b.debug 120777 root:root ../../usr/bin/der_gtest.debug -File: /usr/lib/debug/usr/bin/addbuiltin.debug 100644 root:root 8052f63fd95dc6d119aee9a44cd94dd9 -File: /usr/lib/debug/usr/bin/atob.debug 100644 root:root 8e1a43c2691b2d83f89b5fb67940fdb9 -File: /usr/lib/debug/usr/bin/baddbdir.debug 100644 root:root d48db9c1e11c0f744ab48fb5bd360259 -File: /usr/lib/debug/usr/bin/blake2b_gtest.debug 100644 root:root 08811d96b5f14568574b33039fe8b8bb -File: /usr/lib/debug/usr/bin/bltest.debug 100644 root:root d980b9f2844da1d711a23ab22a317265 -File: /usr/lib/debug/usr/bin/btoa.debug 100644 root:root 1f43557fe6b12f1c1bb11c2fe7a81ce8 -File: /usr/lib/debug/usr/bin/certdb_gtest.debug 100644 root:root 33198d749cdbd97f82db1f93a01a07a5 -File: /usr/lib/debug/usr/bin/certhigh_gtest.debug 100644 root:root 4860c4ae1a294047ad1e28578fae8bdc -File: /usr/lib/debug/usr/bin/certutil.debug 100644 root:root aab000aa887d177795c045a284eb8005 -File: /usr/lib/debug/usr/bin/chktest.debug 100644 root:root 45e91fc505a745cf4e92429d2c91891d -File: /usr/lib/debug/usr/bin/cmsutil.debug 100644 root:root d30ad400df2a89c677e06ca212325392 -File: /usr/lib/debug/usr/bin/conflict.debug 100644 root:root 1698bddc34e6f55ac533aaf3b6cdc6ff -File: /usr/lib/debug/usr/bin/crlutil.debug 100644 root:root 40f76796a4dfb3e218a763e23867cf1f -File: /usr/lib/debug/usr/bin/crmftest.debug 100644 root:root c5a485b3cd697e1aa1b8f44670613fb3 -File: /usr/lib/debug/usr/bin/cryptohi_gtest.debug 100644 root:root 7c3d5b634f06f8c83bd790c6c1e471ea -File: /usr/lib/debug/usr/bin/dbtest.debug 100644 root:root 13f216407a03b683248f63be91714962 -File: /usr/lib/debug/usr/bin/der_gtest.debug 100644 root:root 4f5c2b54b61f60e318793862b159ecc6 -File: /usr/lib/debug/usr/bin/derdump.debug 100644 root:root b38ca597736479fdbd061b7fb90fc0bf -File: /usr/lib/debug/usr/bin/dertimetest.debug 100644 root:root ac8166edad5d32675ddec539a2797849 -File: /usr/lib/debug/usr/bin/digest.debug 100644 root:root 93d4b9a1303205300beb848bb635c198 -File: /usr/lib/debug/usr/bin/ecperf.debug 100644 root:root 2c2fbf3000ca409c6e046b4636ea27a6 -File: /usr/lib/debug/usr/bin/encodeinttest.debug 100644 root:root ae578efa8591388513c51aaf5161a948 -File: /usr/lib/debug/usr/bin/fbectest.debug 100644 root:root f9cec2f7f68f618dd5dd6223c8043d8c -File: /usr/lib/debug/usr/bin/freebl_gtest.debug 100644 root:root d69f391f8a6909858bb2df9f4f2d9340 -File: /usr/lib/debug/usr/bin/httpserv.debug 100644 root:root b282c376d1d7257e7e8c5f40c5180630 -File: /usr/lib/debug/usr/bin/hw-support.debug 100644 root:root da81ddaaa124a28d3b6f7a15e03dcd6e -File: /usr/lib/debug/usr/bin/listsuites.debug 100644 root:root 5268be010e08f7cb4e432c9c3d52de53 -File: /usr/lib/debug/usr/bin/lowhashtest.debug 100644 root:root 00ea5d9925bfd3c983b9e2e165d3aedb -File: /usr/lib/debug/usr/bin/makepqg.debug 100644 root:root f0701a20972b7b4cfc6080d4aaf26aa2 -File: /usr/lib/debug/usr/bin/mangle.debug 100644 root:root 353bef929b6f7fc1f4b782badd631f18 -File: /usr/lib/debug/usr/bin/modutil.debug 100644 root:root 233d9e2a152289a454a075409558798b -File: /usr/lib/debug/usr/bin/mozpkix_gtest.debug 100644 root:root 1e1503d9a96f58ff8dd4fd41afe60465 -File: /usr/lib/debug/usr/bin/mpi_tests.debug 100644 root:root b472c3ed92042885367e21f1c067f6ed -File: /usr/lib/debug/usr/bin/multinit.debug 100644 root:root 6a4cbb73b5266cb1fad700747cb6c2e0 -File: /usr/lib/debug/usr/bin/nonspr10.debug 100644 root:root 0694103c94e7480b57d48d6937c15452 -File: /usr/lib/debug/usr/bin/nss-policy-check.debug 100644 root:root 4f7cc260ad9963b756357aee5b69fa47 -File: /usr/lib/debug/usr/bin/nss.debug 100644 root:root e23aceca1624d930ef94c9a5b21eaf22 -File: /usr/lib/debug/usr/bin/nss_bogo_shim.debug 100644 root:root 5ddf038f75543ef435a783a76e2bf246 -File: /usr/lib/debug/usr/bin/ocspclnt.debug 100644 root:root 045d1e4158465f7d6198294f911aced4 -File: /usr/lib/debug/usr/bin/ocspresp.debug 100644 root:root fc5957a156b85d97e3dc0df399f73a2d -File: /usr/lib/debug/usr/bin/oidcalc.debug 100644 root:root 4bf626ea8abeb8131be92d042ddf84ac -File: /usr/lib/debug/usr/bin/p7content.debug 100644 root:root ef6e9bc6ad42c0643f4c5c1cc2e090da -File: /usr/lib/debug/usr/bin/p7env.debug 100644 root:root 2cd7bd9ce2c0e009eb525ea38c868912 -File: /usr/lib/debug/usr/bin/p7sign.debug 100644 root:root e2ba14158d4e233e1fb2a82dbaa83642 -File: /usr/lib/debug/usr/bin/p7verify.debug 100644 root:root 90494df20686f92f9b7221a4368902c2 -File: /usr/lib/debug/usr/bin/pk11_gtest.debug 100644 root:root f0ad340650e0f1e89a51e7c2a17ca4af -File: /usr/lib/debug/usr/bin/pk11ectest.debug 100644 root:root 000c42b3f14e8561f92c479a91d2df41 -File: /usr/lib/debug/usr/bin/pk11gcmtest.debug 100644 root:root f1ff1eebb932ab856bc536e79a76e794 -File: /usr/lib/debug/usr/bin/pk11importtest.debug 100644 root:root ce11fea637c27ef71da455f8d04ba99b -File: /usr/lib/debug/usr/bin/pk11mode.debug 100644 root:root e3e3d5b3670bd0a5dd5845f314839286 -File: /usr/lib/debug/usr/bin/pk12util.debug 100644 root:root f4a28850ce2c7574aecf03b86a8ba5da -File: /usr/lib/debug/usr/bin/pk1sign.debug 100644 root:root e8f6676df86cc6723717f4d4689f8190 -File: /usr/lib/debug/usr/bin/pkix-errcodes.debug 100644 root:root bb39f07dfed45179ca7de3b7de7ba17b -File: /usr/lib/debug/usr/bin/pp.debug 100644 root:root c9bcf2e4983ed0b2358ca1ca30e19119 -File: /usr/lib/debug/usr/bin/prng_gtest.debug 100644 root:root 04c911e6413be8952d683197c5f29c87 -File: /usr/lib/debug/usr/bin/pwdecrypt.debug 100644 root:root 7d65e00edfa93e979985bfd3745c1db9 -File: /usr/lib/debug/usr/bin/remtest.debug 100644 root:root 19fe8778ae04a0669cddf6e15fd8cd78 -File: /usr/lib/debug/usr/bin/rsaperf.debug 100644 root:root 1ab4640ce155a3e6142fccaee0f79344 -File: /usr/lib/debug/usr/bin/rsapoptst.debug 100644 root:root a9bd34f3a341455243e802af22b239a7 -File: /usr/lib/debug/usr/bin/sdrtest.debug 100644 root:root e8e8d6662042f1efa8b381dca4040c2f -File: /usr/lib/debug/usr/bin/secmodtest.debug 100644 root:root 8b89d54cf457a1d392ca932fb2d0a4c4 -File: /usr/lib/debug/usr/bin/selfserv.debug 100644 root:root 803c75abd63a9782a41dc147e65ff656 -File: /usr/lib/debug/usr/bin/shlibsign.debug 100644 root:root 0d2fb5deffecd4f1150c9a82261ce95d -File: /usr/lib/debug/usr/bin/signtool.debug 100644 root:root 68e74d41cd2715cd3a624b4df43b9ab7 -File: /usr/lib/debug/usr/bin/signver.debug 100644 root:root 1b3e9c61fefbf3bbf306fae62d16e1f0 -File: /usr/lib/debug/usr/bin/smime_gtest.debug 100644 root:root 5c685e6e53426c9e4b41ef75576c0870 -File: /usr/lib/debug/usr/bin/softoken_gtest.debug 100644 root:root df8354bd4f0101991d928b102ef917d0 -File: /usr/lib/debug/usr/bin/ssl_gtest.debug 100644 root:root 0412518eae876a4a8ce4b89fa6f4fc68 -File: /usr/lib/debug/usr/bin/ssltap.debug 100644 root:root 12109ea7bfdea26b2b33d12aff918f42 -File: /usr/lib/debug/usr/bin/strsclnt.debug 100644 root:root 54e8e2002b7ba5e74f1c6d5d1fbbdb4d -File: /usr/lib/debug/usr/bin/symkeyutil.debug 100644 root:root 4cf88d41aabe6958f1f94bfa00b5370e -File: /usr/lib/debug/usr/bin/sysinit_gtest.debug 100644 root:root 206ecccf3123a9d497c145f47cac1b27 -File: /usr/lib/debug/usr/bin/tstclnt.debug 100644 root:root 99c3c830655605ca20abc7359d147f13 -File: /usr/lib/debug/usr/bin/util_gtest.debug 100644 root:root a3d977a2c75347713ea269c3ea6c0250 -File: /usr/lib/debug/usr/bin/vfychain.debug 100644 root:root f6268b4dec018b36f62ea8b9cee60a06 -File: /usr/lib/debug/usr/bin/vfyserv.debug 100644 root:root ac9ed96da1bc41b2630beb09cb94741a -RPMIdentity: 8bb29e5317a3778b6c4e4a66076712da85d929e60faf284c74229d2093ce13f0d70ec613aba8e40433d4f485fc8d0bd82355047d97ffd86cd69770b81727f9b0 +File: /usr/lib/debug/.build-id/f0/4b23c993070bdec921a0c8ca648af260bb2190 120777 root:root ../../../../bin/mozpkix_gtest +File: /usr/lib/debug/.build-id/f0/4b23c993070bdec921a0c8ca648af260bb2190.debug 120777 root:root ../../usr/bin/mozpkix_gtest.debug +File: /usr/lib/debug/.build-id/f5 40755 root:root +File: /usr/lib/debug/.build-id/f5/05c7038e1115e4a209dd86048d2b45aca7dac8 120777 root:root ../../../../bin/multinit +File: /usr/lib/debug/.build-id/f5/05c7038e1115e4a209dd86048d2b45aca7dac8.debug 120777 root:root ../../usr/bin/multinit.debug +File: /usr/lib/debug/.build-id/f5/612366caf31f07cf62118c5d0333bf6786fc22 120777 root:root ../../../../bin/atob +File: /usr/lib/debug/.build-id/f5/612366caf31f07cf62118c5d0333bf6786fc22.debug 120777 root:root ../../usr/bin/atob.debug +File: /usr/lib/debug/.build-id/ff 40755 root:root +File: /usr/lib/debug/.build-id/ff/523235d45126909bafe7e166aebb3c63abf0ea 120777 root:root ../../../../bin/pk1sign +File: /usr/lib/debug/.build-id/ff/523235d45126909bafe7e166aebb3c63abf0ea.debug 120777 root:root ../../usr/bin/pk1sign.debug +File: /usr/lib/debug/usr/bin/addbuiltin.debug 100644 root:root e96f5b8e97ba41dd5dba5ae3a5daa33c +File: /usr/lib/debug/usr/bin/atob.debug 100644 root:root dac906d0918173a5ddb0d96643aa68bf +File: /usr/lib/debug/usr/bin/baddbdir.debug 100644 root:root 11d0e30d458971b87e992c4105632a1a +File: /usr/lib/debug/usr/bin/blake2b_gtest.debug 100644 root:root aa0ab00df9dc5940039faef6f7feb76d +File: /usr/lib/debug/usr/bin/bltest.debug 100644 root:root 101ec554724bbae7d34b3ac8319690b9 +File: /usr/lib/debug/usr/bin/btoa.debug 100644 root:root 76a2d75537082c11fbab080389d5c890 +File: /usr/lib/debug/usr/bin/certdb_gtest.debug 100644 root:root 7ff6d609b6b106f040b2f968b6ce257e +File: /usr/lib/debug/usr/bin/certhigh_gtest.debug 100644 root:root 93c48ae62b121c0e8d9482426e3f82ae +File: /usr/lib/debug/usr/bin/certutil.debug 100644 root:root 6e2a87bc1ceee2398f4525b4272930ac +File: /usr/lib/debug/usr/bin/chktest.debug 100644 root:root 856e57fbb6f22e003a43e16107faadb0 +File: /usr/lib/debug/usr/bin/cmsutil.debug 100644 root:root 15c9a7162265d0eef8ff63c308c9705a +File: /usr/lib/debug/usr/bin/conflict.debug 100644 root:root 47a860b1b60dfd931bfac73bfd8c0264 +File: /usr/lib/debug/usr/bin/crlutil.debug 100644 root:root 86c172e56c37efe2e9034f9f88872edd +File: /usr/lib/debug/usr/bin/crmftest.debug 100644 root:root f82f935540b35eca038b694f1d8295e9 +File: /usr/lib/debug/usr/bin/cryptohi_gtest.debug 100644 root:root 9fcefeed763a5264409663101f413184 +File: /usr/lib/debug/usr/bin/dbtest.debug 100644 root:root 077cc812a2450a42a0d5715213d31801 +File: /usr/lib/debug/usr/bin/der_gtest.debug 100644 root:root 3895659738170503d03f6d158d0ecaed +File: /usr/lib/debug/usr/bin/derdump.debug 100644 root:root b8d4fb0cb2f10f093838b22f724beb25 +File: /usr/lib/debug/usr/bin/dertimetest.debug 100644 root:root a353edc748b3fc62443918eb52ddbff9 +File: /usr/lib/debug/usr/bin/digest.debug 100644 root:root 253bc782e838316554b91cd70651ac82 +File: /usr/lib/debug/usr/bin/ecperf.debug 100644 root:root 661278e10e99bf326025c2b0b2e7d722 +File: /usr/lib/debug/usr/bin/encodeinttest.debug 100644 root:root e1e17d6f70eeb262e02ebd1fcb741c4a +File: /usr/lib/debug/usr/bin/fbectest.debug 100644 root:root 8e6e0931c2cb4e78f59b1766c1a29e4e +File: /usr/lib/debug/usr/bin/freebl_gtest.debug 100644 root:root d65707c97e1dbfb7d4a0b1de48c07da5 +File: /usr/lib/debug/usr/bin/httpserv.debug 100644 root:root 8c8d6f1ee486bf4ef4b883df5fc4ee97 +File: /usr/lib/debug/usr/bin/hw-support.debug 100644 root:root 82929bab6f16b622caab97fb64963ef4 +File: /usr/lib/debug/usr/bin/listsuites.debug 100644 root:root 5d743ced4cce08682e98a5c338961957 +File: /usr/lib/debug/usr/bin/lowhashtest.debug 100644 root:root 127d3dbac0c05ad750c793b5ac23f5e5 +File: /usr/lib/debug/usr/bin/makepqg.debug 100644 root:root 0326cc58296aa2e3dd7f045bd9a2558e +File: /usr/lib/debug/usr/bin/mangle.debug 100644 root:root c44863da71bd0af227fd2b5cfd3b748d +File: /usr/lib/debug/usr/bin/modutil.debug 100644 root:root 08b8065b68d42d3e5135b92f397a647f +File: /usr/lib/debug/usr/bin/mozpkix_gtest.debug 100644 root:root 0817df2793c257e5a2591d5761494ad1 +File: /usr/lib/debug/usr/bin/mpi_tests.debug 100644 root:root 0011034a7724a081261a38665f03a048 +File: /usr/lib/debug/usr/bin/multinit.debug 100644 root:root d4a59b476362be021dc471a9c67ccc36 +File: /usr/lib/debug/usr/bin/nonspr10.debug 100644 root:root 8d1b027275a36fb526fe34ca17a3cb65 +File: /usr/lib/debug/usr/bin/nss-policy-check.debug 100644 root:root e224f758cebfad387f0acb7b58fca4ca +File: /usr/lib/debug/usr/bin/nss.debug 100644 root:root e63930df851e8d101ad677227b3a7acc +File: /usr/lib/debug/usr/bin/nss_bogo_shim.debug 100644 root:root b206108266fda3cb264bb41d4c73dda7 +File: /usr/lib/debug/usr/bin/ocspclnt.debug 100644 root:root d2320c31bab5b0d19572bfbffdfa06a4 +File: /usr/lib/debug/usr/bin/ocspresp.debug 100644 root:root 2ae7c5200b707942b69cd989235dc92f +File: /usr/lib/debug/usr/bin/oidcalc.debug 100644 root:root 530059a0f589713c491f01296a11a717 +File: /usr/lib/debug/usr/bin/p7content.debug 100644 root:root 5a2fd4c394be742ffb3f18fbc3f0f397 +File: /usr/lib/debug/usr/bin/p7env.debug 100644 root:root 1aa29b46159137bbbe2ddd2ff91f6b36 +File: /usr/lib/debug/usr/bin/p7sign.debug 100644 root:root 5d91faa0d48dae232ec023bcc901b5a9 +File: /usr/lib/debug/usr/bin/p7verify.debug 100644 root:root 81962b5e7c241b53c86ce3980b90509b +File: /usr/lib/debug/usr/bin/pk11_gtest.debug 100644 root:root d9a185638904b55517cdb46c2afb1801 +File: /usr/lib/debug/usr/bin/pk11ectest.debug 100644 root:root 2d4660ba2114405e202adbb6a657376a +File: /usr/lib/debug/usr/bin/pk11gcmtest.debug 100644 root:root dd0e4ee6cb91a3599a68906f20975713 +File: /usr/lib/debug/usr/bin/pk11importtest.debug 100644 root:root 638674826295ff34ec7c4700a94a777e +File: /usr/lib/debug/usr/bin/pk11mode.debug 100644 root:root 4c757b4edfdea9c7fb0b6d30e2021dc4 +File: /usr/lib/debug/usr/bin/pk12util.debug 100644 root:root 9b5cef01ce40c66f3f32781e749c2bf8 +File: /usr/lib/debug/usr/bin/pk1sign.debug 100644 root:root 0ae5143ccebd0ce5203dd0818767e8d3 +File: /usr/lib/debug/usr/bin/pkix-errcodes.debug 100644 root:root a647dc5f85f6207b85bc5c0f87e2e964 +File: /usr/lib/debug/usr/bin/pp.debug 100644 root:root d0d712e8479361a8552d6a039b80f517 +File: /usr/lib/debug/usr/bin/prng_gtest.debug 100644 root:root 6112475d96cbb7cd3466f193dbc66fac +File: /usr/lib/debug/usr/bin/pwdecrypt.debug 100644 root:root 03eb5c34cc13f7aa19bfc924cadb819c +File: /usr/lib/debug/usr/bin/remtest.debug 100644 root:root ddae7eb77ea95348db8eae21ff297e30 +File: /usr/lib/debug/usr/bin/rsaperf.debug 100644 root:root a83f7367edff0f1d6b663b7309bc7599 +File: /usr/lib/debug/usr/bin/rsapoptst.debug 100644 root:root 834885e56d35eef4fcd2c9f8da0a7dff +File: /usr/lib/debug/usr/bin/sdrtest.debug 100644 root:root 37a9c023b9ca35a4f4651625c95b63a1 +File: /usr/lib/debug/usr/bin/secmodtest.debug 100644 root:root 761c9b791d3b455413ca890ca35d56a8 +File: /usr/lib/debug/usr/bin/selfserv.debug 100644 root:root 3ce284d22407ba6f0f7af99832d0e085 +File: /usr/lib/debug/usr/bin/shlibsign.debug 100644 root:root 760cbf3712e0771c1f7570df2e34b4fa +File: /usr/lib/debug/usr/bin/signtool.debug 100644 root:root 4a3e4b1c93a58286a399bed41c8ef7da +File: /usr/lib/debug/usr/bin/signver.debug 100644 root:root 194bdce1f5ca0b49c88990fb4a093b44 +File: /usr/lib/debug/usr/bin/smime_gtest.debug 100644 root:root c96b5376a57111e1eadf5b3007c8b838 +File: /usr/lib/debug/usr/bin/softoken_gtest.debug 100644 root:root 685b17366452e62438768ece080d3394 +File: /usr/lib/debug/usr/bin/ssl_gtest.debug 100644 root:root 3373215264b45ea496ef6384da096358 +File: /usr/lib/debug/usr/bin/ssltap.debug 100644 root:root 40e27fd31e00c2d81a63ee6fca7ae8cd +File: /usr/lib/debug/usr/bin/strsclnt.debug 100644 root:root 869790bcb54ee5d201a8049c095cdbf2 +File: /usr/lib/debug/usr/bin/symkeyutil.debug 100644 root:root d742c16368a7da0447b1e85900ec1979 +File: /usr/lib/debug/usr/bin/sysinit_gtest.debug 100644 root:root fb38a1b2be21e65cc93ff2d52f69af63 +File: /usr/lib/debug/usr/bin/tstclnt.debug 100644 root:root c34058830b805a7bd46fa3e64862ee43 +File: /usr/lib/debug/usr/bin/util_gtest.debug 100644 root:root b575b5c0dba518bc4eb709b6ea9abe61 +File: /usr/lib/debug/usr/bin/vfychain.debug 100644 root:root d8491db2f462a8f32e3f2355ccf9d01c +File: /usr/lib/debug/usr/bin/vfyserv.debug 100644 root:root 048eccd381cbc7cf953f285a9ac25141 +RPMIdentity: 877ba5da995b3f82635f2cc31ad682f50e888693d3052a68aac23c9c21332abec680f24eb8368c36f0772b3469ae1771f7dd11495492117674a867920fe3a272